8336bcdcd3d8de524b6a39b1a65d69ec5bea6a524134f8b3f271b4b4bdd6d20c31447c6a24e4afbff069ae942aca17d8b8c39a9", 0xef, 0x6}, {&(0x7f00000014c0)="127f031eb5d12e8b4cac9012ab9fa30d53c9de7f8d286193ce", 0x19, 0x9}, {&(0x7f0000001500)="b3f1b6be6dedf0df6e1659e0bbb81ffa662dd09335516c17d75e726dabb7cdb8b647c470339e4c0ac5e6d5e5844d7996ca8f9e8cce1bc74d4ee09c2a6c6a6193791b5e5979fde57eb6e7f5e02acd99127217d89362fe28f17730ee6df6232bb672c45a9b0397e89ae83894149f2f1663aff3c1039e9496a4fffc784dab9f5be0ae55871811a5ea57b14c88db2a3a6fc066dec8aa9d601713aff0f0e25e756fcb0e8d563a9550db4caca922d93b29c5e8a70ccef58f62864c4b9233d8c6db3db341b38ba71e79a75a", 0xc8, 0x1}, {&(0x7f0000001600)="76c8646eaae1b59880dc4a00648372dcaf6692c9d815db2b2b6f40206684f0e0ba00e8d429abfef1fd3ffa99b484b2f1085b9c829a01cc45fd07eeffc37de18f0e8f49d7c40ce4ac46f9ea7ae31c9ee89c658f067aaf6081ca58298baf9ff5caea411068d9f5d05ee481cf59e88e2dc9faff74984a89acd8f83d06a0cbc0d814e302e15a99871b5f8b9ac5ee7f50335ff9e3d96f923ece1be8e522ca610a79f890b224b1a16fe9a1ee9b03693db1387f696a1809bfe2ab5303362f261ede31d5f09769d71a", 0xc5, 0x2}], 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x33]}}, {@gid}, {@gid}, {@huge_advise}, {@huge_always}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) [ 3154.329753][T15817] loop0: detected capacity change from 0 to 8 [ 3154.344394][T15817] EXT4-fs: 5 callbacks suppressed [ 3154.344405][T15817] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ba, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f"]) 04:49:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 3154.480622][T15845] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value 04:49:50 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x33]}}, {@gid}, {@gid}, {@huge_advise}, {@huge_always}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2bb, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:50 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 04:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB, @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3154.606494][T15860] tmpfs: Bad value for 'mpol' 04:49:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x33]}}, {@gid}, {@gid}, {@huge_advise}, {@huge_always}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2bc, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 04:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB, @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3154.693239][T15870] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value 04:49:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3154.749400][T15879] tmpfs: Bad value for 'mpol' 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2bd, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:50 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x33]}}, {@gid}, {@gid}, {@huge_advise}, {@huge_always}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 04:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB, @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2be, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:50 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3154.838684][T15892] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value [ 3154.871755][T15898] tmpfs: Bad value for 'mpol' 04:49:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 04:49:50 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, 0x0) 04:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2bf, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x10, 0x0, 0x705, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) [ 3154.982462][T15911] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value 04:49:50 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, 0x0) 04:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:50 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x10, 0x0, 0x705, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 04:49:50 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, 0x0) 04:49:50 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x10, 0x0, 0x705, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 04:49:50 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x33]}}, {@gid}, {@gid}, {@huge_advise}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackf', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3155.236866][T15954] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value 04:49:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x10, r1, 0x0, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 04:49:51 executing program 2: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x33]}}, {@gid}, {@gid}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackf', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x10, r1, 0x0, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3155.390563][T15974] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value 04:49:51 executing program 2: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x33]}}, {@gid}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackf', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x10, r1, 0x0, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 2: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x33]}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3155.536048][T15997] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value 04:49:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:49:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x14, r1, 0x705}, 0x14}}, 0x0) 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:51 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x14, r1, 0x705}, 0x14}}, 0x0) [ 3155.662979][T16017] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x14, r1, 0x705}, 0x14}}, 0x0) 04:49:51 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:51 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x18, r1, 0x705, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,eu', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:51 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x18, r1, 0x705, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 3155.854575][T16044] EXT4-fs (sda1): re-mounted. Opts: . Quota mode: none. 04:49:51 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,eu', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x18, r1, 0x705, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:49:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:51 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:51 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,eu', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ca, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:51 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000380)="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", 0x1000, 0x1}, {&(0x7f0000000200)="ee8c141808388cf964d64876d6847c64b611d7fe5fb863e35c096f47562db2c23d0c6f3dd1b32eaef2d4cdff2cdc97c1aaba9e7ec211443035e1e2c8bf45577823bbe0d4ca54a4dcfe7b3c9623b81de8418f7309fa41c3d00e4485a79df76bf4041d08e26979532288afd0619caa17d4f2064670ffe7ab889f09052b1186b74db5fcbea8e8add4213da8c460dd10dc32f6f8ebe7c63c05334c752ac5b4cb401f1f2a2042420ad2db0b", 0xa9, 0x408000000}], 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cb, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000380)="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", 0x1000, 0x1}, {&(0x7f0000000200)="ee8c141808388cf964d64876d6847c64b611d7fe5fb863e35c096f47562db2c23d0c6f3dd1b32eaef2d4cdff2cdc97c1aaba9e7ec211443035e1e2c8bf45577823bbe0d4ca54a4dcfe7b3c9623b81de8418f7309fa41c3d00e4485a79df76bf4041d08e26979532288afd0619caa17d4f2064670ffe7ab889f09052b1186b74db5fcbea8e8add4213da8c460dd10dc32f6f8ebe7c63c05334c752ac5b4cb401f1f2a2042420ad2db0b", 0xa9, 0x408000000}], 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:51 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cc, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:51 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:52 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x7, 0x4, &(0x7f0000001700)=[{&(0x7f00000013c0)="b7bf2f966caa826e673f3a2ea161a61b0f078a7008915fd16758b9aa6c1dc0f3aa99729c82d564fcb1ed46d3e60905011b30a99d984f53076816fede0cbf6d92302aa691853595b6bb8192f07a98de1277b1797789c24676f7b7e653fe71ea7e6d0f77a31669bf2f897ce09ae5ec7aeb2bf25af525072e60258eb763ad071090866e9a2794382bc2634665cb38872c45991f6793b54ac110e4557f02f72c5782fb877f4c99495ce00dc550f23d3ac39885ca7efc3af4efb621d38b98336bcdcd3d8de524b6a39b1a65d69ec5bea6a524134f8b3f271b4b4bdd6d20c31447c6a24e4afbff069ae942aca17d8b8c39a9", 0xef, 0x6}, {&(0x7f00000014c0)="127f031eb5d12e8b4cac9012ab9fa30d53c9de7f8d286193ce", 0x19, 0x9}, {&(0x7f0000001500)="b3f1b6be6dedf0df6e1659e0bbb81ffa662dd09335516c17d75e726dabb7cdb8b647c470339e4c0ac5e6d5e5844d7996ca8f9e8cce1bc74d4ee09c2a6c6a6193791b5e5979fde57eb6e7f5e02acd99127217d89362fe28f17730ee6df6232bb672c45a9b0397e89ae83894149f2f1663aff3c1039e9496a4fffc784dab9f5be0ae55871811a5ea57b14c88db2a3a6fc066dec8aa9d601713aff0f0e25e756fcb0e8d563a9550db4caca922d93b29c5e8a70ccef58f62864c4b9233d8c6db3db341b38ba71e79a75a", 0xc8, 0x1}, {&(0x7f0000001600)="76c8646eaae1b59880dc4a00648372dcaf6692c9d815db2b2b6f40206684f0e0ba00e8d429abfef1fd3ffa99b484b2f1085b9c829a01cc45fd07eeffc37de18f0e8f49d7c40ce4ac46f9ea7ae31c9ee89c658f067aaf6081ca58298baf9ff5caea411068d9f5d05ee481cf59e88e2dc9faff74984a89acd8f83d06a0cbc0d814e302e15a99871b5f8b9ac5ee7f50335ff9e3d96f923ece1be8e522ca610a79f890b224b1a16fe9a1ee9b03693db1387f696a1809bfe2ab5303362f261ede31d5f09769d71a", 0xc5, 0x2}], 0x304000, &(0x7f0000001a40)={[{@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x37, 0x3a, 0x33, 0x33]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x33, 0x30, 0x34, 0x34, 0x74, 0x33, 0x6b]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x34, 0x31, 0x36, 0x2d]}}}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x78, 0x38, 0x33]}}, {@gid}, {@gid}, {@huge_advise}, {@huge_always}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}, {@pcr={'pcr', 0x3d, 0x33}}]}) 04:49:52 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@uid_eq}]}) 04:49:52 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cd, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x95, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:52 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:52 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x31}}]}) 04:49:52 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r2 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r2, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000980)='9p\x00', 0x0, r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000940)={'gre0\x00', &(0x7f0000000800)={'gretap0\x00', 0x0, 0x0, 0x40, 0x1000, 0xfffff000, {{0x3c, 0x4, 0x1, 0x1b, 0xf0, 0x68, 0x0, 0x1, 0x6, 0x0, @rand_addr=0x64010100, @multicast1, {[@timestamp_prespec={0x44, 0x2c, 0xf, 0x3, 0xc, [{@loopback, 0xc4}, {@private=0xa010102, 0x8}, {@empty, 0x1}, {@loopback}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @lsrr={0x83, 0x7, 0x43, [@remote]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x2e, 0x1, 0x7, [{@empty, 0xebe}, {@empty, 0x9507}, {@multicast2, 0x10000}, {@local, 0x9}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x101}]}, @cipso={0x86, 0x54, 0x2, [{0x6, 0xe, "23922ad9317e91c612c5ef46"}, {0x0, 0x11, "fb5f6be0e16f1d561cb747140c84fb"}, {0x0, 0x10, "49a9e6389d3a274edf455f5930cc"}, {0x0, 0xe, "e2f73f9e940e4971f2079657"}, {0x0, 0x11, "11a0ab3d6f59cc64cbeadc24412d39"}]}, @ssrr={0x89, 0x23, 0xba, [@loopback, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x19}, @rand_addr=0x64010102, @multicast1, @broadcast, @rand_addr=0x64010101]}]}}}}}) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='system_u:object_r:crond_var_run_t:s0\x00', 0x25, 0x2) setxattr$trusted_overlay_upper(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0), &(0x7f0000000700)={0x0, 0xfb, 0xcb, 0x5, 0x5, "ad88009c8a85c44035f1cfb1ad545eac", "7d1aa0783e13ae39a288cfcff09f85118e970409dacc422ac507f76756bd26738986fdd53614aa7a6855df757aae0b44038f1eb1dcea7f6ac9970f23d8125d17f77ba928e11f9be2dc768e3cd8e7938a7ec71b5354864ac403d77e6702712ee2676fefdff25a8ae96249bfce037291b80c11773c6a73c31b4e4cfa474bf3e1d113c63066d791881658004e9a0f3cd4409df8c1dad8383a66ebdf66ae9d2ca27ae47149532957ec14371258f4ecd8af3f60d703aeee6b"}, 0xcb, 0x2) 04:49:52 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ce, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:52 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3156.464646][T16135] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3156.526381][T16144] FAULT_INJECTION: forcing a failure. [ 3156.526381][T16144] name failslab, interval 1, probability 0, space 0, times 0 [ 3156.539132][T16144] CPU: 0 PID: 16144 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3156.548944][T16144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3156.559040][T16144] Call Trace: [ 3156.562314][T16144] dump_stack+0x137/0x19d [ 3156.566742][T16144] should_fail+0x23c/0x250 [ 3156.571186][T16144] ? __se_sys_memfd_create+0xfb/0x390 04:49:52 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:52 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 04:49:52 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cf, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:52 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r2 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r2, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000980)='9p\x00', 0x0, r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000940)={'gre0\x00', &(0x7f0000000800)={'gretap0\x00', 0x0, 0x0, 0x40, 0x1000, 0xfffff000, {{0x3c, 0x4, 0x1, 0x1b, 0xf0, 0x68, 0x0, 0x1, 0x6, 0x0, @rand_addr=0x64010100, @multicast1, {[@timestamp_prespec={0x44, 0x2c, 0xf, 0x3, 0xc, [{@loopback, 0xc4}, {@private=0xa010102, 0x8}, {@empty, 0x1}, {@loopback}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @lsrr={0x83, 0x7, 0x43, [@remote]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x2e, 0x1, 0x7, [{@empty, 0xebe}, {@empty, 0x9507}, {@multicast2, 0x10000}, {@local, 0x9}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x101}]}, @cipso={0x86, 0x54, 0x2, [{0x6, 0xe, "23922ad9317e91c612c5ef46"}, {0x0, 0x11, "fb5f6be0e16f1d561cb747140c84fb"}, {0x0, 0x10, "49a9e6389d3a274edf455f5930cc"}, {0x0, 0xe, "e2f73f9e940e4971f2079657"}, {0x0, 0x11, "11a0ab3d6f59cc64cbeadc24412d39"}]}, @ssrr={0x89, 0x23, 0xba, [@loopback, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x19}, @rand_addr=0x64010102, @multicast1, @broadcast, @rand_addr=0x64010101]}]}}}}}) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='system_u:object_r:crond_var_run_t:s0\x00', 0x25, 0x2) setxattr$trusted_overlay_upper(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0), &(0x7f0000000700)={0x0, 0xfb, 0xcb, 0x5, 0x5, "ad88009c8a85c44035f1cfb1ad545eac", "7d1aa0783e13ae39a288cfcff09f85118e970409dacc422ac507f76756bd26738986fdd53614aa7a6855df757aae0b44038f1eb1dcea7f6ac9970f23d8125d17f77ba928e11f9be2dc768e3cd8e7938a7ec71b5354864ac403d77e6702712ee2676fefdff25a8ae96249bfce037291b80c11773c6a73c31b4e4cfa474bf3e1d113c63066d791881658004e9a0f3cd4409df8c1dad8383a66ebdf66ae9d2ca27ae47149532957ec14371258f4ecd8af3f60d703aeee6b"}, 0xcb, 0x2) [ 3156.576852][T16144] __should_failslab+0x81/0x90 [ 3156.581647][T16144] should_failslab+0x5/0x20 [ 3156.586151][T16144] __kmalloc+0x66/0x340 [ 3156.590304][T16144] ? strnlen_user+0x137/0x1c0 [ 3156.594974][T16144] __se_sys_memfd_create+0xfb/0x390 [ 3156.600182][T16144] __x64_sys_memfd_create+0x2d/0x40 [ 3156.605384][T16144] do_syscall_64+0x4a/0x90 [ 3156.609831][T16144] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3156.615739][T16144] RIP: 0033:0x4665f9 04:49:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3156.619630][T16144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3156.639247][T16144] RSP: 002b:00007fce478a1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3156.647659][T16144] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 00000000004665f9 [ 3156.655625][T16144] RDX: 000000000000000e RSI: 0000000000000000 RDI: 00000000004bee8e [ 3156.663618][T16144] RBP: 0000000000000007 R08: 0000000000000007 R09: ffffffffffffffff 04:49:52 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) [ 3156.671731][T16144] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 3156.679796][T16144] R13: 0000000020000180 R14: 000000000000e590 R15: 0000000020000d40 04:49:52 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:52 executing program 0: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3156.735475][T16163] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:49:52 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:52 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r2 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r2, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000980)='9p\x00', 0x0, r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000940)={'gre0\x00', &(0x7f0000000800)={'gretap0\x00', 0x0, 0x0, 0x40, 0x1000, 0xfffff000, {{0x3c, 0x4, 0x1, 0x1b, 0xf0, 0x68, 0x0, 0x1, 0x6, 0x0, @rand_addr=0x64010100, @multicast1, {[@timestamp_prespec={0x44, 0x2c, 0xf, 0x3, 0xc, [{@loopback, 0xc4}, {@private=0xa010102, 0x8}, {@empty, 0x1}, {@loopback}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @lsrr={0x83, 0x7, 0x43, [@remote]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x2e, 0x1, 0x7, [{@empty, 0xebe}, {@empty, 0x9507}, {@multicast2, 0x10000}, {@local, 0x9}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x101}]}, @cipso={0x86, 0x54, 0x2, [{0x6, 0xe, "23922ad9317e91c612c5ef46"}, {0x0, 0x11, "fb5f6be0e16f1d561cb747140c84fb"}, {0x0, 0x10, "49a9e6389d3a274edf455f5930cc"}, {0x0, 0xe, "e2f73f9e940e4971f2079657"}, {0x0, 0x11, "11a0ab3d6f59cc64cbeadc24412d39"}]}, @ssrr={0x89, 0x23, 0xba, [@loopback, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x19}, @rand_addr=0x64010102, @multicast1, @broadcast, @rand_addr=0x64010101]}]}}}}}) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='system_u:object_r:crond_var_run_t:s0\x00', 0x25, 0x2) setxattr$trusted_overlay_upper(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0), &(0x7f0000000700)={0x0, 0xfb, 0xcb, 0x5, 0x5, "ad88009c8a85c44035f1cfb1ad545eac", "7d1aa0783e13ae39a288cfcff09f85118e970409dacc422ac507f76756bd26738986fdd53614aa7a6855df757aae0b44038f1eb1dcea7f6ac9970f23d8125d17f77ba928e11f9be2dc768e3cd8e7938a7ec71b5354864ac403d77e6702712ee2676fefdff25a8ae96249bfce037291b80c11773c6a73c31b4e4cfa474bf3e1d113c63066d791881658004e9a0f3cd4409df8c1dad8383a66ebdf66ae9d2ca27ae47149532957ec14371258f4ecd8af3f60d703aeee6b"}, 0xcb, 0x2) 04:49:52 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_appraise}]}) 04:49:52 executing program 0: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) [ 3156.866137][T16183] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3156.876622][T16187] FAULT_INJECTION: forcing a failure. [ 3156.876622][T16187] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3156.889694][T16187] CPU: 1 PID: 16187 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3156.899598][T16187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3156.909682][T16187] Call Trace: [ 3156.912979][T16187] dump_stack+0x137/0x19d [ 3156.917315][T16187] should_fail+0x23c/0x250 [ 3156.921733][T16187] should_fail_usercopy+0x16/0x20 [ 3156.926765][T16187] _copy_from_user+0x1c/0xd0 [ 3156.931363][T16187] __se_sys_memfd_create+0x137/0x390 [ 3156.936698][T16187] __x64_sys_memfd_create+0x2d/0x40 [ 3156.941899][T16187] do_syscall_64+0x4a/0x90 [ 3156.946320][T16187] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3156.952222][T16187] RIP: 0033:0x4665f9 04:49:52 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}]}) 04:49:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:52 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:52 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r2 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r2, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000980)='9p\x00', 0x0, r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000940)={'gre0\x00', &(0x7f0000000800)={'gretap0\x00', 0x0, 0x0, 0x40, 0x1000, 0xfffff000, {{0x3c, 0x4, 0x1, 0x1b, 0xf0, 0x68, 0x0, 0x1, 0x6, 0x0, @rand_addr=0x64010100, @multicast1, {[@timestamp_prespec={0x44, 0x2c, 0xf, 0x3, 0xc, [{@loopback, 0xc4}, {@private=0xa010102, 0x8}, {@empty, 0x1}, {@loopback}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @lsrr={0x83, 0x7, 0x43, [@remote]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x2e, 0x1, 0x7, [{@empty, 0xebe}, {@empty, 0x9507}, {@multicast2, 0x10000}, {@local, 0x9}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x101}]}, @cipso={0x86, 0x54, 0x2, [{0x6, 0xe, "23922ad9317e91c612c5ef46"}, {0x0, 0x11, "fb5f6be0e16f1d561cb747140c84fb"}, {0x0, 0x10, "49a9e6389d3a274edf455f5930cc"}, {0x0, 0xe, "e2f73f9e940e4971f2079657"}, {0x0, 0x11, "11a0ab3d6f59cc64cbeadc24412d39"}]}, @ssrr={0x89, 0x23, 0xba, [@loopback, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x19}, @rand_addr=0x64010102, @multicast1, @broadcast, @rand_addr=0x64010101]}]}}}}}) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='system_u:object_r:crond_var_run_t:s0\x00', 0x25, 0x2) [ 3156.956111][T16187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3156.975935][T16187] RSP: 002b:00007fce478a1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3156.984349][T16187] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 00000000004665f9 [ 3156.992370][T16187] RDX: 000000000000000e RSI: 0000000000000000 RDI: 00000000004bee8e [ 3157.000537][T16187] RBP: 0000000000000007 R08: 0000000000000007 R09: ffffffffffffffff [ 3157.008517][T16187] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 04:49:52 executing program 0: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:52 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:52 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) [ 3157.016491][T16187] R13: 0000000020000180 R14: 000000000000e590 R15: 0000000020000d40 04:49:52 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3157.095664][T16207] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:49:52 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:52 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:52 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r2 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r2, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000980)='9p\x00', 0x0, r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000940)={'gre0\x00', &(0x7f0000000800)={'gretap0\x00', 0x0, 0x0, 0x40, 0x1000, 0xfffff000, {{0x3c, 0x4, 0x1, 0x1b, 0xf0, 0x68, 0x0, 0x1, 0x6, 0x0, @rand_addr=0x64010100, @multicast1, {[@timestamp_prespec={0x44, 0x2c, 0xf, 0x3, 0xc, [{@loopback, 0xc4}, {@private=0xa010102, 0x8}, {@empty, 0x1}, {@loopback}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @lsrr={0x83, 0x7, 0x43, [@remote]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x2e, 0x1, 0x7, [{@empty, 0xebe}, {@empty, 0x9507}, {@multicast2, 0x10000}, {@local, 0x9}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x101}]}, @cipso={0x86, 0x54, 0x2, [{0x6, 0xe, "23922ad9317e91c612c5ef46"}, {0x0, 0x11, "fb5f6be0e16f1d561cb747140c84fb"}, {0x0, 0x10, "49a9e6389d3a274edf455f5930cc"}, {0x0, 0xe, "e2f73f9e940e4971f2079657"}, {0x0, 0x11, "11a0ab3d6f59cc64cbeadc24412d39"}]}, @ssrr={0x89, 0x23, 0xba, [@loopback, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x19}, @rand_addr=0x64010102, @multicast1, @broadcast, @rand_addr=0x64010101]}]}}}}}) 04:49:52 executing program 5 (fault-call:2 fault-nth:0): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:52 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) [ 3157.231131][T16233] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3157.243321][T16234] FAULT_INJECTION: forcing a failure. [ 3157.243321][T16234] name failslab, interval 1, probability 0, space 0, times 0 [ 3157.243388][T16232] FAULT_INJECTION: forcing a failure. [ 3157.243388][T16232] name failslab, interval 1, probability 0, space 0, times 0 [ 3157.255964][T16234] CPU: 0 PID: 16234 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3157.278651][T16234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3157.288703][T16234] Call Trace: [ 3157.292003][T16234] dump_stack+0x137/0x19d [ 3157.296347][T16234] should_fail+0x23c/0x250 [ 3157.300817][T16234] ? shmem_alloc_inode+0x22/0x30 [ 3157.305774][T16234] __should_failslab+0x81/0x90 [ 3157.310534][T16234] ? shmem_match+0xa0/0xa0 [ 3157.314944][T16234] should_failslab+0x5/0x20 [ 3157.319487][T16234] kmem_cache_alloc+0x46/0x2f0 [ 3157.324261][T16234] ? do_anonymous_page+0x411/0x8b0 [ 3157.329382][T16234] ? fsnotify_perm+0x59/0x2e0 [ 3157.334114][T16234] ? shmem_match+0xa0/0xa0 [ 3157.338530][T16234] shmem_alloc_inode+0x22/0x30 [ 3157.343292][T16234] new_inode_pseudo+0x38/0x1c0 [ 3157.348126][T16234] new_inode+0x21/0x120 [ 3157.352283][T16234] shmem_get_inode+0xa1/0x480 [ 3157.356957][T16234] __shmem_file_setup+0xf1/0x1d0 [ 3157.361904][T16234] shmem_file_setup+0x37/0x40 [ 3157.366575][T16234] __se_sys_memfd_create+0x1eb/0x390 [ 3157.371870][T16234] __x64_sys_memfd_create+0x2d/0x40 [ 3157.377065][T16234] do_syscall_64+0x4a/0x90 [ 3157.381504][T16234] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3157.387393][T16234] RIP: 0033:0x4665f9 [ 3157.391341][T16234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3157.411027][T16234] RSP: 002b:00007fce478a1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3157.419433][T16234] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 00000000004665f9 [ 3157.427498][T16234] RDX: 000000000000000e RSI: 0000000000000000 RDI: 00000000004bee8e [ 3157.435499][T16234] RBP: 0000000000000007 R08: 0000000000000007 R09: ffffffffffffffff [ 3157.443464][T16234] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 3157.451600][T16234] R13: 0000000020000180 R14: 000000000000e590 R15: 0000000020000d40 [ 3157.459568][T16232] CPU: 1 PID: 16232 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 3157.469392][T16232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3157.479445][T16232] Call Trace: [ 3157.482717][T16232] dump_stack+0x137/0x19d [ 3157.487059][T16232] should_fail+0x23c/0x250 [ 3157.491562][T16232] ? getname_flags+0x84/0x3d0 [ 3157.496241][T16232] __should_failslab+0x81/0x90 [ 3157.501008][T16232] should_failslab+0x5/0x20 [ 3157.505664][T16232] kmem_cache_alloc+0x46/0x2f0 [ 3157.510448][T16232] getname_flags+0x84/0x3d0 [ 3157.514948][T16232] do_mkdirat+0x3b/0x200 [ 3157.519192][T16232] ? ksys_write+0x157/0x180 [ 3157.523711][T16232] __x64_sys_mkdir+0x32/0x40 [ 3157.528304][T16232] do_syscall_64+0x4a/0x90 [ 3157.532738][T16232] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3157.538636][T16232] RIP: 0033:0x465707 [ 3157.542519][T16232] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3157.562121][T16232] RSP: 002b:00007fdf6c666fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3157.570819][T16232] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 04:49:53 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:53 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:53 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r2 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r2, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000980)='9p\x00', 0x0, r0) 04:49:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3157.578807][T16232] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020001380 [ 3157.588081][T16232] RBP: 00007fdf6c667040 R08: 0000000000000000 R09: 0000000000304000 [ 3157.596103][T16232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000180 [ 3157.604070][T16232] R13: 0000000020001380 R14: 00007fdf6c667000 R15: 0000000020001a40 [ 3157.639368][T16251] FAULT_INJECTION: forcing a failure. [ 3157.639368][T16251] name failslab, interval 1, probability 0, space 0, times 0 [ 3157.652051][T16251] CPU: 1 PID: 16251 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3157.661951][T16251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3157.671999][T16251] Call Trace: [ 3157.675276][T16251] dump_stack+0x137/0x19d [ 3157.679655][T16251] should_fail+0x23c/0x250 [ 3157.684162][T16251] ? security_inode_alloc+0x30/0x180 04:49:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:53 executing program 5 (fault-call:2 fault-nth:1): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3157.689460][T16251] __should_failslab+0x81/0x90 [ 3157.694256][T16251] should_failslab+0x5/0x20 [ 3157.698852][T16251] kmem_cache_alloc+0x46/0x2f0 [ 3157.703676][T16251] security_inode_alloc+0x30/0x180 [ 3157.708874][T16251] inode_init_always+0x20b/0x420 [ 3157.713807][T16251] ? shmem_match+0xa0/0xa0 [ 3157.718227][T16251] new_inode_pseudo+0x73/0x1c0 [ 3157.722992][T16251] new_inode+0x21/0x120 [ 3157.727161][T16251] shmem_get_inode+0xa1/0x480 04:49:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3157.729191][T16255] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3157.731914][T16251] __shmem_file_setup+0xf1/0x1d0 [ 3157.731941][T16251] shmem_file_setup+0x37/0x40 [ 3157.731965][T16251] __se_sys_memfd_create+0x1eb/0x390 [ 3157.756962][T16251] __x64_sys_memfd_create+0x2d/0x40 [ 3157.762166][T16251] do_syscall_64+0x4a/0x90 [ 3157.766594][T16251] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3157.772497][T16251] RIP: 0033:0x4665f9 04:49:53 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) 04:49:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) [ 3157.776413][T16251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3157.796080][T16251] RSP: 002b:00007fce478a1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3157.804523][T16251] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 00000000004665f9 [ 3157.812618][T16251] RDX: 000000000000000e RSI: 0000000000000000 RDI: 00000000004bee8e [ 3157.821113][T16251] RBP: 0000000000000007 R08: 0000000000000007 R09: ffffffffffffffff [ 3157.829158][T16251] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 04:49:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) [ 3157.837127][T16251] R13: 0000000020000180 R14: 000000000000e590 R15: 0000000020000d40 04:49:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3157.876834][T16273] FAULT_INJECTION: forcing a failure. [ 3157.876834][T16273] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3157.890049][T16273] CPU: 1 PID: 16273 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 3157.899859][T16273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3157.909915][T16273] Call Trace: [ 3157.913187][T16273] dump_stack+0x137/0x19d [ 3157.917595][T16273] should_fail+0x23c/0x250 [ 3157.922059][T16273] should_fail_usercopy+0x16/0x20 [ 3157.927085][T16273] strncpy_from_user+0x21/0x250 [ 3157.929919][T16278] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3157.931953][T16273] getname_flags+0xb8/0x3d0 [ 3157.931977][T16273] do_mkdirat+0x3b/0x200 [ 3157.950818][T16273] ? ksys_write+0x157/0x180 [ 3157.955326][T16273] __x64_sys_mkdir+0x32/0x40 [ 3157.959929][T16273] do_syscall_64+0x4a/0x90 [ 3157.964349][T16273] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3157.970302][T16273] RIP: 0033:0x465707 [ 3157.979238][T16273] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3157.998850][T16273] RSP: 002b:00007fdf6c666fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3158.007255][T16273] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 3158.015293][T16273] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020001380 [ 3158.023264][T16273] RBP: 00007fdf6c667040 R08: 0000000000000000 R09: 0000000000304000 [ 3158.031230][T16273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000180 [ 3158.039197][T16273] R13: 0000000020001380 R14: 00007fdf6c667000 R15: 0000000020001a40 04:49:53 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:53 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) 04:49:53 executing program 5 (fault-call:2 fault-nth:2): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3158.120131][T16296] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3158.152141][T16305] FAULT_INJECTION: forcing a failure. [ 3158.152141][T16305] name failslab, interval 1, probability 0, space 0, times 0 04:49:53 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) 04:49:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3158.164839][T16305] CPU: 1 PID: 16305 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3158.174648][T16305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3158.184988][T16305] Call Trace: [ 3158.188277][T16305] dump_stack+0x137/0x19d [ 3158.192641][T16305] should_fail+0x23c/0x250 [ 3158.197061][T16305] ? __d_alloc+0x36/0x370 [ 3158.200140][T16304] FAULT_INJECTION: forcing a failure. [ 3158.200140][T16304] name failslab, interval 1, probability 0, space 0, times 0 [ 3158.201406][T16305] __should_failslab+0x81/0x90 [ 3158.201434][T16305] should_failslab+0x5/0x20 [ 3158.223593][T16305] kmem_cache_alloc+0x46/0x2f0 [ 3158.228373][T16305] ? __init_rwsem+0x59/0x70 [ 3158.232869][T16305] __d_alloc+0x36/0x370 [ 3158.237083][T16305] ? current_time+0xdb/0x190 [ 3158.241668][T16305] d_alloc_pseudo+0x1a/0x50 [ 3158.246164][T16305] alloc_file_pseudo+0x63/0x130 [ 3158.251016][T16305] __shmem_file_setup+0x14c/0x1d0 [ 3158.256042][T16305] shmem_file_setup+0x37/0x40 [ 3158.260728][T16305] __se_sys_memfd_create+0x1eb/0x390 [ 3158.266015][T16305] __x64_sys_memfd_create+0x2d/0x40 [ 3158.271220][T16305] do_syscall_64+0x4a/0x90 [ 3158.275731][T16305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3158.281700][T16305] RIP: 0033:0x4665f9 [ 3158.285618][T16305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3158.305398][T16305] RSP: 002b:00007fce478a1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3158.313813][T16305] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 00000000004665f9 [ 3158.321830][T16305] RDX: 000000000000000e RSI: 0000000000000000 RDI: 00000000004bee8e [ 3158.329797][T16305] RBP: 0000000000000007 R08: 0000000000000007 R09: ffffffffffffffff [ 3158.337763][T16305] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 3158.345727][T16305] R13: 0000000020000180 R14: 000000000000e590 R15: 0000000020000d40 [ 3158.353710][T16304] CPU: 0 PID: 16304 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 3158.363522][T16304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3158.373580][T16304] Call Trace: [ 3158.376859][T16304] dump_stack+0x137/0x19d [ 3158.381198][T16304] should_fail+0x23c/0x250 [ 3158.385618][T16304] ? __se_sys_mount+0x4e/0x2e0 [ 3158.390388][T16304] __should_failslab+0x81/0x90 [ 3158.395150][T16304] should_failslab+0x5/0x20 [ 3158.399652][T16304] __kmalloc_track_caller+0x64/0x340 [ 3158.404935][T16304] ? strnlen_user+0x137/0x1c0 [ 3158.409609][T16304] strndup_user+0x73/0x120 [ 3158.414017][T16304] __se_sys_mount+0x4e/0x2e0 [ 3158.418600][T16304] ? do_mkdirat+0x69/0x200 [ 3158.423010][T16304] ? ksys_write+0x157/0x180 [ 3158.427515][T16304] __x64_sys_mount+0x63/0x70 [ 3158.432101][T16304] do_syscall_64+0x4a/0x90 [ 3158.436547][T16304] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3158.442451][T16304] RIP: 0033:0x467b1a [ 3158.446346][T16304] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:49:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:54 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2da, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3158.466653][T16304] RSP: 002b:00007fdf6c666fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3158.475082][T16304] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3158.483062][T16304] RDX: 0000000020000180 RSI: 0000000020001380 RDI: 0000000000000000 [ 3158.491234][T16304] RBP: 00007fdf6c667040 R08: 00007fdf6c667040 R09: 0000000020000180 [ 3158.499209][T16304] R10: 0000000000304000 R11: 0000000000000206 R12: 0000000020000180 [ 3158.507177][T16304] R13: 0000000020001380 R14: 00007fdf6c667000 R15: 0000000020001a40 04:49:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) [ 3158.543134][T16328] FAULT_INJECTION: forcing a failure. [ 3158.543134][T16328] name failslab, interval 1, probability 0, space 0, times 0 [ 3158.555789][T16328] CPU: 0 PID: 16328 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3158.565664][T16328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3158.575725][T16328] Call Trace: [ 3158.579002][T16328] dump_stack+0x137/0x19d [ 3158.583347][T16328] should_fail+0x23c/0x250 [ 3158.586309][T16331] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3158.587764][T16328] ? __alloc_file+0x2e/0x1a0 [ 3158.587789][T16328] __should_failslab+0x81/0x90 [ 3158.607169][T16328] should_failslab+0x5/0x20 [ 3158.611675][T16328] kmem_cache_alloc+0x46/0x2f0 [ 3158.616467][T16328] ? inode_doinit_with_dentry+0x382/0x950 [ 3158.622309][T16328] __alloc_file+0x2e/0x1a0 [ 3158.626764][T16328] alloc_empty_file+0xcd/0x1c0 [ 3158.631523][T16328] alloc_file+0x3a/0x280 [ 3158.635761][T16328] alloc_file_pseudo+0xe2/0x130 [ 3158.640604][T16328] __shmem_file_setup+0x14c/0x1d0 [ 3158.645714][T16328] shmem_file_setup+0x37/0x40 [ 3158.650390][T16328] __se_sys_memfd_create+0x1eb/0x390 [ 3158.655734][T16328] __x64_sys_memfd_create+0x2d/0x40 [ 3158.661000][T16328] do_syscall_64+0x4a/0x90 [ 3158.665435][T16328] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3158.671411][T16328] RIP: 0033:0x4665f9 04:49:54 executing program 5 (fault-call:2 fault-nth:3): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:54 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) fsmount(0xffffffffffffffff, 0x0, 0x1) 04:49:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3158.675301][T16328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3158.694911][T16328] RSP: 002b:00007fce478a1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3158.703328][T16328] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 00000000004665f9 [ 3158.711298][T16328] RDX: 000000000000000e RSI: 0000000000000000 RDI: 00000000004bee8e [ 3158.719266][T16328] RBP: 0000000000000007 R08: 0000000000000007 R09: ffffffffffffffff [ 3158.727266][T16328] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 3158.735235][T16328] R13: 0000000020000180 R14: 000000000000e590 R15: 0000000020000d40 04:49:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2db, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3158.790268][T16351] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3158.801538][T16352] FAULT_INJECTION: forcing a failure. [ 3158.801538][T16352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3158.814679][T16352] CPU: 0 PID: 16352 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 3158.824686][T16352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3158.834747][T16352] Call Trace: 04:49:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) [ 3158.838023][T16352] dump_stack+0x137/0x19d [ 3158.842363][T16352] should_fail+0x23c/0x250 [ 3158.846782][T16352] should_fail_usercopy+0x16/0x20 [ 3158.851812][T16352] _copy_from_user+0x1c/0xd0 [ 3158.856410][T16352] strndup_user+0xb0/0x120 [ 3158.860832][T16352] __se_sys_mount+0x4e/0x2e0 [ 3158.865420][T16352] ? do_mkdirat+0x69/0x200 [ 3158.869832][T16352] ? ksys_write+0x157/0x180 [ 3158.874365][T16352] __x64_sys_mount+0x63/0x70 [ 3158.878975][T16352] do_syscall_64+0x4a/0x90 [ 3158.883406][T16352] entry_SYSCALL_64_after_hwframe+0x44/0xae 04:49:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2dc, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3158.889331][T16352] RIP: 0033:0x467b1a [ 3158.893223][T16352] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3158.912831][T16352] RSP: 002b:00007fdf6c666fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3158.921251][T16352] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3158.929223][T16352] RDX: 0000000020000180 RSI: 0000000020001380 RDI: 0000000000000000 [ 3158.937194][T16352] RBP: 00007fdf6c667040 R08: 00007fdf6c667040 R09: 0000000020000180 [ 3158.945170][T16352] R10: 0000000000304000 R11: 0000000000000206 R12: 0000000020000180 [ 3158.953147][T16352] R13: 0000000020001380 R14: 00007fdf6c667000 R15: 0000000020001a40 04:49:54 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:54 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) 04:49:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2dd, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:54 executing program 5 (fault-call:2 fault-nth:4): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3159.066739][T16385] FAULT_INJECTION: forcing a failure. [ 3159.066739][T16385] name failslab, interval 1, probability 0, space 0, times 0 [ 3159.073645][T16380] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3159.079496][T16385] CPU: 1 PID: 16385 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3159.099536][T16385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3159.109607][T16385] Call Trace: [ 3159.112956][T16385] dump_stack+0x137/0x19d [ 3159.117328][T16385] should_fail+0x23c/0x250 [ 3159.121748][T16385] ? security_file_alloc+0x30/0x190 [ 3159.126950][T16385] __should_failslab+0x81/0x90 [ 3159.131717][T16385] should_failslab+0x5/0x20 [ 3159.136317][T16385] kmem_cache_alloc+0x46/0x2f0 [ 3159.141163][T16385] security_file_alloc+0x30/0x190 [ 3159.146329][T16385] __alloc_file+0x83/0x1a0 [ 3159.150741][T16385] alloc_empty_file+0xcd/0x1c0 [ 3159.155506][T16385] alloc_file+0x3a/0x280 [ 3159.159777][T16385] alloc_file_pseudo+0xe2/0x130 [ 3159.164694][T16385] __shmem_file_setup+0x14c/0x1d0 [ 3159.169718][T16385] shmem_file_setup+0x37/0x40 [ 3159.174492][T16385] __se_sys_memfd_create+0x1eb/0x390 [ 3159.178854][T16383] FAULT_INJECTION: forcing a failure. [ 3159.178854][T16383] name failslab, interval 1, probability 0, space 0, times 0 [ 3159.179783][T16385] __x64_sys_memfd_create+0x2d/0x40 [ 3159.197556][T16385] do_syscall_64+0x4a/0x90 [ 3159.202040][T16385] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3159.207958][T16385] RIP: 0033:0x4665f9 [ 3159.211874][T16385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3159.231621][T16385] RSP: 002b:00007fce478a1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3159.240192][T16385] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 00000000004665f9 [ 3159.248170][T16385] RDX: 000000000000000e RSI: 0000000000000000 RDI: 00000000004bee8e [ 3159.256146][T16385] RBP: 0000000000000007 R08: 0000000000000007 R09: ffffffffffffffff 04:49:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:54 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) 04:49:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2de, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:54 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3159.264218][T16385] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 3159.272193][T16385] R13: 0000000020000180 R14: 000000000000e590 R15: 0000000020000d40 [ 3159.280175][T16383] CPU: 0 PID: 16383 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 3159.289988][T16383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3159.300040][T16383] Call Trace: [ 3159.303343][T16383] dump_stack+0x137/0x19d [ 3159.307682][T16383] should_fail+0x23c/0x250 [ 3159.312135][T16383] __should_failslab+0x81/0x90 04:49:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2df, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3159.316926][T16383] ? __se_sys_mount+0xf2/0x2e0 [ 3159.321719][T16383] should_failslab+0x5/0x20 [ 3159.326228][T16383] kmem_cache_alloc_trace+0x49/0x310 [ 3159.331524][T16383] ? _copy_from_user+0x94/0xd0 [ 3159.336314][T16383] __se_sys_mount+0xf2/0x2e0 [ 3159.340898][T16383] ? do_mkdirat+0x69/0x200 [ 3159.345331][T16383] ? ksys_write+0x157/0x180 [ 3159.349859][T16383] __x64_sys_mount+0x63/0x70 [ 3159.354461][T16383] do_syscall_64+0x4a/0x90 [ 3159.358430][T16396] FAULT_INJECTION: forcing a failure. [ 3159.358430][T16396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3159.358974][T16383] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3159.359003][T16383] RIP: 0033:0x467b1a [ 3159.359015][T16383] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3159.359030][T16383] RSP: 002b:00007fdf6c666fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3159.359048][T16383] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3159.417903][T16383] RDX: 0000000020000180 RSI: 0000000020001380 RDI: 0000000000000000 [ 3159.425874][T16383] RBP: 00007fdf6c667040 R08: 00007fdf6c667040 R09: 0000000020000180 [ 3159.433855][T16383] R10: 0000000000304000 R11: 0000000000000206 R12: 0000000020000180 [ 3159.441822][T16383] R13: 0000000020001380 R14: 00007fdf6c667000 R15: 0000000020001a40 [ 3159.449801][T16396] CPU: 1 PID: 16396 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 04:49:55 executing program 5 (fault-call:2 fault-nth:5): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3159.459614][T16396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3159.469684][T16396] Call Trace: [ 3159.472982][T16396] dump_stack+0x137/0x19d [ 3159.477319][T16396] should_fail+0x23c/0x250 [ 3159.481767][T16396] __alloc_pages+0xe7/0x310 [ 3159.486271][T16396] alloc_pages_vma+0x3c3/0x5e0 [ 3159.491043][T16396] shmem_getpage_gfp+0x980/0x1410 [ 3159.496069][T16396] ? mls_context_isvalid+0x76/0x1e0 [ 3159.501269][T16396] shmem_write_begin+0x7e/0x100 [ 3159.506123][T16396] generic_perform_write+0x196/0x3a0 [ 3159.511479][T16396] ? file_update_time+0x1bd/0x3e0 [ 3159.516507][T16396] __generic_file_write_iter+0x161/0x300 [ 3159.522157][T16396] ? generic_write_checks+0x250/0x290 [ 3159.527509][T16396] generic_file_write_iter+0x75/0x130 [ 3159.532880][T16396] vfs_write+0x69d/0x770 [ 3159.537123][T16396] __x64_sys_pwrite64+0xf5/0x150 [ 3159.542055][T16396] do_syscall_64+0x4a/0x90 [ 3159.546517][T16396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3159.552395][T16396] RIP: 0033:0x419797 [ 3159.556286][T16396] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3159.575891][T16396] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3159.584333][T16396] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3159.592303][T16396] RDX: 0000000000000061 RSI: 00000000200001c0 RDI: 0000000000000004 [ 3159.600690][T16396] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3159.608667][T16396] R10: 0000000000000008 R11: 0000000000000293 R12: 0000000000000004 04:49:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3159.616772][T16396] R13: 0000000000000004 R14: 0000000020000680 R15: 0000000000000000 04:49:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3159.674393][T16408] FAULT_INJECTION: forcing a failure. [ 3159.674393][T16408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3159.679311][T16409] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3159.687599][T16408] CPU: 1 PID: 16408 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 3159.707801][T16408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3159.717857][T16408] Call Trace: 04:49:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3159.721139][T16408] dump_stack+0x137/0x19d [ 3159.725485][T16408] should_fail+0x23c/0x250 [ 3159.729908][T16408] should_fail_usercopy+0x16/0x20 [ 3159.734939][T16408] _copy_from_user+0x1c/0xd0 [ 3159.739545][T16408] __se_sys_mount+0x115/0x2e0 [ 3159.744226][T16408] ? ksys_write+0x157/0x180 [ 3159.748739][T16408] __x64_sys_mount+0x63/0x70 [ 3159.753334][T16408] do_syscall_64+0x4a/0x90 [ 3159.757756][T16408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3159.763659][T16408] RIP: 0033:0x467b1a 04:49:55 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) 04:49:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3159.767549][T16408] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3159.787151][T16408] RSP: 002b:00007fdf6c666fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3159.795584][T16408] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3159.803558][T16408] RDX: 0000000020000180 RSI: 0000000020001380 RDI: 0000000000000000 [ 3159.811534][T16408] RBP: 00007fdf6c667040 R08: 00007fdf6c667040 R09: 0000000020000180 [ 3159.819591][T16408] R10: 0000000000304000 R11: 0000000000000206 R12: 0000000020000180 [ 3159.827563][T16408] R13: 0000000020001380 R14: 00007fdf6c667000 R15: 0000000020001a40 04:49:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3159.865666][T16428] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:49:55 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:55 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) 04:49:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:55 executing program 5 (fault-call:2 fault-nth:6): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3160.040238][T16452] FAULT_INJECTION: forcing a failure. [ 3160.040238][T16452] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3160.053373][T16452] CPU: 0 PID: 16452 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3160.063256][T16452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3160.073320][T16452] Call Trace: [ 3160.075740][T16450] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3160.076612][T16452] dump_stack+0x137/0x19d [ 3160.091054][T16452] should_fail+0x23c/0x250 [ 3160.093144][T16458] FAULT_INJECTION: forcing a failure. [ 3160.093144][T16458] name failslab, interval 1, probability 0, space 0, times 0 [ 3160.095530][T16452] should_fail_usercopy+0x16/0x20 [ 3160.095554][T16452] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3160.119160][T16452] ? shmem_write_begin+0x7e/0x100 [ 3160.124249][T16452] generic_perform_write+0x1e4/0x3a0 [ 3160.129603][T16452] ? file_update_time+0x1bd/0x3e0 [ 3160.134628][T16452] __generic_file_write_iter+0x161/0x300 [ 3160.140265][T16452] ? generic_write_checks+0x250/0x290 [ 3160.145716][T16452] generic_file_write_iter+0x75/0x130 [ 3160.151092][T16452] vfs_write+0x69d/0x770 [ 3160.155363][T16452] __x64_sys_pwrite64+0xf5/0x150 [ 3160.160374][T16452] do_syscall_64+0x4a/0x90 [ 3160.164792][T16452] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3160.170683][T16452] RIP: 0033:0x419797 [ 3160.174592][T16452] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3160.194197][T16452] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3160.202633][T16452] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3160.210706][T16452] RDX: 0000000000000061 RSI: 00000000200001c0 RDI: 0000000000000004 [ 3160.218689][T16452] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3160.226678][T16452] R10: 0000000000000008 R11: 0000000000000293 R12: 0000000000000004 04:49:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3160.234655][T16452] R13: 0000000000000004 R14: 0000000020000680 R15: 0000000000000000 [ 3160.242625][T16458] CPU: 1 PID: 16458 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 3160.252448][T16458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3160.262496][T16458] Call Trace: [ 3160.265774][T16458] dump_stack+0x137/0x19d [ 3160.270112][T16458] should_fail+0x23c/0x250 [ 3160.274526][T16458] ? getname_flags+0x84/0x3d0 [ 3160.279209][T16458] __should_failslab+0x81/0x90 [ 3160.283973][T16458] should_failslab+0x5/0x20 [ 3160.288481][T16458] kmem_cache_alloc+0x46/0x2f0 [ 3160.293250][T16458] getname_flags+0x84/0x3d0 [ 3160.297777][T16458] ? should_fail+0xd6/0x250 [ 3160.302281][T16458] user_path_at_empty+0x28/0x50 [ 3160.307135][T16458] __se_sys_mount+0x209/0x2e0 [ 3160.312163][T16458] ? ksys_write+0x157/0x180 [ 3160.316682][T16458] __x64_sys_mount+0x63/0x70 [ 3160.321279][T16458] do_syscall_64+0x4a/0x90 [ 3160.325721][T16458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3160.331635][T16458] RIP: 0033:0x467b1a 04:49:56 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) [ 3160.335523][T16458] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3160.355160][T16458] RSP: 002b:00007fdf6c666fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3160.363608][T16458] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3160.371588][T16458] RDX: 0000000020000180 RSI: 0000000020001380 RDI: 0000000000000000 [ 3160.379566][T16458] RBP: 00007fdf6c667040 R08: 00007fdf6c667040 R09: 0000000020000180 04:49:56 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3160.387545][T16458] R10: 0000000000304000 R11: 0000000000000206 R12: 0000000020000180 [ 3160.395517][T16458] R13: 0000000020001380 R14: 00007fdf6c667000 R15: 0000000020001a40 04:49:56 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:56 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:56 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3160.464357][T16472] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:49:56 executing program 5 (fault-call:2 fault-nth:7): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3160.535818][T16488] FAULT_INJECTION: forcing a failure. [ 3160.535818][T16488] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3160.548925][T16488] CPU: 1 PID: 16488 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3160.554859][T16491] FAULT_INJECTION: forcing a failure. [ 3160.554859][T16491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3160.558754][T16488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3160.558768][T16488] Call Trace: [ 3160.558776][T16488] dump_stack+0x137/0x19d [ 3160.589384][T16488] should_fail+0x23c/0x250 [ 3160.593809][T16488] should_fail_usercopy+0x16/0x20 [ 3160.598829][T16488] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3160.604912][T16488] ? __get_user_nocheck_1+0x6/0x10 [ 3160.610016][T16488] ? shmem_write_begin+0x7e/0x100 [ 3160.615037][T16488] generic_perform_write+0x1e4/0x3a0 [ 3160.620320][T16488] ? file_update_time+0x1bd/0x3e0 [ 3160.625600][T16488] __generic_file_write_iter+0x161/0x300 [ 3160.631232][T16488] ? generic_write_checks+0x250/0x290 [ 3160.636756][T16488] generic_file_write_iter+0x75/0x130 [ 3160.642206][T16488] vfs_write+0x69d/0x770 [ 3160.646472][T16488] __x64_sys_pwrite64+0xf5/0x150 [ 3160.651416][T16488] do_syscall_64+0x4a/0x90 [ 3160.655831][T16488] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3160.661744][T16488] RIP: 0033:0x419797 [ 3160.665655][T16488] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3160.685317][T16488] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3160.693734][T16488] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3160.701821][T16488] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3160.709796][T16488] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3160.717762][T16488] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3160.725729][T16488] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3160.733754][T16491] CPU: 0 PID: 16491 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 3160.743577][T16491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3160.753644][T16491] Call Trace: [ 3160.756933][T16491] dump_stack+0x137/0x19d [ 3160.761267][T16491] should_fail+0x23c/0x250 [ 3160.765686][T16491] should_fail_usercopy+0x16/0x20 [ 3160.770717][T16491] strncpy_from_user+0x21/0x250 [ 3160.775560][T16491] getname_flags+0xb8/0x3d0 [ 3160.780080][T16491] ? should_fail+0xd6/0x250 [ 3160.784596][T16491] user_path_at_empty+0x28/0x50 [ 3160.789448][T16491] __se_sys_mount+0x209/0x2e0 [ 3160.794130][T16491] ? ksys_write+0x157/0x180 [ 3160.798639][T16491] __x64_sys_mount+0x63/0x70 [ 3160.803225][T16491] do_syscall_64+0x4a/0x90 [ 3160.807727][T16491] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3160.813625][T16491] RIP: 0033:0x467b1a [ 3160.817508][T16491] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:49:56 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) fsmount(0xffffffffffffffff, 0x0, 0x1) 04:49:56 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3160.837120][T16491] RSP: 002b:00007fdf6c666fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3160.845538][T16491] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3160.853512][T16491] RDX: 0000000020000180 RSI: 0000000020001380 RDI: 0000000000000000 [ 3160.861482][T16491] RBP: 00007fdf6c667040 R08: 00007fdf6c667040 R09: 0000000020000180 [ 3160.869452][T16491] R10: 0000000000304000 R11: 0000000000000206 R12: 0000000020000180 [ 3160.877432][T16491] R13: 0000000020001380 R14: 00007fdf6c667000 R15: 0000000020001a40 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:56 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) [ 3160.921387][T16505] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:49:56 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:56 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ea, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3160.962662][T16510] EXT4-fs: 5 callbacks suppressed [ 3160.962675][T16510] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value 04:49:56 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2eb, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3161.022282][T16520] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value [ 3161.044230][T16522] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:49:56 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) 04:49:56 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:56 executing program 5 (fault-call:2 fault-nth:8): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:56 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) [ 3161.091055][T16530] FAULT_INJECTION: forcing a failure. [ 3161.091055][T16530] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3161.104515][T16530] CPU: 0 PID: 16530 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3161.114325][T16530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3161.124460][T16530] Call Trace: [ 3161.127737][T16530] dump_stack+0x137/0x19d [ 3161.132098][T16530] should_fail+0x23c/0x250 [ 3161.136518][T16530] __alloc_pages+0xe7/0x310 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ec, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3161.141033][T16530] alloc_pages_vma+0x3c3/0x5e0 [ 3161.145838][T16530] shmem_getpage_gfp+0x980/0x1410 [ 3161.150896][T16530] shmem_write_begin+0x7e/0x100 [ 3161.155757][T16530] generic_perform_write+0x196/0x3a0 [ 3161.161044][T16530] ? shmem_write_begin+0x100/0x100 [ 3161.166232][T16530] __generic_file_write_iter+0x161/0x300 [ 3161.171926][T16530] ? generic_write_checks+0x250/0x290 [ 3161.177354][T16530] generic_file_write_iter+0x75/0x130 [ 3161.182740][T16530] vfs_write+0x69d/0x770 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ee, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ef, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3161.187078][T16530] __x64_sys_pwrite64+0xf5/0x150 [ 3161.192032][T16530] do_syscall_64+0x4a/0x90 [ 3161.196608][T16530] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3161.202947][T16530] RIP: 0033:0x419797 [ 3161.207010][T16530] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3161.226618][T16530] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3161.235055][T16530] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3161.243046][T16530] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3161.251015][T16530] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3161.260944][T16530] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3161.268937][T16530] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:49:56 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3161.298989][T16553] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3161.314187][T16556] FAULT_INJECTION: forcing a failure. [ 3161.314187][T16556] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3161.327295][T16556] CPU: 0 PID: 16556 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 3161.337100][T16556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3161.339464][T16561] FAULT_INJECTION: forcing a failure. [ 3161.339464][T16561] name failslab, interval 1, probability 0, space 0, times 0 [ 3161.347155][T16556] Call Trace: [ 3161.347166][T16556] dump_stack+0x137/0x19d [ 3161.367294][T16556] should_fail+0x23c/0x250 [ 3161.371769][T16556] should_fail_usercopy+0x16/0x20 [ 3161.376798][T16556] _copy_to_user+0x1c/0x90 [ 3161.381211][T16556] simple_read_from_buffer+0xab/0x120 [ 3161.386676][T16556] proc_fail_nth_read+0xf6/0x140 [ 3161.391655][T16556] ? rw_verify_area+0x136/0x250 [ 3161.396506][T16556] ? proc_fault_inject_write+0x200/0x200 [ 3161.402232][T16556] vfs_read+0x154/0x5d0 [ 3161.406389][T16556] ? __fget_light+0x21b/0x260 [ 3161.411115][T16556] ? __cond_resched+0x11/0x40 [ 3161.415785][T16556] ksys_read+0xce/0x180 [ 3161.419965][T16556] __x64_sys_read+0x3e/0x50 [ 3161.424467][T16556] do_syscall_64+0x4a/0x90 [ 3161.428878][T16556] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3161.434772][T16556] RIP: 0033:0x41937c [ 3161.438653][T16556] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3161.458256][T16556] RSP: 002b:00007fdf6c667170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3161.466687][T16556] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 3161.474722][T16556] RDX: 000000000000000f RSI: 00007fdf6c6671e0 RDI: 0000000000000003 [ 3161.482688][T16556] RBP: 00007fdf6c6671d0 R08: 0000000000000000 R09: 0000000020000180 [ 3161.490654][T16556] R10: 0000000000304000 R11: 0000000000000246 R12: 0000000000000001 [ 3161.498691][T16556] R13: 00007ffd6824c8cf R14: 00007fdf6c667300 R15: 0000000000022000 [ 3161.506661][T16561] CPU: 1 PID: 16561 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3161.516473][T16561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3161.526521][T16561] Call Trace: [ 3161.529798][T16561] dump_stack+0x137/0x19d [ 3161.534128][T16561] should_fail+0x23c/0x250 [ 3161.538672][T16561] ? xas_create+0x3fb/0xb30 [ 3161.543216][T16561] __should_failslab+0x81/0x90 [ 3161.548001][T16561] should_failslab+0x5/0x20 [ 3161.552505][T16561] kmem_cache_alloc+0x46/0x2f0 [ 3161.557265][T16561] xas_create+0x3fb/0xb30 [ 3161.561598][T16561] xas_create_range+0x146/0x360 [ 3161.566453][T16561] shmem_add_to_page_cache+0x3ad/0x650 [ 3161.571932][T16561] shmem_getpage_gfp+0xbdc/0x1410 [ 3161.576957][T16561] shmem_write_begin+0x7e/0x100 [ 3161.581875][T16561] generic_perform_write+0x196/0x3a0 [ 3161.587166][T16561] ? shmem_write_begin+0x100/0x100 [ 3161.592280][T16561] __generic_file_write_iter+0x161/0x300 [ 3161.597910][T16561] ? generic_write_checks+0x250/0x290 [ 3161.603313][T16561] generic_file_write_iter+0x75/0x130 [ 3161.608681][T16561] vfs_write+0x69d/0x770 [ 3161.612929][T16561] __x64_sys_pwrite64+0xf5/0x150 [ 3161.617889][T16561] do_syscall_64+0x4a/0x90 [ 3161.622312][T16561] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3161.628211][T16561] RIP: 0033:0x419797 04:49:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) 04:49:57 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:57 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:57 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) 04:49:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3161.632121][T16561] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3161.651706][T16561] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3161.660117][T16561] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3161.668073][T16561] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3161.676029][T16561] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3161.684082][T16561] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3161.692100][T16561] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:49:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3161.740213][T16586] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value 04:49:57 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x2, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:57 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3161.784030][T16587] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3161.872150][T16603] EXT4-fs (sda1): Unrecognized mount option "nodots" or missing value 04:49:57 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:57 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:49:57 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x1020, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:57 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:57 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3162.015686][T16624] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3162.019947][T16626] FAULT_INJECTION: forcing a failure. [ 3162.019947][T16626] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3162.038883][T16626] CPU: 0 PID: 16626 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3162.048704][T16626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3162.058753][T16626] Call Trace: 04:49:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3162.062026][T16626] dump_stack+0x137/0x19d [ 3162.066351][T16626] should_fail+0x23c/0x250 [ 3162.070772][T16626] should_fail_usercopy+0x16/0x20 [ 3162.075803][T16626] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3162.081868][T16626] ? shmem_write_begin+0x7e/0x100 [ 3162.086919][T16626] generic_perform_write+0x1e4/0x3a0 [ 3162.092215][T16626] ? shmem_write_begin+0x100/0x100 [ 3162.097406][T16626] __generic_file_write_iter+0x161/0x300 [ 3162.103051][T16626] ? generic_write_checks+0x250/0x290 [ 3162.108450][T16626] generic_file_write_iter+0x75/0x130 04:49:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:57 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x2010, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3162.113880][T16626] vfs_write+0x69d/0x770 [ 3162.118199][T16626] __x64_sys_pwrite64+0xf5/0x150 [ 3162.123162][T16626] do_syscall_64+0x4a/0x90 [ 3162.126107][T16627] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3162.127846][T16626] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3162.143261][T16626] RIP: 0033:0x419797 [ 3162.147151][T16626] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3162.167034][T16626] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3162.175446][T16626] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3162.183430][T16626] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3162.191409][T16626] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3162.199374][T16626] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3162.207335][T16626] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:49:58 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}]}) 04:49:58 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:49:58 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3162.389444][T16657] FAULT_INJECTION: forcing a failure. [ 3162.389444][T16657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3162.402702][T16657] CPU: 0 PID: 16657 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3162.412589][T16657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3162.422734][T16657] Call Trace: [ 3162.426116][T16657] dump_stack+0x137/0x19d [ 3162.430461][T16657] should_fail+0x23c/0x250 [ 3162.434878][T16657] __alloc_pages+0xe7/0x310 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fb, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:58 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x2000000, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fc, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3162.439445][T16657] alloc_pages_vma+0x3c3/0x5e0 [ 3162.444209][T16657] shmem_getpage_gfp+0x980/0x1410 [ 3162.449237][T16657] shmem_write_begin+0x7e/0x100 [ 3162.454095][T16657] generic_perform_write+0x196/0x3a0 [ 3162.459414][T16657] ? shmem_write_begin+0x100/0x100 [ 3162.464528][T16657] __generic_file_write_iter+0x161/0x300 [ 3162.470210][T16657] ? generic_write_checks+0x250/0x290 [ 3162.475588][T16657] generic_file_write_iter+0x75/0x130 [ 3162.480969][T16657] vfs_write+0x69d/0x770 [ 3162.485223][T16657] __x64_sys_pwrite64+0xf5/0x150 [ 3162.490160][T16657] do_syscall_64+0x4a/0x90 [ 3162.492145][T16672] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3162.494636][T16657] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3162.510051][T16657] RIP: 0033:0x419797 [ 3162.513956][T16657] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 04:49:58 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3162.533575][T16657] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3162.541992][T16657] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3162.549970][T16657] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3162.558461][T16657] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3162.566425][T16657] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3162.574391][T16657] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fd, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:58 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:49:58 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}]}) [ 3162.587807][T16673] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:49:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fe, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3162.660606][T16689] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3162.670672][T16693] FAULT_INJECTION: forcing a failure. [ 3162.670672][T16693] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3162.683887][T16693] CPU: 0 PID: 16693 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3162.693726][T16693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3162.703786][T16693] Call Trace: 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ff, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3162.707072][T16693] dump_stack+0x137/0x19d [ 3162.711415][T16693] should_fail+0x23c/0x250 [ 3162.715876][T16693] should_fail_usercopy+0x16/0x20 [ 3162.720909][T16693] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3162.726979][T16693] ? shmem_write_begin+0x7e/0x100 [ 3162.732032][T16693] generic_perform_write+0x1e4/0x3a0 [ 3162.737433][T16693] ? shmem_write_begin+0x100/0x100 [ 3162.742591][T16693] __generic_file_write_iter+0x161/0x300 [ 3162.748232][T16693] ? generic_write_checks+0x250/0x290 [ 3162.753628][T16693] generic_file_write_iter+0x75/0x130 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:58 executing program 1: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3162.759014][T16693] vfs_write+0x69d/0x770 [ 3162.763258][T16693] __x64_sys_pwrite64+0xf5/0x150 [ 3162.768189][T16693] do_syscall_64+0x4a/0x90 [ 3162.772627][T16693] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3162.778526][T16693] RIP: 0033:0x419797 [ 3162.782490][T16693] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 04:49:58 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x20100000, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x301, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x302, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3162.795247][T16694] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3162.802106][T16693] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3162.802132][T16693] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3162.828047][T16693] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3162.836021][T16693] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3162.844095][T16693] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3162.852065][T16693] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:49:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}]}) [ 3162.884392][T16707] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:49:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3162.977476][T16721] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:49:58 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:58 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x303, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:58 executing program 1: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:49:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:49:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3163.115846][T16741] FAULT_INJECTION: forcing a failure. [ 3163.115846][T16741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3163.129147][T16741] CPU: 1 PID: 16741 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3163.138964][T16741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3163.149023][T16741] Call Trace: [ 3163.152325][T16741] dump_stack+0x137/0x19d [ 3163.156666][T16741] should_fail+0x23c/0x250 [ 3163.161094][T16741] __alloc_pages+0xe7/0x310 04:49:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) 04:49:58 executing program 1: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:49:58 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x304, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:58 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3163.165608][T16741] alloc_pages_vma+0x3c3/0x5e0 [ 3163.170368][T16741] shmem_getpage_gfp+0x980/0x1410 [ 3163.175428][T16741] shmem_write_begin+0x7e/0x100 [ 3163.180362][T16741] generic_perform_write+0x196/0x3a0 [ 3163.185651][T16741] ? shmem_write_begin+0x100/0x100 [ 3163.190834][T16741] __generic_file_write_iter+0x161/0x300 [ 3163.196520][T16741] ? generic_write_checks+0x250/0x290 [ 3163.201931][T16741] generic_file_write_iter+0x75/0x130 [ 3163.207468][T16741] vfs_write+0x69d/0x770 04:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x305, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3163.211717][T16741] __x64_sys_pwrite64+0xf5/0x150 [ 3163.216664][T16741] do_syscall_64+0x4a/0x90 [ 3163.221091][T16741] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3163.227002][T16741] RIP: 0033:0x419797 [ 3163.230894][T16741] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3163.250501][T16741] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3163.258946][T16741] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3163.266998][T16741] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3163.274967][T16741] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3163.282948][T16741] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3163.290961][T16741] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:49:59 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:59 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:49:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x306, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3163.336580][T16765] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3163.378473][T16765] loop0: detected capacity change from 0 to 3 [ 3163.399552][T16778] FAULT_INJECTION: forcing a failure. [ 3163.399552][T16778] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3163.412717][T16778] CPU: 0 PID: 16778 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3163.420981][T16765] FAT-fs (loop0): invalid media value (0xc5) [ 3163.422589][T16778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3163.422603][T16778] Call Trace: [ 3163.428573][T16765] FAT-fs (loop0): Can't find a valid FAT filesystem [ 3163.438617][T16778] dump_stack+0x137/0x19d [ 3163.438644][T16778] should_fail+0x23c/0x250 [ 3163.457202][T16778] should_fail_usercopy+0x16/0x20 [ 3163.462234][T16778] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3163.468302][T16778] ? shmem_write_begin+0x7e/0x100 [ 3163.473507][T16778] generic_perform_write+0x1e4/0x3a0 04:49:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:59 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3163.478955][T16778] ? shmem_write_begin+0x100/0x100 [ 3163.484125][T16778] __generic_file_write_iter+0x161/0x300 [ 3163.489770][T16778] ? generic_write_checks+0x250/0x290 [ 3163.495182][T16778] generic_file_write_iter+0x75/0x130 [ 3163.500554][T16778] vfs_write+0x69d/0x770 [ 3163.504860][T16778] __x64_sys_pwrite64+0xf5/0x150 [ 3163.509792][T16778] do_syscall_64+0x4a/0x90 [ 3163.514256][T16778] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3163.520194][T16778] RIP: 0033:0x419797 [ 3163.524515][T16778] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3163.544128][T16778] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3163.552527][T16778] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3163.560480][T16778] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3163.568438][T16778] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3163.576396][T16778] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3163.584477][T16778] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:49:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) 04:49:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:59 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:49:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x308, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:49:59 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x309, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3163.718558][T16810] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3163.730392][T16810] loop0: detected capacity change from 0 to 3 [ 3163.740887][T16810] FAT-fs (loop0): invalid media value (0xc5) [ 3163.746930][T16810] FAT-fs (loop0): Can't find a valid FAT filesystem 04:49:59 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x0, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:59 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:49:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) 04:49:59 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3163.879928][T16831] FAULT_INJECTION: forcing a failure. [ 3163.879928][T16831] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3163.893214][T16831] CPU: 1 PID: 16831 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3163.903018][T16831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3163.913076][T16831] Call Trace: [ 3163.916365][T16831] dump_stack+0x137/0x19d [ 3163.920699][T16831] should_fail+0x23c/0x250 [ 3163.925113][T16831] __alloc_pages+0xe7/0x310 04:49:59 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:49:59 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3163.929619][T16831] alloc_pages_vma+0x3c3/0x5e0 [ 3163.934437][T16831] shmem_getpage_gfp+0x980/0x1410 [ 3163.939467][T16831] shmem_write_begin+0x7e/0x100 [ 3163.944369][T16831] generic_perform_write+0x196/0x3a0 [ 3163.949660][T16831] ? shmem_write_begin+0x100/0x100 [ 3163.954778][T16831] __generic_file_write_iter+0x161/0x300 [ 3163.960421][T16831] ? generic_write_checks+0x250/0x290 [ 3163.965859][T16831] generic_file_write_iter+0x75/0x130 [ 3163.971243][T16831] vfs_write+0x69d/0x770 [ 3163.975495][T16831] __x64_sys_pwrite64+0xf5/0x150 04:49:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3163.980429][T16831] do_syscall_64+0x4a/0x90 [ 3163.984875][T16831] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3163.990768][T16831] RIP: 0033:0x419797 [ 3163.994657][T16831] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3164.014375][T16831] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3164.022820][T16831] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:49:59 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:49:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3164.030826][T16831] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3164.038804][T16831] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3164.046802][T16831] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3164.054809][T16831] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3164.063009][T16835] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:49:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x0, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:49:59 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:49:59 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3164.097516][T16849] loop0: detected capacity change from 0 to 3 [ 3164.118505][T16849] FAT-fs (loop0): invalid media value (0xc5) [ 3164.124564][T16849] FAT-fs (loop0): Can't find a valid FAT filesystem 04:49:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3164.162383][T16868] FAULT_INJECTION: forcing a failure. [ 3164.162383][T16868] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3164.175482][T16868] CPU: 0 PID: 16868 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3164.185321][T16868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3164.195378][T16868] Call Trace: [ 3164.198648][T16868] dump_stack+0x137/0x19d [ 3164.202991][T16868] should_fail+0x23c/0x250 [ 3164.207388][T16868] should_fail_usercopy+0x16/0x20 [ 3164.212390][T16868] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3164.218436][T16868] ? shmem_write_begin+0x7e/0x100 [ 3164.223442][T16868] generic_perform_write+0x1e4/0x3a0 [ 3164.228714][T16868] ? shmem_write_begin+0x100/0x100 [ 3164.233863][T16868] __generic_file_write_iter+0x161/0x300 [ 3164.239480][T16868] ? generic_write_checks+0x250/0x290 [ 3164.244921][T16868] generic_file_write_iter+0x75/0x130 [ 3164.250333][T16868] vfs_write+0x69d/0x770 [ 3164.254599][T16868] __x64_sys_pwrite64+0xf5/0x150 [ 3164.259523][T16868] do_syscall_64+0x4a/0x90 [ 3164.263944][T16868] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3164.269846][T16868] RIP: 0033:0x419797 [ 3164.273752][T16868] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3164.293793][T16868] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3164.302229][T16868] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) 04:50:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x0, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:00 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3164.310188][T16868] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3164.318162][T16868] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3164.326188][T16868] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3164.334151][T16868] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:00 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x0, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:00 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3164.433409][T16883] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:00 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:00 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) 04:50:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x0, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x310, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:00 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:00 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3164.664425][T16915] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3164.694264][T16923] FAULT_INJECTION: forcing a failure. [ 3164.694264][T16923] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3164.707539][T16923] CPU: 0 PID: 16923 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3164.717357][T16923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3164.727455][T16923] Call Trace: [ 3164.730747][T16923] dump_stack+0x137/0x19d [ 3164.735079][T16923] should_fail+0x23c/0x250 [ 3164.739498][T16923] __alloc_pages+0xe7/0x310 [ 3164.743999][T16923] alloc_pages_vma+0x3c3/0x5e0 [ 3164.748758][T16923] shmem_getpage_gfp+0x980/0x1410 [ 3164.753788][T16923] shmem_write_begin+0x7e/0x100 [ 3164.758669][T16923] generic_perform_write+0x196/0x3a0 04:50:00 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x311, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3164.763973][T16923] ? shmem_write_begin+0x100/0x100 [ 3164.769106][T16923] __generic_file_write_iter+0x161/0x300 [ 3164.774793][T16923] ? generic_write_checks+0x250/0x290 [ 3164.780167][T16923] generic_file_write_iter+0x75/0x130 [ 3164.785547][T16923] vfs_write+0x69d/0x770 [ 3164.789798][T16923] __x64_sys_pwrite64+0xf5/0x150 [ 3164.794820][T16923] do_syscall_64+0x4a/0x90 [ 3164.799237][T16923] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3164.805133][T16923] RIP: 0033:0x419797 04:50:00 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3164.809024][T16923] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3164.828704][T16923] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3164.837195][T16923] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3164.845168][T16923] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3164.853136][T16923] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff 04:50:00 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x312, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:00 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3164.861099][T16923] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3164.869088][T16923] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x0, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3164.932204][T16946] FAULT_INJECTION: forcing a failure. [ 3164.932204][T16946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3164.945311][T16946] CPU: 0 PID: 16946 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3164.952164][T16947] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3164.955128][T16946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3164.975252][T16946] Call Trace: 04:50:00 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:00 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3164.978592][T16946] dump_stack+0x137/0x19d [ 3164.982927][T16946] should_fail+0x23c/0x250 [ 3164.987350][T16946] should_fail_usercopy+0x16/0x20 [ 3164.992406][T16946] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3164.998585][T16946] ? shmem_write_begin+0x7e/0x100 [ 3165.003694][T16946] generic_perform_write+0x1e4/0x3a0 [ 3165.009091][T16946] ? shmem_write_begin+0x100/0x100 [ 3165.014208][T16946] __generic_file_write_iter+0x161/0x300 [ 3165.019841][T16946] ? generic_write_checks+0x250/0x290 [ 3165.025500][T16946] generic_file_write_iter+0x75/0x130 [ 3165.030883][T16946] vfs_write+0x69d/0x770 [ 3165.035186][T16946] __x64_sys_pwrite64+0xf5/0x150 [ 3165.040126][T16946] do_syscall_64+0x4a/0x90 [ 3165.044552][T16946] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3165.050513][T16946] RIP: 0033:0x419797 [ 3165.054418][T16946] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 04:50:00 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3165.058234][T16958] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3165.074041][T16946] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3165.074064][T16946] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3165.074076][T16946] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3165.074088][T16946] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3165.074099][T16946] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3165.074110][T16946] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x313, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:00 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3165.200634][T16967] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x314, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:01 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:01 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, 0x0, &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x315, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:01 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x2, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3165.442869][T17003] FAULT_INJECTION: forcing a failure. [ 3165.442869][T17003] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3165.456133][T17003] CPU: 0 PID: 17003 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3165.465941][T17003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3165.476031][T17003] Call Trace: [ 3165.479319][T17003] dump_stack+0x137/0x19d [ 3165.483650][T17003] should_fail+0x23c/0x250 [ 3165.488152][T17003] __alloc_pages+0xe7/0x310 04:50:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:01 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, 0x0, &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:01 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x1020, 0x0, 0x304000, &(0x7f0000001a40)) [ 3165.492688][T17003] alloc_pages_vma+0x3c3/0x5e0 [ 3165.499990][T17003] shmem_getpage_gfp+0x980/0x1410 [ 3165.505046][T17003] shmem_write_begin+0x7e/0x100 [ 3165.509935][T17003] generic_perform_write+0x196/0x3a0 [ 3165.515259][T17003] ? shmem_write_begin+0x100/0x100 [ 3165.520445][T17003] __generic_file_write_iter+0x161/0x300 [ 3165.526145][T17003] ? generic_write_checks+0x250/0x290 [ 3165.531513][T17003] generic_file_write_iter+0x75/0x130 [ 3165.536893][T17003] vfs_write+0x69d/0x770 04:50:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x316, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3165.541139][T17003] __x64_sys_pwrite64+0xf5/0x150 [ 3165.546077][T17003] do_syscall_64+0x4a/0x90 [ 3165.550500][T17003] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3165.556411][T17003] RIP: 0033:0x419797 [ 3165.560306][T17003] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3165.579996][T17003] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3165.588442][T17003] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3165.596400][T17003] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3165.604505][T17003] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3165.612523][T17003] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3165.620540][T17003] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:01 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:01 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, 0x0, &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x318, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3165.642001][T17012] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:01 executing program 0: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:01 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x2010, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:01 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3165.736393][T17032] FAULT_INJECTION: forcing a failure. [ 3165.736393][T17032] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3165.749558][T17032] CPU: 0 PID: 17032 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3165.759375][T17032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3165.769431][T17032] Call Trace: [ 3165.772712][T17032] dump_stack+0x137/0x19d [ 3165.777055][T17032] should_fail+0x23c/0x250 [ 3165.781476][T17032] should_fail_usercopy+0x16/0x20 04:50:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x319, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3165.786499][T17032] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3165.792574][T17032] ? shmem_write_begin+0x7e/0x100 [ 3165.797701][T17032] generic_perform_write+0x1e4/0x3a0 [ 3165.803009][T17032] ? shmem_write_begin+0x100/0x100 [ 3165.808127][T17032] __generic_file_write_iter+0x161/0x300 [ 3165.813775][T17032] ? generic_write_checks+0x250/0x290 [ 3165.819150][T17032] generic_file_write_iter+0x75/0x130 [ 3165.824532][T17032] vfs_write+0x69d/0x770 [ 3165.828785][T17032] __x64_sys_pwrite64+0xf5/0x150 04:50:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:01 executing program 0: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3165.833725][T17032] do_syscall_64+0x4a/0x90 [ 3165.838208][T17032] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3165.844165][T17032] RIP: 0033:0x419797 [ 3165.848050][T17032] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3165.867737][T17032] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3165.876153][T17032] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:01 executing program 0: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3165.884136][T17032] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3165.892123][T17032] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3165.900168][T17032] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3165.908224][T17032] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3165.985779][T17058] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3166.031825][T17065] EXT4-fs: 15 callbacks suppressed [ 3166.031839][T17065] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:50:01 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:01 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x1000000, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:01 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:01 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3166.181708][T17086] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3166.190292][T17087] FAULT_INJECTION: forcing a failure. [ 3166.190292][T17087] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3166.204523][T17087] CPU: 0 PID: 17087 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3166.214360][T17087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3166.224440][T17087] Call Trace: [ 3166.227716][T17087] dump_stack+0x137/0x19d 04:50:01 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:01 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:01 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x2000000, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:01 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3166.232189][T17087] should_fail+0x23c/0x250 [ 3166.236609][T17087] __alloc_pages+0xe7/0x310 [ 3166.241164][T17087] alloc_pages_vma+0x3c3/0x5e0 [ 3166.245928][T17087] shmem_getpage_gfp+0x980/0x1410 [ 3166.250957][T17087] shmem_write_begin+0x7e/0x100 [ 3166.255920][T17087] generic_perform_write+0x196/0x3a0 [ 3166.261287][T17087] ? shmem_write_begin+0x100/0x100 [ 3166.266988][T17087] __generic_file_write_iter+0x161/0x300 [ 3166.272796][T17087] ? generic_write_checks+0x250/0x290 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3166.278204][T17087] generic_file_write_iter+0x75/0x130 [ 3166.283586][T17087] vfs_write+0x69d/0x770 [ 3166.287839][T17087] __x64_sys_pwrite64+0xf5/0x150 [ 3166.292923][T17087] do_syscall_64+0x4a/0x90 [ 3166.297407][T17087] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3166.303424][T17087] RIP: 0033:0x419797 [ 3166.307313][T17087] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 04:50:02 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3166.326920][T17087] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3166.335411][T17087] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3166.343400][T17087] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3166.351369][T17087] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3166.359362][T17087] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3166.367334][T17087] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3166.461481][T17116] FAULT_INJECTION: forcing a failure. [ 3166.461481][T17116] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3166.474680][T17116] CPU: 1 PID: 17116 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3166.484585][T17116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3166.494651][T17116] Call Trace: [ 3166.497927][T17116] dump_stack+0x137/0x19d [ 3166.502287][T17116] should_fail+0x23c/0x250 [ 3166.506779][T17116] should_fail_usercopy+0x16/0x20 [ 3166.511814][T17116] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3166.518237][T17116] ? shmem_write_begin+0x7e/0x100 [ 3166.523273][T17116] generic_perform_write+0x1e4/0x3a0 [ 3166.528575][T17116] ? shmem_write_begin+0x100/0x100 [ 3166.533708][T17116] __generic_file_write_iter+0x161/0x300 [ 3166.539372][T17116] ? generic_write_checks+0x250/0x290 [ 3166.544741][T17116] generic_file_write_iter+0x75/0x130 [ 3166.550122][T17116] vfs_write+0x69d/0x770 [ 3166.554454][T17116] __x64_sys_pwrite64+0xf5/0x150 04:50:02 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x320, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x321, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3166.559445][T17116] do_syscall_64+0x4a/0x90 [ 3166.563931][T17116] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3166.569904][T17116] RIP: 0033:0x419797 [ 3166.573826][T17116] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3166.593443][T17116] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3166.601857][T17116] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:02 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x20100000, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x322, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3166.609858][T17116] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3166.617844][T17116] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3166.625816][T17116] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3166.633911][T17116] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3166.715420][T17140] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:50:02 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:02 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, 0x0) 04:50:02 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x323, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3166.909176][T17165] FAULT_INJECTION: forcing a failure. [ 3166.909176][T17165] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3166.923148][T17165] CPU: 0 PID: 17165 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3166.933030][T17165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3166.934169][T17164] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3166.943193][T17165] Call Trace: 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x324, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:02 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x304000, &(0x7f0000001a40)) [ 3166.943204][T17165] dump_stack+0x137/0x19d [ 3166.943231][T17165] should_fail+0x23c/0x250 [ 3166.943249][T17165] __alloc_pages+0xe7/0x310 [ 3166.969369][T17165] alloc_pages_vma+0x3c3/0x5e0 [ 3166.974137][T17165] shmem_getpage_gfp+0x980/0x1410 [ 3166.979168][T17165] shmem_write_begin+0x7e/0x100 [ 3166.984019][T17165] generic_perform_write+0x196/0x3a0 [ 3166.989330][T17165] ? shmem_write_begin+0x100/0x100 [ 3166.994490][T17165] __generic_file_write_iter+0x161/0x300 [ 3167.000232][T17165] ? generic_write_checks+0x250/0x290 04:50:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x325, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3167.005612][T17165] generic_file_write_iter+0x75/0x130 [ 3167.011091][T17165] vfs_write+0x69d/0x770 [ 3167.015340][T17165] __x64_sys_pwrite64+0xf5/0x150 [ 3167.020273][T17165] do_syscall_64+0x4a/0x90 [ 3167.024692][T17165] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3167.030590][T17165] RIP: 0033:0x419797 [ 3167.034484][T17165] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 04:50:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3167.054139][T17165] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3167.062556][T17165] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3167.070552][T17165] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3167.078571][T17165] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3167.086559][T17165] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3167.094526][T17165] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x326, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:02 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:02 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, 0x0) 04:50:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3167.133643][T17163] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. 04:50:02 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3167.211348][T17198] FAULT_INJECTION: forcing a failure. [ 3167.211348][T17198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3167.224458][T17198] CPU: 1 PID: 17198 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3167.234268][T17198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3167.244418][T17198] Call Trace: [ 3167.247807][T17198] dump_stack+0x137/0x19d [ 3167.252143][T17198] should_fail+0x23c/0x250 [ 3167.256566][T17198] should_fail_usercopy+0x16/0x20 04:50:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x327, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3167.261596][T17198] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3167.267699][T17198] ? shmem_write_begin+0x7e/0x100 [ 3167.272731][T17198] generic_perform_write+0x1e4/0x3a0 [ 3167.278024][T17198] ? shmem_write_begin+0x100/0x100 [ 3167.283136][T17198] __generic_file_write_iter+0x161/0x300 [ 3167.288805][T17198] ? generic_write_checks+0x250/0x290 [ 3167.294178][T17198] generic_file_write_iter+0x75/0x130 [ 3167.299579][T17198] vfs_write+0x69d/0x770 [ 3167.303830][T17198] __x64_sys_pwrite64+0xf5/0x150 04:50:03 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x328, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3167.308785][T17198] do_syscall_64+0x4a/0x90 [ 3167.312627][T17196] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3167.313204][T17198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3167.328647][T17198] RIP: 0033:0x419797 [ 3167.332547][T17198] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3167.352163][T17198] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3167.360587][T17198] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3167.368561][T17198] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3167.376550][T17198] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3167.384524][T17198] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3167.392491][T17198] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:03 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:03 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3167.409072][T17195] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x329, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3167.467883][T17220] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:50:03 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:03 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, 0x0) 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:03 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:03 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:03 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3167.663031][T17241] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3167.664850][T17244] FAULT_INJECTION: forcing a failure. [ 3167.664850][T17244] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3167.685879][T17244] CPU: 0 PID: 17244 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3167.695749][T17244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3167.705836][T17244] Call Trace: [ 3167.709112][T17244] dump_stack+0x137/0x19d 04:50:03 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3167.713451][T17244] should_fail+0x23c/0x250 [ 3167.717869][T17244] __alloc_pages+0xe7/0x310 [ 3167.722370][T17244] alloc_pages_vma+0x3c3/0x5e0 [ 3167.727128][T17244] shmem_getpage_gfp+0x980/0x1410 [ 3167.732211][T17244] shmem_write_begin+0x7e/0x100 [ 3167.737184][T17244] generic_perform_write+0x196/0x3a0 [ 3167.742472][T17244] ? shmem_write_begin+0x100/0x100 [ 3167.747650][T17244] __generic_file_write_iter+0x161/0x300 [ 3167.753288][T17244] ? generic_write_checks+0x250/0x290 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3167.758662][T17244] generic_file_write_iter+0x75/0x130 [ 3167.764035][T17244] vfs_write+0x69d/0x770 [ 3167.768279][T17244] __x64_sys_pwrite64+0xf5/0x150 [ 3167.773209][T17244] do_syscall_64+0x4a/0x90 [ 3167.777652][T17244] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3167.783548][T17244] RIP: 0033:0x419797 [ 3167.787458][T17244] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3167.807065][T17244] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3167.816369][T17244] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3167.824338][T17244] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3167.832306][T17244] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3167.840360][T17244] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3167.848332][T17244] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:03 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3167.856443][T17246] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3167.881584][T17245] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. 04:50:03 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x330, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:03 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, 0x0, &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:03 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:03 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x304000, &(0x7f0000001a40)) [ 3167.964594][T17267] FAULT_INJECTION: forcing a failure. [ 3167.964594][T17267] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3167.977699][T17267] CPU: 1 PID: 17267 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3167.987545][T17267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3167.997790][T17267] Call Trace: [ 3168.001067][T17267] dump_stack+0x137/0x19d [ 3168.005438][T17267] should_fail+0x23c/0x250 [ 3168.009925][T17267] should_fail_usercopy+0x16/0x20 [ 3168.014988][T17267] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3168.021066][T17267] ? shmem_write_begin+0x7e/0x100 [ 3168.026097][T17267] generic_perform_write+0x1e4/0x3a0 [ 3168.031384][T17267] ? shmem_write_begin+0x100/0x100 [ 3168.036597][T17267] __generic_file_write_iter+0x161/0x300 [ 3168.042233][T17267] ? generic_write_checks+0x250/0x290 [ 3168.047958][T17267] generic_file_write_iter+0x75/0x130 [ 3168.053410][T17267] vfs_write+0x69d/0x770 [ 3168.057663][T17267] __x64_sys_pwrite64+0xf5/0x150 04:50:03 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x331, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:03 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, 0x0, &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x332, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3168.062598][T17267] do_syscall_64+0x4a/0x90 [ 3168.067032][T17267] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3168.073430][T17267] RIP: 0033:0x419797 [ 3168.077325][T17267] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3168.097134][T17267] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3168.105553][T17267] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x333, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x334, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3168.113527][T17267] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3168.121501][T17267] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3168.129489][T17267] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3168.137462][T17267] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3168.146607][T17283] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:04 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:04 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:04 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:04 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, 0x0, &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x335, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:04 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x304000, &(0x7f0000001a40)) [ 3168.361543][T17311] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3168.383659][T17318] FAULT_INJECTION: forcing a failure. [ 3168.383659][T17318] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3168.396935][T17318] CPU: 1 PID: 17318 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 04:50:04 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x336, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:04 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:04 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x304000, &(0x7f0000001a40)) [ 3168.406753][T17318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3168.416806][T17318] Call Trace: [ 3168.420109][T17318] dump_stack+0x137/0x19d [ 3168.424536][T17318] should_fail+0x23c/0x250 [ 3168.428950][T17318] __alloc_pages+0xe7/0x310 [ 3168.433484][T17318] alloc_pages_vma+0x3c3/0x5e0 [ 3168.438261][T17318] shmem_getpage_gfp+0x980/0x1410 [ 3168.443288][T17318] shmem_write_begin+0x7e/0x100 [ 3168.448188][T17318] generic_perform_write+0x196/0x3a0 [ 3168.453492][T17318] ? shmem_write_begin+0x100/0x100 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x337, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x338, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3168.458695][T17318] __generic_file_write_iter+0x161/0x300 [ 3168.464331][T17318] ? generic_write_checks+0x250/0x290 [ 3168.469695][T17318] generic_file_write_iter+0x75/0x130 [ 3168.475088][T17318] vfs_write+0x69d/0x770 [ 3168.479417][T17318] __x64_sys_pwrite64+0xf5/0x150 [ 3168.484354][T17318] do_syscall_64+0x4a/0x90 [ 3168.488767][T17318] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3168.494664][T17318] RIP: 0033:0x419797 [ 3168.498557][T17318] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3168.518177][T17318] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3168.526605][T17318] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3168.534601][T17318] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3168.542571][T17318] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3168.550619][T17318] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:04 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3168.558590][T17318] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:04 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x0, 0x62], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x339, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3168.608131][T17336] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3168.619001][T17337] FAULT_INJECTION: forcing a failure. [ 3168.619001][T17337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3168.632099][T17337] CPU: 1 PID: 17337 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3168.641927][T17337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3168.651978][T17337] Call Trace: 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3168.655278][T17337] dump_stack+0x137/0x19d [ 3168.659614][T17337] should_fail+0x23c/0x250 [ 3168.664033][T17337] should_fail_usercopy+0x16/0x20 [ 3168.669071][T17337] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3168.675147][T17337] ? shmem_write_begin+0x7e/0x100 [ 3168.680242][T17337] generic_perform_write+0x1e4/0x3a0 [ 3168.685551][T17337] ? shmem_write_begin+0x100/0x100 [ 3168.690671][T17337] __generic_file_write_iter+0x161/0x300 [ 3168.696394][T17337] ? generic_write_checks+0x250/0x290 [ 3168.701766][T17337] generic_file_write_iter+0x75/0x130 04:50:04 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x304000, &(0x7f0000001a40)) [ 3168.707166][T17337] vfs_write+0x69d/0x770 [ 3168.711432][T17337] __x64_sys_pwrite64+0xf5/0x150 [ 3168.716371][T17337] do_syscall_64+0x4a/0x90 [ 3168.720789][T17337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3168.726733][T17337] RIP: 0033:0x419797 [ 3168.730614][T17337] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3168.750224][T17337] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3168.758670][T17337] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3168.766645][T17337] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3168.774616][T17337] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3168.782589][T17337] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3168.790730][T17337] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:04 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:04 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:04 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x0, 0x62], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:04 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3168.883043][T17365] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3168.917843][T17369] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:04 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:04 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x0, 0x62], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:04 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:04 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:04 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3169.106335][T17396] FAULT_INJECTION: forcing a failure. [ 3169.106335][T17396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3169.119631][T17396] CPU: 0 PID: 17396 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3169.129571][T17396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3169.139625][T17396] Call Trace: [ 3169.142901][T17396] dump_stack+0x137/0x19d [ 3169.147280][T17396] should_fail+0x23c/0x250 [ 3169.151809][T17396] __alloc_pages+0xe7/0x310 [ 3169.156310][T17396] alloc_pages_vma+0x3c3/0x5e0 [ 3169.161071][T17396] shmem_getpage_gfp+0x980/0x1410 [ 3169.166110][T17396] shmem_write_begin+0x7e/0x100 [ 3169.170971][T17396] generic_perform_write+0x196/0x3a0 [ 3169.173219][T17399] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3169.176264][T17396] ? shmem_write_begin+0x100/0x100 [ 3169.191426][T17396] __generic_file_write_iter+0x161/0x300 [ 3169.197060][T17396] ? generic_write_checks+0x250/0x290 04:50:04 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304002, &(0x7f0000001a40)) 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:04 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x0, 0x38, 0x62], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:04 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:04 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3169.202438][T17396] generic_file_write_iter+0x75/0x130 [ 3169.207816][T17396] vfs_write+0x69d/0x770 [ 3169.212079][T17396] __x64_sys_pwrite64+0xf5/0x150 [ 3169.217045][T17396] do_syscall_64+0x4a/0x90 [ 3169.221533][T17396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3169.227442][T17396] RIP: 0033:0x419797 [ 3169.231332][T17396] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3169.251026][T17396] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3169.259548][T17396] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3169.267546][T17396] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3169.276679][T17396] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3169.284655][T17396] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3169.292675][T17396] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:05 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x341, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3169.340990][T17411] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3169.389870][T17420] FAULT_INJECTION: forcing a failure. [ 3169.389870][T17420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3169.403046][T17420] CPU: 0 PID: 17420 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3169.412860][T17420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3169.422952][T17420] Call Trace: [ 3169.426224][T17420] dump_stack+0x137/0x19d [ 3169.430557][T17420] should_fail+0x23c/0x250 [ 3169.434985][T17420] should_fail_usercopy+0x16/0x20 04:50:05 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:05 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x0, 0x38, 0x62], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:05 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}]}}) 04:50:05 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x342, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3169.440008][T17420] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3169.446090][T17420] ? shmem_write_begin+0x7e/0x100 [ 3169.451171][T17420] generic_perform_write+0x1e4/0x3a0 [ 3169.456516][T17420] ? shmem_write_begin+0x100/0x100 [ 3169.461743][T17420] __generic_file_write_iter+0x161/0x300 [ 3169.467383][T17420] ? generic_write_checks+0x250/0x290 [ 3169.472802][T17420] generic_file_write_iter+0x75/0x130 [ 3169.478184][T17420] vfs_write+0x69d/0x770 [ 3169.482436][T17420] __x64_sys_pwrite64+0xf5/0x150 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x343, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3169.487378][T17420] do_syscall_64+0x4a/0x90 [ 3169.491842][T17420] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3169.497738][T17420] RIP: 0033:0x419797 [ 3169.501633][T17420] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3169.521238][T17420] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3169.529652][T17420] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x344, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x345, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3169.537621][T17420] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3169.545766][T17420] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3169.553732][T17420] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3169.561701][T17420] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:05 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, 0x0) 04:50:05 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}]}}) 04:50:05 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:05 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x0, 0x38, 0x62], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:05 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)={[], [], 0x2}) 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x346, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:05 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}]}}) 04:50:05 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, 0x0) [ 3169.850468][T17473] FAULT_INJECTION: forcing a failure. [ 3169.850468][T17473] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3169.863752][T17473] CPU: 0 PID: 17473 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3169.873581][T17473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3169.883632][T17473] Call Trace: [ 3169.886996][T17473] dump_stack+0x137/0x19d [ 3169.891351][T17473] should_fail+0x23c/0x250 [ 3169.895850][T17473] __alloc_pages+0xe7/0x310 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x347, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:05 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x100) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30, 0x2c, 0x0, 0x2f, 0x38, 0x39, 0x32, 0x31]}}}}]}) 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x348, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3169.900353][T17473] alloc_pages_vma+0x3c3/0x5e0 [ 3169.905113][T17473] shmem_getpage_gfp+0x980/0x1410 [ 3169.910217][T17473] shmem_write_begin+0x7e/0x100 [ 3169.915081][T17473] generic_perform_write+0x196/0x3a0 [ 3169.920448][T17473] ? shmem_write_begin+0x100/0x100 [ 3169.925554][T17473] __generic_file_write_iter+0x161/0x300 [ 3169.931182][T17473] ? generic_write_checks+0x250/0x290 [ 3169.936610][T17473] generic_file_write_iter+0x75/0x130 [ 3169.941996][T17473] vfs_write+0x69d/0x770 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x349, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3169.946317][T17473] __x64_sys_pwrite64+0xf5/0x150 [ 3169.951257][T17473] do_syscall_64+0x4a/0x90 [ 3169.955767][T17473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3169.961710][T17473] RIP: 0033:0x419797 [ 3169.965602][T17473] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3169.985210][T17473] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:05 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:05 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x36, 0x62], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:05 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, 0x0) 04:50:05 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) [ 3169.993677][T17473] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3170.001649][T17473] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3170.009630][T17473] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3170.017601][T17473] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3170.025574][T17473] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:05 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r1) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r1) getpeername(r1, &(0x7f0000000940)=@can, &(0x7f00000009c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x98, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000240)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6499d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x6}, {0x0, 0x0, 0xfffffffffffffffb}, {&(0x7f0000000600)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c1571bde2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd6ed545e4b8c57e988", 0x48, 0x6}], 0x0, &(0x7f0000000880)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x7}}], [{@smackfsfloor}, {@euid_lt={'euid<', r3}}, {@audit}, {@smackfstransmute={'smackfstransmute', 0x3d, ':&{\'\\.'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x62, 0x39, 0x36, 0x57ce3aa21198906d, 0x39, 0x65, 0x35], 0x2d, [0x38, 0x32, 0x60, 0x34], 0x2d, [0x36, 0x35, 0x34, 0x32], 0x2d, [0x31, 0x33, 0x61, 0x35], 0x2d, [0x31, 0x31, 0x35, 0x35, 0x36, 0x31, 0x36, 0x66]}}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000500)={'erspan0\x00', r2, 0x10, 0x7, 0x3f, 0x1, {{0x22, 0x4, 0x2, 0xe, 0x88, 0x68, 0x0, 0x8, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}, @remote, {[@cipso={0x86, 0x33, 0x1, [{0x2, 0xa, "7b264f0f7dd4b834"}, {0x2, 0x2}, {0x6, 0xa, "e53f5d9ef9bd3f71"}, {0x1, 0x5, "373687"}, {0x6, 0x4, "45dd"}, {0x0, 0xc, "6506a1967fcf55950295"}, {0x1, 0x2}]}, @cipso={0x86, 0x2c, 0x2, [{0x1, 0xb, "9a96a1b49a605764de"}, {0x6, 0x3, 'W'}, {0x2, 0xc, "b2d18b04068576ab7e0a"}, {0x7, 0x4, "1c0f"}, {0x6, 0x8, "b2bf29c5dced"}]}, @generic={0x89, 0xf, "6f78c3a2b7ccabdb48a5240e5e"}, @ra={0x94, 0x4}]}}}}}) rmdir(&(0x7f00000005c0)='./file0\x00') syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000000)={[{@huge_advise}, {@uid={'uid', 0x3d, r3}}]}) [ 3170.119271][T17499] FAULT_INJECTION: forcing a failure. [ 3170.119271][T17499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3170.132418][T17499] CPU: 0 PID: 17499 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3170.142225][T17499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3170.152280][T17499] Call Trace: [ 3170.155556][T17499] dump_stack+0x137/0x19d [ 3170.159945][T17499] should_fail+0x23c/0x250 [ 3170.164365][T17499] should_fail_usercopy+0x16/0x20 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3170.169392][T17499] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3170.175483][T17499] ? shmem_write_begin+0x7e/0x100 [ 3170.180614][T17499] generic_perform_write+0x1e4/0x3a0 [ 3170.185910][T17499] ? shmem_write_begin+0x100/0x100 [ 3170.191116][T17499] __generic_file_write_iter+0x161/0x300 [ 3170.196757][T17499] ? generic_write_checks+0x250/0x290 [ 3170.202132][T17499] generic_file_write_iter+0x75/0x130 [ 3170.207583][T17499] vfs_write+0x69d/0x770 [ 3170.211840][T17499] __x64_sys_pwrite64+0xf5/0x150 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3170.217660][T17499] do_syscall_64+0x4a/0x90 [ 3170.222086][T17499] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3170.227997][T17499] RIP: 0033:0x419797 [ 3170.231887][T17499] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3170.251663][T17499] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3170.260083][T17499] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:06 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x36, 0x62], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3170.268064][T17499] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3170.276049][T17499] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3170.284116][T17499] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3170.292089][T17499] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3170.300250][T17500] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:06 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3170.363023][T17517] loop5: detected capacity change from 0 to 16383 [ 3170.378171][T17517] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x350, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3170.455400][T17538] loop5: detected capacity change from 0 to 16383 [ 3170.456239][T17531] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3170.463993][T17538] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:50:06 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:06 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, 0x0) 04:50:06 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x36, 0x62], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:06 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x48) 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x351, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:06 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3170.615978][T17558] FAULT_INJECTION: forcing a failure. [ 3170.615978][T17558] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3170.629249][T17558] CPU: 1 PID: 17558 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3170.639141][T17558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3170.649192][T17558] Call Trace: [ 3170.652470][T17558] dump_stack+0x137/0x19d [ 3170.656803][T17558] should_fail+0x23c/0x250 [ 3170.661221][T17558] __alloc_pages+0xe7/0x310 04:50:06 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x5, 0x5, &(0x7f0000001540)=[{&(0x7f0000000200)="5b0dd62a213ad0c86aba2206b3f13df6bcd2cf3cc9ddb75e95df5a6ddee775192dd8d32339eafd035acba6d8eff59615518357b11152f595b9662673c8991b0683d57e19d4baa9606f637c2a13973d0a5ecf5f796d9200ca46b09e82dc5e7fa0a903358c1fe603484fd1747cefeaf5dd68d7c8ba5f63426fae3159754b2556c3b7ea3dfec2d001670f784a3465dfa3d67243a5433962d89a011f9985c052afdc99b66997017d81ab1599d546cf2f023196e3e80085d705127119cee7181b999f634cd8096ed4a016aef3e90245a7c9e137556dd44073762587984463ec0571aa415f87c58a", 0xe5, 0x2}, {&(0x7f0000000100)="7b0ec725502fb751f9d28fa04ff271b7f582", 0x12, 0x8000}, {&(0x7f0000000380)="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", 0x1000, 0xffffffff}, {&(0x7f00000013c0)="09a3daef119baf4d118e67513fb4d2e46128d60abcaa246dff8ae30a1a2e00633289db93fbfa5711342be9185c62d9e7062c588aa9751dc494850fad195a7de3fbbe41c2c45fb8565f3f538d49348d36fb28918352e293", 0x57, 0x7}, {&(0x7f0000001440)="285f1f2e885d141135cfab6aba7103295fd54717f44244d8a47d3953a8c804f44f08a30c4e8b9ff79378d79aa996ec7ce5173aed9ab0dbff87897b98fa02ce68de91f96629cd4b45e34f9aa4938790b79a1042689b10dd83f2134078f3013173f8aaba3279d5df74ca0a3365f07e3d923675722bed65db1fbd3179caa6c3659c63aea8fb525c579b1dab8ebedff607d711fda5f0d7674f1dca3934cf2aa53422e90787dfbb2ba64ec23e31a378f602741da0167d1df59ab04d4fa9f6472e9e3ae7d6b4de6d408d5664c8", 0xca, 0x3}], 0x8000, &(0x7f00000015c0)=ANY=[@ANYBLOB='mode=00000000000000000000000,smackfstransmute=tmpfs\x00,su^j_user=tmpfs\x00,\x00']) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x8, 0xff, 0x9}, 0xc) 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x352, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x353, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3170.665727][T17558] alloc_pages_vma+0x3c3/0x5e0 [ 3170.670490][T17558] shmem_getpage_gfp+0x980/0x1410 [ 3170.675565][T17558] shmem_write_begin+0x7e/0x100 [ 3170.680450][T17558] generic_perform_write+0x196/0x3a0 [ 3170.685756][T17558] ? shmem_write_begin+0x100/0x100 [ 3170.690917][T17558] __generic_file_write_iter+0x161/0x300 [ 3170.696558][T17558] ? generic_write_checks+0x250/0x290 [ 3170.701930][T17558] generic_file_write_iter+0x75/0x130 [ 3170.707327][T17558] vfs_write+0x69d/0x770 [ 3170.711579][T17558] __x64_sys_pwrite64+0xf5/0x150 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x354, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3170.716510][T17558] do_syscall_64+0x4a/0x90 [ 3170.720932][T17558] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3170.726891][T17558] RIP: 0033:0x419797 [ 3170.730841][T17558] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3170.750474][T17558] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3170.758882][T17558] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x355, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x356, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:06 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:06 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x36, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:06 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, 0x0) [ 3170.766906][T17558] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3170.774880][T17558] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3170.782889][T17558] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3170.790863][T17558] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3170.801140][T17559] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:06 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3170.863241][T17576] loop5: detected capacity change from 0 to 264192 [ 3170.878084][T17576] tmpfs: Unknown parameter 'smackfstransmute' [ 3170.913993][T17587] FAULT_INJECTION: forcing a failure. [ 3170.913993][T17587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3170.927098][T17587] CPU: 0 PID: 17587 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3170.936992][T17587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3170.947076][T17587] Call Trace: [ 3170.950357][T17587] dump_stack+0x137/0x19d [ 3170.954752][T17587] should_fail+0x23c/0x250 [ 3170.959181][T17587] should_fail_usercopy+0x16/0x20 [ 3170.963340][T17592] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3170.964215][T17587] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3170.980365][T17587] ? shmem_write_begin+0x7e/0x100 [ 3170.985419][T17587] generic_perform_write+0x1e4/0x3a0 [ 3170.990711][T17587] ? shmem_write_begin+0x100/0x100 [ 3170.995842][T17587] __generic_file_write_iter+0x161/0x300 [ 3171.001491][T17587] ? generic_write_checks+0x250/0x290 [ 3171.006869][T17587] generic_file_write_iter+0x75/0x130 04:50:06 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:06 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x304000, &(0x7f0000001a40)) [ 3171.012243][T17587] vfs_write+0x69d/0x770 [ 3171.016554][T17587] __x64_sys_pwrite64+0xf5/0x150 [ 3171.021543][T17587] do_syscall_64+0x4a/0x90 [ 3171.025993][T17587] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3171.031990][T17587] RIP: 0033:0x419797 [ 3171.035877][T17587] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3171.055581][T17587] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3171.063986][T17587] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3171.071943][T17587] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3171.079908][T17587] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3171.087878][T17587] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3171.095857][T17587] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:06 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x80000, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x32, @private=0xa010101, 0x4e23, 0x3, 'ovf\x00', 0x2, 0x6, 0x62}, 0x2c) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x357, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:06 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x36, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3171.170256][T17603] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:06 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x358, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:06 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3171.214421][T17611] EXT4-fs: 20 callbacks suppressed [ 3171.214436][T17611] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3171.323516][T17626] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:07 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:07 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:07 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:07 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x359, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:07 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3171.440253][T17647] FAULT_INJECTION: forcing a failure. [ 3171.440253][T17647] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3171.453568][T17647] CPU: 1 PID: 17647 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3171.462945][T17649] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3171.463373][T17647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3171.463386][T17647] Call Trace: 04:50:07 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) 04:50:07 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000200)={[{@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x2d, 0x67, 0x34]}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x70, 0x6b, 0x33]}}]}) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x4010}, 0x24044000) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x108) r1 = getuid() quotactl(0x7, &(0x7f0000000380)='./file0\x00', r1, &(0x7f00000003c0)="0ea1b28a16f60f7da71d81e1bf05ac697be701e54963cef5d1b71cb0e733196fc51eb0299866529ca3d911b3ba04a0a51d82554e0c44c561847154a7cd35b7ede3a637922ed258bae1d456ace02a19d18c04ce462aac1b0715c0d0d105ccca2819363f462d6f2ef7e0a49820417e4fa46dfef9138a90722afc23eae74a909e1c48bed0ee6047d20b29ed6a0aec148fd2ac0147ff6f1f1c5ea3f1f1fe76621f57b4f5eaa5a0f3025497ac91eceaefc94530fef9") sendmsg$AUDIT_TRIM(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f6, 0x10, 0x70bd27, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x844) 04:50:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:07 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) [ 3171.486756][T17647] dump_stack+0x137/0x19d [ 3171.491095][T17647] should_fail+0x23c/0x250 [ 3171.495516][T17647] __alloc_pages+0xe7/0x310 [ 3171.500020][T17647] alloc_pages_vma+0x3c3/0x5e0 [ 3171.504792][T17647] shmem_getpage_gfp+0x980/0x1410 [ 3171.509861][T17647] shmem_write_begin+0x7e/0x100 [ 3171.514766][T17647] generic_perform_write+0x196/0x3a0 [ 3171.520078][T17647] ? shmem_write_begin+0x100/0x100 [ 3171.525223][T17647] __generic_file_write_iter+0x161/0x300 [ 3171.530940][T17647] ? generic_write_checks+0x250/0x290 04:50:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3171.536317][T17647] generic_file_write_iter+0x75/0x130 [ 3171.541692][T17647] vfs_write+0x69d/0x770 [ 3171.546042][T17647] __x64_sys_pwrite64+0xf5/0x150 [ 3171.551044][T17647] do_syscall_64+0x4a/0x90 [ 3171.555546][T17647] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3171.561474][T17647] RIP: 0033:0x419797 [ 3171.565365][T17647] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 04:50:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3171.575340][T17650] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3171.585081][T17647] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3171.603028][T17647] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3171.611087][T17647] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3171.619055][T17647] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3171.627040][T17647] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3171.635023][T17647] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:07 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:07 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:07 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3171.717458][T17672] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3171.737150][T17678] FAULT_INJECTION: forcing a failure. [ 3171.737150][T17678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3171.750267][T17678] CPU: 0 PID: 17678 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3171.760188][T17678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3171.770247][T17678] Call Trace: [ 3171.773524][T17678] dump_stack+0x137/0x19d [ 3171.777879][T17678] should_fail+0x23c/0x250 [ 3171.782293][T17678] should_fail_usercopy+0x16/0x20 [ 3171.787495][T17678] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3171.793562][T17678] ? shmem_write_begin+0x7e/0x100 [ 3171.798587][T17678] generic_perform_write+0x1e4/0x3a0 [ 3171.803876][T17678] ? shmem_write_begin+0x100/0x100 [ 3171.809021][T17678] __generic_file_write_iter+0x161/0x300 [ 3171.814660][T17678] ? generic_write_checks+0x250/0x290 [ 3171.820107][T17678] generic_file_write_iter+0x75/0x130 [ 3171.825482][T17678] vfs_write+0x69d/0x770 [ 3171.829913][T17678] __x64_sys_pwrite64+0xf5/0x150 [ 3171.834852][T17678] do_syscall_64+0x4a/0x90 [ 3171.839277][T17678] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3171.845173][T17678] RIP: 0033:0x419797 [ 3171.849066][T17678] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3171.868676][T17678] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3171.877087][T17678] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3171.885060][T17678] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3171.893028][T17678] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3171.896307][T17689] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:07 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r1 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x7ff, 0x4, &(0x7f00000014c0)=[{&(0x7f0000000240)="89c9bb7a61a9", 0x6, 0xefe}, {&(0x7f0000000380)="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", 0x1000, 0x81}, {&(0x7f0000000280)="afe53e271966060936bef4312a8537d40b2c35bdab09c8ccfce229e9b47dd4ce617bc528490a41b2dbf5b7c59b7fe9903e0875d45f5ae6bf2b2a52a6b2eae2da1773269d46693a9e6ba78f9f8164b1e33bffc123afe2a4212df050aeb89114cdd6829bd03f01bf705578477167bb27c6664a912652fefc587c4b91", 0x7b, 0x401}, {&(0x7f00000013c0)="689a81aa2dc0030306e46b191c9b760b11e1f1f82001d49912dcea351c29c024a8252c5fa58ff684bc9a0854d1fb73328199c7ba48ee96bd3578c522a9432c202ddbdc027f35d461906367450378b7c5cac418b07fc85e17f5f564fc98b70e957ca2e57abaa44769f89f00da0845958d338fe5534283c32b6213d21c7407b15d0ad1b96f0e445d2fbdbcda657276914f7e799a6e6bace59732e12434821a0f01c8cdbfef25c88df2c6e827691ee22eeb7280f2ee6d05e6d56a8c86e96b0c5cbd471001010102af41c5ddcbffe156e35244bcd4a65f898a351fcc", 0xda, 0xf013}], 0x80085, &(0x7f0000001540)={[{'tmpfs\x00'}, {'.%\x11-)@@*#\'!-'}, {'%{(}@}@@$)'}, {'tmpfs\x00'}, {'tmpfs\x00'}, {'tmpfs\x00'}, {'tmpfs\x00'}, {}, {'tmpfs\x00'}], [{@subj_role}]}) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000000c0)='--+\x00', &(0x7f0000000100)='./file0\x00', r1) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000000)=ANY=[@ANYBLOB="0100010000000000116f827292c25af23bcbd87e3be635f9d1445f2902034578139263fc241bb60e48c36d178e3e7216d7e6d4d9996255530b9bad2923c035"]) 04:50:07 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:50:07 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:50:07 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:50:07 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) 04:50:07 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}]}}) 04:50:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:07 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3171.900994][T17678] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3171.901011][T17678] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3171.933926][T17677] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3171.974412][T17696] EXT4-fs (sda1): Unrecognized mount option "trans=unix" or missing value [ 3171.983400][T17694] loop5: detected capacity change from 0 to 240 [ 3172.009143][T17699] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3172.035666][T17703] loop5: detected capacity change from 0 to 240 04:50:07 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:07 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}]}}) 04:50:07 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:07 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) 04:50:07 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3172.230084][T17725] FAULT_INJECTION: forcing a failure. [ 3172.230084][T17725] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3172.243355][T17725] CPU: 1 PID: 17725 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3172.246874][T17726] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3172.253198][T17725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3172.253212][T17725] Call Trace: 04:50:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x360, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:08 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) [ 3172.253220][T17725] dump_stack+0x137/0x19d [ 3172.280946][T17725] should_fail+0x23c/0x250 [ 3172.285368][T17725] __alloc_pages+0xe7/0x310 [ 3172.289888][T17725] alloc_pages_vma+0x3c3/0x5e0 [ 3172.294648][T17725] shmem_getpage_gfp+0x980/0x1410 [ 3172.299675][T17725] shmem_write_begin+0x7e/0x100 [ 3172.304527][T17725] generic_perform_write+0x196/0x3a0 [ 3172.309818][T17725] ? shmem_write_begin+0x100/0x100 [ 3172.315000][T17725] __generic_file_write_iter+0x161/0x300 [ 3172.320635][T17725] ? generic_write_checks+0x250/0x290 04:50:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x361, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:08 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x3) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x9, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3172.326035][T17725] generic_file_write_iter+0x75/0x130 [ 3172.331493][T17725] vfs_write+0x69d/0x770 [ 3172.335761][T17725] __x64_sys_pwrite64+0xf5/0x150 [ 3172.339119][T17730] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3172.340716][T17725] do_syscall_64+0x4a/0x90 [ 3172.354669][T17725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3172.360585][T17725] RIP: 0033:0x419797 04:50:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x362, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x363, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3172.364473][T17725] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3172.384167][T17725] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3172.392588][T17725] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3172.400562][T17725] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3172.408545][T17725] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3172.416594][T17725] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:08 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3172.424565][T17725] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3172.442103][T17727] EXT4-fs (sda1): Unrecognized mount option "trans=unix" or missing value [ 3172.504060][T17745] FAULT_INJECTION: forcing a failure. [ 3172.504060][T17745] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3172.517177][T17745] CPU: 0 PID: 17745 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3172.526999][T17745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3172.537052][T17745] Call Trace: [ 3172.540499][T17745] dump_stack+0x137/0x19d [ 3172.545692][T17745] should_fail+0x23c/0x250 [ 3172.550131][T17745] should_fail_usercopy+0x16/0x20 [ 3172.555153][T17745] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3172.561225][T17745] ? shmem_write_begin+0x7e/0x100 [ 3172.566412][T17745] generic_perform_write+0x1e4/0x3a0 [ 3172.571706][T17745] ? shmem_write_begin+0x100/0x100 [ 3172.576880][T17745] __generic_file_write_iter+0x161/0x300 [ 3172.582597][T17745] ? generic_write_checks+0x250/0x290 [ 3172.588032][T17745] generic_file_write_iter+0x75/0x130 [ 3172.593418][T17745] vfs_write+0x69d/0x770 [ 3172.597665][T17745] __x64_sys_pwrite64+0xf5/0x150 [ 3172.602615][T17745] do_syscall_64+0x4a/0x90 [ 3172.607035][T17745] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3172.613054][T17745] RIP: 0033:0x419797 [ 3172.616950][T17745] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3172.636599][T17745] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3172.645012][T17745] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:08 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}]}}) 04:50:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x364, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:08 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:08 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:50:08 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', r1) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:08 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:50:08 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:50:08 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3172.652986][T17745] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3172.661038][T17745] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3172.669015][T17745] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3172.676984][T17745] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:08 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@hash}]}}) 04:50:08 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3172.712186][T17764] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3172.740249][T17773] EXT4-fs (sda1): Unrecognized mount option "trans=unix" or missing value [ 3172.798947][T17781] EXT4-fs (sda1): Unrecognized mount option "trans=unix" or missing value [ 3172.834895][T17787] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:50:08 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:08 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:08 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)=ANY=[@ANYBLOB]) 04:50:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x366, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:08 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:08 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:08 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) [ 3173.009081][T17805] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3173.012486][T17806] FAULT_INJECTION: forcing a failure. [ 3173.012486][T17806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3173.032426][T17806] CPU: 0 PID: 17806 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3173.042229][T17806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3173.052280][T17806] Call Trace: 04:50:08 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:08 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x368, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3173.055559][T17806] dump_stack+0x137/0x19d [ 3173.059893][T17806] should_fail+0x23c/0x250 [ 3173.064313][T17806] __alloc_pages+0xe7/0x310 [ 3173.068824][T17806] alloc_pages_vma+0x3c3/0x5e0 [ 3173.073595][T17806] shmem_getpage_gfp+0x980/0x1410 [ 3173.078756][T17806] shmem_write_begin+0x7e/0x100 [ 3173.083694][T17806] generic_perform_write+0x196/0x3a0 [ 3173.089056][T17806] ? shmem_write_begin+0x100/0x100 [ 3173.094251][T17806] __generic_file_write_iter+0x161/0x300 [ 3173.099885][T17806] ? generic_write_checks+0x250/0x290 04:50:08 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fff, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3173.105300][T17806] generic_file_write_iter+0x75/0x130 [ 3173.110680][T17806] vfs_write+0x69d/0x770 [ 3173.114965][T17806] __x64_sys_pwrite64+0xf5/0x150 [ 3173.119919][T17806] do_syscall_64+0x4a/0x90 [ 3173.124371][T17806] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3173.130307][T17806] RIP: 0033:0x419797 [ 3173.134359][T17806] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3173.153991][T17806] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3173.162453][T17806] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3173.170403][T17806] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3173.178414][T17806] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3173.186450][T17806] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3173.194416][T17806] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:08 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x369, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3173.225244][T17814] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3173.282591][T17824] FAULT_INJECTION: forcing a failure. [ 3173.282591][T17824] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3173.295762][T17824] CPU: 0 PID: 17824 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3173.305590][T17824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3173.315659][T17824] Call Trace: [ 3173.318931][T17824] dump_stack+0x137/0x19d [ 3173.323285][T17824] should_fail+0x23c/0x250 [ 3173.327744][T17824] should_fail_usercopy+0x16/0x20 04:50:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3173.332815][T17824] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3173.338887][T17824] ? shmem_write_begin+0x7e/0x100 [ 3173.343972][T17824] generic_perform_write+0x1e4/0x3a0 [ 3173.349314][T17824] ? shmem_write_begin+0x100/0x100 [ 3173.354477][T17824] __generic_file_write_iter+0x161/0x300 [ 3173.360178][T17824] ? generic_write_checks+0x250/0x290 [ 3173.365545][T17824] generic_file_write_iter+0x75/0x130 [ 3173.370921][T17824] vfs_write+0x69d/0x770 [ 3173.375198][T17824] __x64_sys_pwrite64+0xf5/0x150 04:50:09 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x0, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:09 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:09 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:09 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:ld_so_cache_t:s0\x00', 0x23, 0x2) [ 3173.380135][T17824] do_syscall_64+0x4a/0x90 [ 3173.384636][T17824] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3173.390603][T17824] RIP: 0033:0x419797 [ 3173.394491][T17824] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3173.414097][T17824] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3173.422508][T17824] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3173.430488][T17824] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3173.438460][T17824] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3173.446440][T17824] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3173.454448][T17824] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:09 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:09 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:09 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:09 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x0, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:09 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x98, 0x7, &(0x7f0000000680)=[{&(0x7f0000001540)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000240)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6499d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x6}, {0x0, 0x0, 0xfffffffffffffffb}, {&(0x7f0000000600)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c1571bde2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd6ed545e4b8c57e988", 0x48, 0x6}], 0x0, &(0x7f0000000880)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x7}}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x7, &(0x7f00000013c0)=[{&(0x7f00000000c0)="38af792693992dbfe5cdd4d4d35f901b11f9a8c24e9097f1ab0d5672a6b17446b66019c8bf4bfbd5da9026b6af60bf5376fc6ed24fe32cdbb51d1a9c63de36fc0227833e479537b83512a22f15f42e63a9a062ea783470668a64486a015903ed51703f01444e4638", 0x68}, {&(0x7f0000000140)="51b39fc51a55998ff0985de94f61109f209d1dae78b549e85cd71fd805", 0x1d, 0x1}, {&(0x7f0000000380)="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", 0x1000, 0x1000000000000000}, {&(0x7f0000001a80)="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", 0x1000, 0xe000000000000000}, {&(0x7f0000000200)="fc9d98b5c56cf2143730f91f22299df28b4e2818305564bfeb8959df1b2e677ac307", 0x22, 0xfffffffffffffffa}, {&(0x7f0000000240)="52f1f56eb6a399f6086b0cc873cb3cf5262a71df7fcc302c86cbb3b14c89c7bfdcdc7c175259a2bdab1db5cbf02ad013d819a1a06cc1094ac71225e13a98792fcaa0f6c180112d3b111886ba9e23bcf163d55f355f19987efcdcb31847cd25486a37a9bf01bde3ab56", 0x69, 0xffffffff}, {&(0x7f00000002c0)="19bc6caef3e2", 0x6, 0x1000}], 0x9000, &(0x7f0000001480)={[{@uid={'uid', 0x3d, r1}}, {@huge_always}, {@nr_inodes={'nr_inodes', 0x3d, [0x33]}}, {@uid={'uid', 0x3d, 0xee01}}, {@nr_blocks={'nr_blocks', 0x3d, [0x13, 0x31, 0x31, 0x65]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x78, 0x37, 0x6b]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x2d, 0x38, 0x32, 0x70]}}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x36, 0x39, 0x30, 0x2c, 0x32, 0x33, 0x3a, 0x33, 0x38]}}}}], [{@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x30, r0, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000001600)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000015c0)={0x77359400}, 0x1, 0x0, 0x1}, 0x7c7) 04:50:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:09 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) fsmount(0xffffffffffffffff, 0x0, 0x1) 04:50:09 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:09 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3173.767371][T17881] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3173.770366][T17883] FAULT_INJECTION: forcing a failure. [ 3173.770366][T17883] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3173.790711][T17883] CPU: 1 PID: 17883 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3173.800513][T17883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3173.810607][T17883] Call Trace: 04:50:09 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3173.813897][T17883] dump_stack+0x137/0x19d [ 3173.818277][T17883] should_fail+0x23c/0x250 [ 3173.822701][T17883] __alloc_pages+0xe7/0x310 [ 3173.827224][T17883] alloc_pages_vma+0x3c3/0x5e0 [ 3173.832020][T17883] shmem_getpage_gfp+0x980/0x1410 [ 3173.837064][T17883] shmem_write_begin+0x7e/0x100 [ 3173.841926][T17883] generic_perform_write+0x196/0x3a0 [ 3173.847242][T17883] ? shmem_write_begin+0x100/0x100 [ 3173.852376][T17883] __generic_file_write_iter+0x161/0x300 [ 3173.858064][T17883] ? generic_write_checks+0x250/0x290 04:50:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x370, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3173.862975][T17888] loop5: detected capacity change from 0 to 16383 [ 3173.863433][T17883] generic_file_write_iter+0x75/0x130 [ 3173.875307][T17883] vfs_write+0x69d/0x770 [ 3173.879645][T17883] __x64_sys_pwrite64+0xf5/0x150 [ 3173.884577][T17883] do_syscall_64+0x4a/0x90 [ 3173.888335][T17888] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3173.888997][T17883] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3173.901393][T17883] RIP: 0033:0x419797 04:50:09 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3173.905281][T17883] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3173.924886][T17883] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3173.933306][T17883] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3173.941270][T17883] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3173.949322][T17883] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3173.957287][T17883] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:09 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x0, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3173.965261][T17883] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3174.012635][T17882] loop5: detected capacity change from 0 to 264192 04:50:09 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:09 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000380)=ANY=[@ANYBLOB="00f1dba004143b5241c8a6bc6f988777582e4e52050b79ec4b272425f7d57e008b87f0f136c09769d0674ad40b54e626f91bd0e83b04fd491ef0d3c1c35919f42fab40ddb548ad04c536cf53706d115127d86af43deb67680a9ca2df97be8500b331fa616137f9acae7f4ce01e5ced9de8e9db169ffc5b52cfd2faa94f56c90aeb6f746e9322b9fd0c2d6c20297e4a04462d7f018e73b93c53d454e47e2e410f9c433cc645092e8ad3654565e8088cf0152f778ca0d79aee6d74ed287a1887d418c19085c51c45e64676db38d3f21bfe8a4b173789d08c4071032edd3c5b710e81ba0ada28b6e63381ef0c37e75136c027ea3620a3923f75e5ea5f87ae7a7d45ab9be5ab47b0310ba0e722c11ca6dade10a72cc4dcb86a202dfa747d2cfc1ea7375bab46eb59580fdae60c5007c696037d75e180e203d442756b454af4a950c289b8e8"]) 04:50:09 executing program 0: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:09 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3174.120143][T17920] FAULT_INJECTION: forcing a failure. [ 3174.120143][T17920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3174.133262][T17920] CPU: 1 PID: 17920 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3174.143073][T17920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3174.153135][T17920] Call Trace: [ 3174.156457][T17920] dump_stack+0x137/0x19d [ 3174.160793][T17920] should_fail+0x23c/0x250 [ 3174.165260][T17920] should_fail_usercopy+0x16/0x20 04:50:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x372, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3174.170300][T17920] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3174.176489][T17920] ? shmem_write_begin+0x7e/0x100 [ 3174.181623][T17920] generic_perform_write+0x1e4/0x3a0 [ 3174.186949][T17920] ? shmem_write_begin+0x100/0x100 [ 3174.192101][T17920] __generic_file_write_iter+0x161/0x300 [ 3174.197755][T17920] ? generic_write_checks+0x250/0x290 [ 3174.203145][T17920] generic_file_write_iter+0x75/0x130 [ 3174.208534][T17920] vfs_write+0x69d/0x770 [ 3174.212831][T17920] __x64_sys_pwrite64+0xf5/0x150 04:50:09 executing program 0: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3174.217785][T17920] do_syscall_64+0x4a/0x90 [ 3174.222221][T17920] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3174.228233][T17920] RIP: 0033:0x419797 [ 3174.232149][T17920] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3174.252083][T17920] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3174.260510][T17920] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:09 executing program 0: mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:10 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) 04:50:10 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x0, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:10 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x5, 0x100400) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000220, &(0x7f0000000200)={'trans=unix,', {[{@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x62, 0x38, 0x64, 0x65, 0x64, 0x39], 0x2d, [0x30, 0x35, 0x35, 0x63], 0x2d, [0x61, 0x33, 0x62, 0x31], 0x2d, [0x35, 0x3a, 0x66, 0x24cc8052adbd239b], 0x2d, [0x34, 0x61, 0x36, 0x36, 0x36, 0x63, 0x0, 0x32]}}}]}}) eventfd2(0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x438a2, 0x0) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000380)='./file0/file0\x00', 0x6b3, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="146796c006a76ea277fd920a103546d2324f60ee051e439141c4f3bf07f490800f23fdb7295cdfe55302d65aeb1c2cee40c17e63c6c6ee2d633ef49699b8307b84d5a8e932d0cfbe7d3cf498", 0x4c}, {&(0x7f0000000440)="e69b89128d2d6ecba5d24123f56fac351edbfa0cd6b2befde72b66255962d10099c5cf64284a6698b3110cde6f00b06ba980c3516f90bb6e6c9d4d64831644399eaaae09bc4f3f8ceca9", 0x4a, 0x2}, {&(0x7f00000004c0)="719abedeb30ed77cace5439df155c507336b501495ef8d998c941515954f48e2966247ff6b62abc147d93ade50de4b3bd4b0b51749c3e9dbdb70f5257a18254640ea59e2ebd97a8554bf2a92edbef39adfac8dcf9710cc1d8d60381e1bae5945193d0af03479fe897b9e0dcfcaa00abf3ce7bed7c65f18fd453bd2ffdb016c0bf6c5df048213cc7109f0d483599772e84c9f105ffdcefd1f43df3ed8f270543d4b7b9d207571dfd3e0ebfdf05d2bd108d1be5f061ce45abb3140a283b2477d494af961a4d0c756f0256e1522df18fa", 0xcf, 0x7}], 0x0, &(0x7f0000000640)={[{}, {@dots}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) [ 3174.268510][T17920] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3174.276510][T17920] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3174.284544][T17920] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3174.292519][T17920] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x373, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3174.415290][T17946] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:10 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:10 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = geteuid() syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0xb1c000, &(0x7f0000000500)={[], [{@fowner_eq={'fowner', 0x3d, r0}}, {@fsmagic={'fsmagic', 0x3d, 0x1ff}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, 'smackfsroot'}}, {@smackfsroot={'smackfsroot', 0x3d, ':,{'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r1) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r1) getpeername(r1, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x80) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_TYPE={0x5, 0x4, 0x3}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20048800}, 0x81) 04:50:10 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x0, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:10 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x374, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:10 executing program 1 (fault-call:2 fault-nth:0): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x375, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3174.578937][T17969] FAULT_INJECTION: forcing a failure. [ 3174.578937][T17969] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3174.592233][T17969] CPU: 1 PID: 17969 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3174.602214][T17969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3174.612269][T17969] Call Trace: [ 3174.615558][T17969] dump_stack+0x137/0x19d [ 3174.619899][T17969] should_fail+0x23c/0x250 [ 3174.624355][T17969] __alloc_pages+0xe7/0x310 04:50:10 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x800) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000380)=""/4096) 04:50:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x376, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3174.628886][T17969] alloc_pages_vma+0x3c3/0x5e0 [ 3174.633682][T17969] shmem_getpage_gfp+0x980/0x1410 [ 3174.638715][T17969] shmem_write_begin+0x7e/0x100 [ 3174.643630][T17969] generic_perform_write+0x196/0x3a0 [ 3174.648921][T17969] ? shmem_write_begin+0x100/0x100 [ 3174.654037][T17969] __generic_file_write_iter+0x161/0x300 [ 3174.659716][T17969] ? generic_write_checks+0x250/0x290 [ 3174.665264][T17969] generic_file_write_iter+0x75/0x130 [ 3174.670643][T17969] vfs_write+0x69d/0x770 04:50:10 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3174.674893][T17969] __x64_sys_pwrite64+0xf5/0x150 [ 3174.679827][T17969] do_syscall_64+0x4a/0x90 [ 3174.684326][T17969] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3174.690219][T17969] RIP: 0033:0x419797 [ 3174.694125][T17969] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3174.713809][T17969] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3174.722235][T17969] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3174.729922][T17971] FAULT_INJECTION: forcing a failure. [ 3174.729922][T17971] name failslab, interval 1, probability 0, space 0, times 0 [ 3174.730205][T17969] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3174.750758][T17969] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3174.758733][T17969] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3174.766725][T17969] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3174.774736][T17971] CPU: 0 PID: 17971 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3174.784586][T17971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3174.794650][T17971] Call Trace: [ 3174.800175][T17971] dump_stack+0x137/0x19d [ 3174.804530][T17971] should_fail+0x23c/0x250 [ 3174.809036][T17971] __should_failslab+0x81/0x90 [ 3174.813818][T17971] ? __se_sys_mount+0xf2/0x2e0 [ 3174.818641][T17971] should_failslab+0x5/0x20 [ 3174.823141][T17971] kmem_cache_alloc_trace+0x49/0x310 [ 3174.828428][T17971] ? __fget_light+0x21b/0x260 [ 3174.833121][T17971] __se_sys_mount+0xf2/0x2e0 [ 3174.837731][T17971] ? fput+0x2d/0x130 [ 3174.841631][T17971] ? ksys_write+0x157/0x180 [ 3174.846137][T17971] __x64_sys_mount+0x63/0x70 [ 3174.850799][T17971] do_syscall_64+0x4a/0x90 [ 3174.855258][T17971] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3174.861157][T17971] RIP: 0033:0x4665f9 04:50:10 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:10 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x377, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3174.865112][T17971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3174.884716][T17971] RSP: 002b:00007f5c11367188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3174.893150][T17971] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 3174.901122][T17971] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3174.909154][T17971] RBP: 00007f5c113671d0 R08: 0000000020000200 R09: 0000000000000000 [ 3174.917142][T17971] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000001 [ 3174.924663][T17997] FAULT_INJECTION: forcing a failure. [ 3174.924663][T17997] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3174.925130][T17971] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 [ 3174.946226][T17997] CPU: 1 PID: 17997 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3174.956051][T17997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3174.966113][T17997] Call Trace: [ 3174.969404][T17997] dump_stack+0x137/0x19d [ 3174.973750][T17997] should_fail+0x23c/0x250 04:50:10 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3174.978175][T17997] should_fail_usercopy+0x16/0x20 [ 3174.983227][T17997] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3174.989294][T17997] ? shmem_write_begin+0x7e/0x100 [ 3174.994441][T17997] generic_perform_write+0x1e4/0x3a0 [ 3174.999740][T17997] ? shmem_write_begin+0x100/0x100 [ 3175.004871][T17997] __generic_file_write_iter+0x161/0x300 [ 3175.010532][T17997] ? generic_write_checks+0x250/0x290 [ 3175.015912][T17997] generic_file_write_iter+0x75/0x130 [ 3175.021288][T17997] vfs_write+0x69d/0x770 [ 3175.025560][T17997] __x64_sys_pwrite64+0xf5/0x150 [ 3175.030499][T17997] do_syscall_64+0x4a/0x90 [ 3175.034925][T17997] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3175.040917][T17997] RIP: 0033:0x419797 [ 3175.044807][T17997] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3175.064412][T17997] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3175.072807][T17997] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:10 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x0, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:10 executing program 1 (fault-call:2 fault-nth:1): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x378, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:10 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3175.080820][T17997] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3175.088783][T17997] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3175.096956][T17997] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3175.104905][T17997] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3175.190444][T18015] FAULT_INJECTION: forcing a failure. [ 3175.190444][T18015] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3175.203531][T18015] CPU: 1 PID: 18015 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3175.213345][T18015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3175.223469][T18015] Call Trace: [ 3175.226753][T18015] dump_stack+0x137/0x19d [ 3175.231093][T18015] should_fail+0x23c/0x250 [ 3175.235607][T18015] should_fail_usercopy+0x16/0x20 04:50:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x379, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3175.240639][T18015] _copy_from_user+0x1c/0xd0 [ 3175.245260][T18015] __se_sys_mount+0x115/0x2e0 [ 3175.249974][T18015] ? fput+0x2d/0x130 [ 3175.253873][T18015] ? ksys_write+0x157/0x180 [ 3175.258451][T18015] __x64_sys_mount+0x63/0x70 [ 3175.263040][T18015] do_syscall_64+0x4a/0x90 [ 3175.267466][T18015] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3175.273382][T18015] RIP: 0033:0x4665f9 04:50:11 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x5, &(0x7f00000002c0)=[{&(0x7f00000000c0)="df03287889da73446798f3b12d8d89a9e2b1063aa25e10c48185d55b7d29fcff56cb11ea47a88ca19085b141d6c0f338a28e8b988e4291cbe8e59a7b7620ed0d03f060f61fa6e0a013a1c7240890c19c3b6cef89d481cbc18280ce18a1715c024130bafa56b7c2f3e4867bbb160119fe6f14bddeb8ff61d80dd2ac9b67ebb776bee5987b5cd548ebff1404bfe699d04cd5e6bd76c2154faf312743f97bfa43536ee11277fa0c2ca6b04c88c8171a142b86", 0xb1, 0x1ff}, {&(0x7f0000000200)="2ea8259e28f5f455f6f55c7a1739ff8df47ea4", 0x13, 0xfffffffffffff7ac}, {&(0x7f0000000240)="37868b4e564c274e4893996f72a70e12bc397ef5a6264c4e56243791d9f99936a4a3fcd6b13fb57556802611325ae7504e4387205ca4a0f4dc345e3378747093438f9cbda2237dcd3d2f1c53d28938d985eccf48c6824b3f4d8d682aad9b752d0e77b98f7fc4dd2c3a3c93a846a1844c0077975185558745", 0x78, 0x53a}, {&(0x7f0000000380)="72300c69ca233953a097efa843a776c0092600b7306a895afa61ca87b81596bdf9ff55a540e096b8118220befe2611826a332f9246b3b8bc19b5c2d2687ed84a3c0a14adf359e7a3afade4377cba33973960b82f4ba0d38a5fefd5f722531c9e4056480a2f1798d1ebc6743e53899e4f33ef725cc9e7b4ea74c6d07f6322cfc8b7d5b61a057290aaf7e6b92c2cb68c09d2c6184918d4e38c6a85d345510c70fae37233", 0xa3, 0x5}, {&(0x7f0000000440)="061210eb831435d214b30e6f148df374ac37488fb2b1a8896ae0bdac9b8a3e61acbe369616d1f099bb0a7080f58e239dbb839d9472677b0882b0b53a3eaac00e84ceffd878d1e57e751e5acf6f549b7f2ea04de4ecc2e4f199b60767493061fc4067e4345ac654a0bd9513acd4408d43f5ff6cc52d4c1c874ffdb787369a44410a5729499a47ffcfc049dee26e2150a0c4b28ae60bacfee0531ca049a318b2395ba3737c1fa06f449bd54a2ec6d62c842fb0f8ff3b02b0dbd215318cd18e85b6a797eb06d9985a575861089e2c55b0a3c6d516615b4aeb9bdb2ad287cd4c65d09b186b6337d3889d6f8667db584e21bafc09dc5ede", 0xf5, 0x9}], 0x2, &(0x7f0000000540)={[{@dots}, {@fat=@usefree}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x40}}, {@nodots}, {@dots}, {@nodots}, {@fat=@errors_remount}, {@nodots}, {@nodots}, {@nodots}], [{@dont_hash}, {@appraise}]}) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:11 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3175.277272][T18015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3175.296887][T18015] RSP: 002b:00007f5c11367188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3175.305344][T18015] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 3175.313421][T18015] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3175.321518][T18015] RBP: 00007f5c113671d0 R08: 0000000020000200 R09: 0000000000000000 [ 3175.329492][T18015] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000001 04:50:11 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x0, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3175.337513][T18015] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 [ 3175.399017][T18031] loop5: detected capacity change from 0 to 16375 [ 3175.417037][T18031] FAT-fs (loop5): Unrecognized mount option "dont_hash" or missing value [ 3175.422443][T18015] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:11 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:11 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:11 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30]}}}]}) 04:50:11 executing program 1 (fault-call:2 fault-nth:2): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:11 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) epoll_create1(0x80000) renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) rmdir(&(0x7f0000000000)='./file0\x00') [ 3175.559678][T18056] FAULT_INJECTION: forcing a failure. [ 3175.559678][T18056] name failslab, interval 1, probability 0, space 0, times 0 [ 3175.570501][T18059] FAULT_INJECTION: forcing a failure. [ 3175.570501][T18059] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3175.572437][T18056] CPU: 0 PID: 18056 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3175.595481][T18056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3175.605528][T18056] Call Trace: [ 3175.608815][T18056] dump_stack+0x137/0x19d [ 3175.613187][T18056] should_fail+0x23c/0x250 [ 3175.617652][T18056] ? getname_flags+0x84/0x3d0 [ 3175.622335][T18056] __should_failslab+0x81/0x90 [ 3175.627179][T18056] should_failslab+0x5/0x20 [ 3175.631692][T18056] kmem_cache_alloc+0x46/0x2f0 [ 3175.636464][T18056] getname_flags+0x84/0x3d0 [ 3175.640991][T18056] user_path_at_empty+0x28/0x50 [ 3175.645834][T18056] __se_sys_mount+0x209/0x2e0 [ 3175.650503][T18056] ? fput+0x2d/0x130 [ 3175.654406][T18056] ? ksys_write+0x157/0x180 [ 3175.658906][T18056] __x64_sys_mount+0x63/0x70 [ 3175.663505][T18056] do_syscall_64+0x4a/0x90 [ 3175.667976][T18056] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3175.673865][T18056] RIP: 0033:0x4665f9 [ 3175.677799][T18056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3175.697454][T18056] RSP: 002b:00007f5c11367188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3175.705862][T18056] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 3175.713828][T18056] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3175.721795][T18056] RBP: 00007f5c113671d0 R08: 0000000020000200 R09: 0000000000000000 [ 3175.729762][T18056] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000001 [ 3175.739193][T18056] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 [ 3175.747176][T18059] CPU: 1 PID: 18059 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 04:50:11 executing program 1 (fault-call:2 fault-nth:3): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) [ 3175.757017][T18059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3175.767174][T18059] Call Trace: [ 3175.770477][T18059] dump_stack+0x137/0x19d [ 3175.774807][T18059] should_fail+0x23c/0x250 [ 3175.779222][T18059] __alloc_pages+0xe7/0x310 [ 3175.783723][T18059] alloc_pages_vma+0x3c3/0x5e0 [ 3175.788498][T18059] shmem_getpage_gfp+0x980/0x1410 [ 3175.793573][T18059] shmem_write_begin+0x7e/0x100 [ 3175.798481][T18059] generic_perform_write+0x196/0x3a0 [ 3175.803932][T18059] ? shmem_write_begin+0x100/0x100 04:50:11 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3175.809116][T18059] __generic_file_write_iter+0x161/0x300 [ 3175.814746][T18059] ? generic_write_checks+0x250/0x290 [ 3175.820115][T18059] generic_file_write_iter+0x75/0x130 [ 3175.825483][T18059] vfs_write+0x69d/0x770 [ 3175.829758][T18059] __x64_sys_pwrite64+0xf5/0x150 [ 3175.834695][T18059] do_syscall_64+0x4a/0x90 [ 3175.839179][T18059] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3175.845127][T18059] RIP: 0033:0x419797 04:50:11 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:11 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3175.849029][T18059] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3175.868640][T18059] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3175.877061][T18059] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3175.885028][T18059] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3175.893107][T18059] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3175.901074][T18059] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:11 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000006c0)={'wpan1\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000006c0)={'wpan1\x00'}) r2 = geteuid() syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10001, 0x2, &(0x7f0000000140)=[{&(0x7f0000000700)="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", 0x1000, 0x800}, {&(0x7f0000000200)="0e70ca6345d9035d2fc7f5cf7feb93a815f9814aca44d2aed80ef80ddc264fed78520379bc1b83e751126ee4b9404262ae6ba3500c63580de7372f11d0082ef2f6b94c539f45a7c4f6c914a8faccdd52db2d8cf72284fde89360bcce219efd72125713327fd79ee2895580a67489e437fd2d25d5e52ca9d72276a3c14858a5748129760f2d8522bc2fae657b8bce9c0e18710ca17821c5100dae4fa7133bae383fcfd5e8648b8dd1747652759d5ba1486218f7ef50d01b2a5b616a1d974352ec6b5f5d60dae282fc10452ae4a69c39525584200a00bcb5aa600754", 0xdb, 0x5}], 0x0, &(0x7f0000000400)={[{@huge_within_size}, {@gid}, {@uid={'uid', 0x3d, r2}}, {@huge_always}, {@size={'size', 0x3d, [0x34, 0x9, 0x74, 0x33, 0x39, 0x36, 0x67]}}], [{@subj_role={'subj_role', 0x3d, '+'}}, {@obj_type={'obj_type', 0x3d, 'wpan1\x00'}}, {@uid_gt}, {@fowner_lt={'fowner<', 0xee00}}, {@subj_user={'subj_user', 0x3d, '/}\'('}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x7ffffffffffffc, 0x0, 0x0, 0x30c001, &(0x7f00000000c0)=ANY=[@ANYRES32=r1]) creat(&(0x7f0000000500)='./file0\x00', 0xf0) [ 3175.909049][T18059] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:11 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:11 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30]}}}]}) 04:50:11 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3176.021376][T18083] FAULT_INJECTION: forcing a failure. [ 3176.021376][T18083] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3176.034470][T18083] CPU: 1 PID: 18083 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3176.044313][T18083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3176.054415][T18083] Call Trace: [ 3176.057688][T18083] dump_stack+0x137/0x19d [ 3176.062069][T18083] should_fail+0x23c/0x250 [ 3176.066567][T18083] should_fail_usercopy+0x16/0x20 [ 3176.071626][T18083] strncpy_from_user+0x21/0x250 [ 3176.076475][T18083] getname_flags+0xb8/0x3d0 [ 3176.080984][T18083] user_path_at_empty+0x28/0x50 [ 3176.085837][T18083] __se_sys_mount+0x209/0x2e0 [ 3176.088500][T18084] loop5: detected capacity change from 0 to 128 [ 3176.090539][T18083] ? fput+0x2d/0x130 [ 3176.090563][T18083] ? ksys_write+0x157/0x180 [ 3176.100995][T18084] tmpfs: Unsupported parameter 'huge' [ 3176.105136][T18083] __x64_sys_mount+0x63/0x70 [ 3176.105170][T18083] do_syscall_64+0x4a/0x90 [ 3176.119791][T18083] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3176.125672][T18083] RIP: 0033:0x4665f9 [ 3176.129556][T18083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3176.149229][T18083] RSP: 002b:00007f5c11367188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3176.157675][T18083] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 04:50:11 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30]}}}]}) [ 3176.165644][T18083] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3176.173606][T18083] RBP: 00007f5c113671d0 R08: 0000000020000200 R09: 0000000000000000 [ 3176.181562][T18083] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000001 [ 3176.190312][T18083] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 [ 3176.214712][T18089] FAULT_INJECTION: forcing a failure. [ 3176.214712][T18089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3176.227824][T18089] CPU: 1 PID: 18089 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3176.237673][T18089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3176.247887][T18089] Call Trace: [ 3176.251160][T18089] dump_stack+0x137/0x19d [ 3176.255571][T18089] should_fail+0x23c/0x250 [ 3176.260015][T18089] should_fail_usercopy+0x16/0x20 [ 3176.265087][T18089] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3176.271155][T18089] ? shmem_write_begin+0x7e/0x100 [ 3176.276184][T18089] generic_perform_write+0x1e4/0x3a0 [ 3176.281517][T18089] ? shmem_write_begin+0x100/0x100 [ 3176.286629][T18089] __generic_file_write_iter+0x161/0x300 [ 3176.292270][T18089] ? generic_write_checks+0x250/0x290 [ 3176.297641][T18089] generic_file_write_iter+0x75/0x130 [ 3176.303010][T18089] vfs_write+0x69d/0x770 [ 3176.307373][T18089] __x64_sys_pwrite64+0xf5/0x150 [ 3176.312314][T18089] do_syscall_64+0x4a/0x90 [ 3176.316831][T18089] entry_SYSCALL_64_after_hwframe+0x44/0xae 04:50:12 executing program 1 (fault-call:2 fault-nth:4): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:12 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) statx(r0, &(0x7f0000000000)='./file0\x00', 0x4000, 0x7ff, &(0x7f0000000080)) 04:50:12 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3176.322730][T18089] RIP: 0033:0x419797 [ 3176.326654][T18089] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3176.346275][T18089] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3176.354696][T18089] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3176.362666][T18089] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3176.370641][T18089] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3176.378609][T18089] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3176.386577][T18089] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:12 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3176.457434][T18125] FAULT_INJECTION: forcing a failure. [ 3176.457434][T18125] name failslab, interval 1, probability 0, space 0, times 0 [ 3176.470228][T18125] CPU: 1 PID: 18125 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3176.480066][T18125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3176.488050][T18127] EXT4-fs: 18 callbacks suppressed [ 3176.488066][T18127] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3176.490168][T18125] Call Trace: [ 3176.490179][T18125] dump_stack+0x137/0x19d [ 3176.512385][T18125] should_fail+0x23c/0x250 [ 3176.516866][T18125] __should_failslab+0x81/0x90 [ 3176.521698][T18125] ? alloc_fs_context+0x46/0x500 [ 3176.526651][T18125] should_failslab+0x5/0x20 [ 3176.531159][T18125] kmem_cache_alloc_trace+0x49/0x310 [ 3176.536550][T18125] alloc_fs_context+0x46/0x500 [ 3176.541318][T18125] ? security_capable+0x91/0xa0 [ 3176.546157][T18125] fs_context_for_reconfigure+0x42/0x50 [ 3176.551691][T18125] path_mount+0x1212/0x1ce0 [ 3176.556194][T18125] __se_sys_mount+0x23d/0x2e0 [ 3176.560853][T18125] ? fput+0x2d/0x130 [ 3176.564750][T18125] __x64_sys_mount+0x63/0x70 [ 3176.569335][T18125] do_syscall_64+0x4a/0x90 [ 3176.573788][T18125] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3176.579688][T18125] RIP: 0033:0x4665f9 [ 3176.583579][T18125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3176.603191][T18125] RSP: 002b:00007f5c11367188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3176.611600][T18125] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 3176.619571][T18125] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3176.627562][T18125] RBP: 00007f5c113671d0 R08: 0000000020000200 R09: 0000000000000000 [ 3176.635530][T18125] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000001 [ 3176.643501][T18125] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 04:50:12 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:12 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:12 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, 0x0, 0x1000002, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x380, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:12 executing program 1 (fault-call:2 fault-nth:5): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:12 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39]}}}]}) [ 3176.792794][T18151] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3176.795837][T18155] FAULT_INJECTION: forcing a failure. [ 3176.795837][T18155] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3176.815623][T18155] CPU: 0 PID: 18155 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3176.825424][T18155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3176.835472][T18155] Call Trace: [ 3176.838801][T18155] dump_stack+0x137/0x19d 04:50:12 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:12 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x67}) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x381, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3176.843142][T18155] should_fail+0x23c/0x250 [ 3176.847560][T18155] __alloc_pages+0xe7/0x310 [ 3176.852130][T18155] alloc_pages_vma+0x3c3/0x5e0 [ 3176.856893][T18155] shmem_getpage_gfp+0x980/0x1410 [ 3176.861946][T18155] shmem_write_begin+0x7e/0x100 [ 3176.866802][T18155] generic_perform_write+0x196/0x3a0 [ 3176.872090][T18155] ? shmem_write_begin+0x100/0x100 [ 3176.877279][T18155] __generic_file_write_iter+0x161/0x300 [ 3176.878965][T18159] FAULT_INJECTION: forcing a failure. [ 3176.878965][T18159] name failslab, interval 1, probability 0, space 0, times 0 [ 3176.882927][T18155] ? generic_write_checks+0x250/0x290 [ 3176.882951][T18155] generic_file_write_iter+0x75/0x130 [ 3176.906237][T18155] vfs_write+0x69d/0x770 [ 3176.910570][T18155] __x64_sys_pwrite64+0xf5/0x150 [ 3176.915503][T18155] do_syscall_64+0x4a/0x90 [ 3176.919921][T18155] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3176.925816][T18155] RIP: 0033:0x419797 [ 3176.929707][T18155] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3176.949315][T18155] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3176.957736][T18155] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3176.965799][T18155] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3176.973792][T18155] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3176.981803][T18155] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3176.991395][T18155] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3176.999397][T18159] CPU: 1 PID: 18159 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3177.009244][T18159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3177.019297][T18159] Call Trace: [ 3177.022573][T18159] dump_stack+0x137/0x19d [ 3177.027006][T18159] should_fail+0x23c/0x250 [ 3177.031417][T18159] __should_failslab+0x81/0x90 [ 3177.036234][T18159] ? legacy_init_fs_context+0x2d/0x70 04:50:12 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x382, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x383, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3177.041751][T18159] should_failslab+0x5/0x20 [ 3177.046287][T18159] kmem_cache_alloc_trace+0x49/0x310 [ 3177.051612][T18159] ? kmem_cache_alloc_trace+0x215/0x310 [ 3177.057159][T18159] ? alloc_fs_context+0x46/0x500 [ 3177.062101][T18159] legacy_init_fs_context+0x2d/0x70 [ 3177.067347][T18159] alloc_fs_context+0x419/0x500 [ 3177.072201][T18159] fs_context_for_reconfigure+0x42/0x50 [ 3177.077812][T18159] path_mount+0x1212/0x1ce0 [ 3177.082316][T18159] __se_sys_mount+0x23d/0x2e0 [ 3177.086995][T18159] ? fput+0x2d/0x130 [ 3177.090900][T18159] __x64_sys_mount+0x63/0x70 [ 3177.095491][T18159] do_syscall_64+0x4a/0x90 [ 3177.099954][T18159] ? irqentry_exit_to_user_mode+0x5/0x20 [ 3177.105594][T18159] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3177.106355][T18168] FAULT_INJECTION: forcing a failure. [ 3177.106355][T18168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3177.111510][T18159] RIP: 0033:0x4665f9 [ 3177.111528][T18159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3177.111545][T18159] RSP: 002b:00007f5c11367188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3177.156412][T18159] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 3177.164457][T18159] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3177.172431][T18159] RBP: 00007f5c113671d0 R08: 0000000020000200 R09: 0000000000000000 [ 3177.180577][T18159] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000001 [ 3177.188580][T18159] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 [ 3177.196596][T18168] CPU: 0 PID: 18168 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3177.206518][T18168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3177.216608][T18168] Call Trace: [ 3177.220022][T18168] dump_stack+0x137/0x19d [ 3177.224367][T18168] should_fail+0x23c/0x250 [ 3177.228796][T18168] should_fail_usercopy+0x16/0x20 [ 3177.234001][T18168] iov_iter_copy_from_user_atomic+0x281/0xb60 04:50:12 executing program 1 (fault-call:2 fault-nth:6): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:12 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3177.240166][T18168] ? shmem_write_begin+0x7e/0x100 [ 3177.245201][T18168] generic_perform_write+0x1e4/0x3a0 [ 3177.250516][T18168] ? shmem_write_begin+0x100/0x100 [ 3177.255693][T18168] __generic_file_write_iter+0x161/0x300 [ 3177.261416][T18168] ? generic_write_checks+0x250/0x290 [ 3177.267008][T18168] generic_file_write_iter+0x75/0x130 [ 3177.272471][T18168] vfs_write+0x69d/0x770 [ 3177.276733][T18168] __x64_sys_pwrite64+0xf5/0x150 [ 3177.281803][T18168] do_syscall_64+0x4a/0x90 [ 3177.286299][T18168] entry_SYSCALL_64_after_hwframe+0x44/0xae 04:50:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x384, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3177.292251][T18168] RIP: 0033:0x419797 [ 3177.296155][T18168] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3177.315782][T18168] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3177.324208][T18168] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3177.332186][T18168] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 04:50:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x385, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30]}}}]}) [ 3177.340164][T18168] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3177.348137][T18168] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3177.356127][T18168] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x387, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3177.458681][T18189] FAULT_INJECTION: forcing a failure. [ 3177.458681][T18189] name failslab, interval 1, probability 0, space 0, times 0 [ 3177.469709][T18192] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3177.471354][T18189] CPU: 0 PID: 18189 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3177.490652][T18189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3177.500751][T18189] Call Trace: [ 3177.504030][T18189] dump_stack+0x137/0x19d [ 3177.508374][T18189] should_fail+0x23c/0x250 [ 3177.512820][T18189] ? selinux_sb_eat_lsm_opts+0x6b5/0x7e0 [ 3177.518498][T18189] __should_failslab+0x81/0x90 [ 3177.523269][T18189] should_failslab+0x5/0x20 [ 3177.527773][T18189] __kmalloc_track_caller+0x64/0x340 [ 3177.533153][T18189] ? filename_lookup+0x2be/0x390 [ 3177.538094][T18189] ? ___cache_free+0x3c/0x300 [ 3177.542840][T18189] kmemdup_nul+0x27/0x70 [ 3177.547088][T18189] selinux_sb_eat_lsm_opts+0x6b5/0x7e0 [ 3177.552560][T18189] security_sb_eat_lsm_opts+0x42/0x90 04:50:13 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x205020, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f0000001a80)=ANY=[@ANYBLOB="00fb1507010538181200e4a870b8cd37f7bb9ea693d1f184a630d041d2d620ed1196bee69ea0373d61259e7098a39916162411b571f713440f086fe36438c6cbb5723366021ba8f2661334a3be251990a1429659c56eab3b0756aec1f5826a57188ff18b32c9451f32f6109f42286517bdec7aef3a4c40555c839c6fd391bdfc8bbe0aa5b1cf31859a219c03dfb6b9be9e682ee895061e1927cd4616f3809b499ae49d780379d4c027a11782e6623bc4cdc09ad68286784673d3aef0470d527975ab86f73a83515cc8e49806634e92bf2a31a23cd7eaa297a5e93a42edcff7e6d4453b86549689d8b6162be48c61752aae44e270671bad31c3660036b79bf7f332e5a2539b9338d361c23f9745ba41100c5368bc8ed97736040d3de10293d6acc0d578712afb78b145bf5abc4c39a7e60fd46af44e4e3d8be96bad3dfe0bb0f474bbaeecc47865f3e6f3cafb9abd66cc16de85fc8a8aae4ee963c6e9b329b1513feb2d26e99ba939bc3dc52cd4fb5cd1042e2563d079711e6a03490c7461757580789294b0a42ebccc1c64d74e0ae57360d02228db91df3187bf08243ae6027aaf83a4b95dd3e04ef2049620a927228779ddbec049a18254c2985e1c2ace71c3c3312c4a08be70f0416a857a9d35eac1dc0721a8ef804e9c106838c1eead76a879756a06128ef979ee6c0c9fb3db087166b605616faa5ecd8f5e1a0a2340e90be0de2a2e96580a60d5b3f158dfd0094ec8a03c2aae45bc0072362ebe749cc1d7763f15c7a2accb66db9651e1c59a50d641787f561141a66a3d1935ac7803f9e9099aae811c910d4ba9faba0edfe9af8546a1df245a7b94cc53d3a1d15a00eea1cb6fe4bd159d8b93f65a1b9321aae54ff7d3ef59f8db20506a8c7e9702f5e86d68c315c30308b6d2440873e1af0d788c99912e048bc4e83dc53cffc91014d59be69337244484834645bc62c7495377a3bd45dd6a27080fe8a4a0c58ca3137e3b166b68f0898ec0b44ad337a0458fe62fb03d2167964814cc74deda580b5a317580e6acd3782106e9bead6b1777a86c1510a85e000d30a72147358200204f24a255032e08da436b856fa6e0016c5f04b6cc7bb4acb40e9e7e3383a3386532497ff94e9777ae00a185e50a3d910d065bec08197cedb14544715015d93fb1bc81251c7cffd4ed9b1a5c8069fec10dee2ea72eec0b159cc9c3d0b2aa3071a9d6dce26ae8f57bb8924ff68f936be68b9c10faf5342b72978dd38fa0343b1e27f756a52570441a54708c6510c449cad0a9dcf841d3b7631241939f3df24571ed6002ec48487df27cf1b7cf3090379a8676e1ec7a6b8fc2aff2d26ca90ba516f1fba5b78fea6cc706d142cb2569cd9a87ffe5836a3ccf3869fbad2ab793dfac02bb0466a742d1d20bc405e1e8d8b52863f1ce9246a20f886458528ea8c6d1a6fe7a231b98b461bbd3ed7f9a25dd562c2742d69d8013c377a95c982d1ecec30bcfde23c8e8f9c5bd6b25ffe0e9b9fe406e50f425861af787f8fd9db2ed1dcc2c3f84afd56273208e7babbf33dd5db58c1ab92de8db21dd6e7e4c69a9ba9b732201f6fa0e85581ba26da72a9883a4021042b324a482a713a4c07493c12dbe51df824d73873a0afbce1e62f3ae26f21601b977cd981da4c6565bfadaca7e4571c2cec993e693f054d4f51f8d3c9af800255b9ce6488e276cd86e11be0ba2d161919a7518ad5b5e28a45f3a85c9c7c59ec6c1d64b9c8a7e4464a22622ad58a401cf8f706d4e477fffd34020cdf1332b748fb97a479ef8d6475d97f401cb1de8a2c63d388cb4257dc7530de89f974a0b8e1bfa751de061761e89c4e2d6233beb6afa40a67eed08e8044d056a11e200566e089ab60dd30509615b067ff173bec411099ba0c6740c33ee70a8fee75b60593544d4ac99bf7dc0732dbe23cd0669605dd5db3e5c83eb092ab8b1e9d1d84f9b9ce08106adc78a3a04d0b10b255e1c27dc68428b321ef3191fc1a461f978cb6a505fe5de3a7ca0b6f7ad1463d444c4ff31c7be3b9ce9141c79b4f175575b337d067eb0fc71c1d29f05f09eb8f03fe6ca6aaafc377e503184a2246abd074e9f0db8ed2eab700de187d0bf3132ca25fd03e3c6bd187b700cce9898d52e8b3272a16ed1796b69ae21fee31214d4bf0be4799c62efbc6790e776c8c34f4fc4325b5582283c1f24061fb53f7745df5548a2ef227f179f2caccbce3d245b06aefb8d0885f2f92529e929d8216e48b394c976e00271c39f1cb516d7db6d1f0b60da4c74ed75fb69320d171bbc53c9fa8d902231ff33bef7c73274df7b471b3dbef2e3bf8c8518b1dcdc96af80d4144a17f0a712a66cbea5ce95c04ff870f5b0ec0f171a674bb836b1b938eba017bf4114e79698978fe394b39cefc1447358d396b1a17a8b4b81ec23770bf28af8005b1e12f7a79f0875aa0bf719ee417398c85174e4e9dbac5d21dc00f844286399fd7e350cf1ec3a3aa132aa17dd55ef2225e1f11714059d3d8bb09815d325f492aff80a77e3643d9b0c52fc9f75d3d831a1105904e49ef7fed605f6b8534e36d50d5a6704bce71c9e54cc8065485a9eb1cba81c0d41b6e355623bb62b0f32df4b7eb3069f8fd714626773706829ab618e16a4c7f5eb6fbcec0b3e148b5d35736120d77dc2ee3a2aad881e588adf6ec93b6892d79bb04df9a9dbd729a892693f2af161f9de4eb9cc2b969fe5c59bfd863e262d1746151b4122cc78d49f22aafeefe723aad3292403eb7eabbded275c4816a69d7440ccdc6b3b7d54315c63ee039725d9ff12ff4f678ade6f0e8136aa3ce1d2336ead9487210f227195311ebef27fbd266d9bc0511d388f3fd01a1706cdc493764a9f5c50d219741dd3610f8a6953f769a6f048dcc3d8da75c5b58e871669ea0b2c877e6114390cce249ca466719022e1f7246f8e9a2f7d27367a5b78b8f3dd5bf974bcaa15c80e62ae0735088bd17cf0a620f10774fbd1d34785c4a7080ed6b025a80e615080cc15946f4b3cbf354e228940914d5f79539c258b532184c2265232d345177749d28e3e0dca56b4a891b034c7bd2f6498d588a3f7e6b7c546d8edef016340b3f2547fc9bde6094639d2f0a3f84887dfe03f818fab7b8fca0a4fc26f1ec09e1f6c1e8cc2d8a97a2543a337bfa63f009a6303afc811d8ab0a405518bcbe9e84681866bb06be020abf87f9c2db81530146c6deb832e52a8eb4a36bcd3e88030c0a54e94978bbba2fc60fd97a0de236ec3467cc110d95a683e33ce9a80b207c945daffb5280b84086887188fc03d32687d6bf4503e812dd18fe3ae296c5e1ff1becbc0c7e1f7aa2be12b6721268ea61f7e5b6fab8798b5c252bb1b36d08ba258e45ffab6ae81aaab83ab806e128090c4bfc5dd2c9b40a42246e6146a8266ddf894c357e4a5478d98af7911c8d57efba62b5cc1653f3866769087f51aebe767ea185c7d48cb3b22ac60243f9de8c7ed878a21a65c5e8f26848975cde9ae58f670573eb1f540dede0eef1ebe1cd855e59eb4ca78b7616a14772b68dd57bd36ff339a9763b2d585b7b17d5fba14ef60b786bafffb84b81a1bc8849e6b41109f19c9424123fb258548f287e9bc716a067ad06f789ffa7369f1703456dac4dbad9bea228b1bcfe6d7184a91a0915e8bb0a70e31e3c1f0ad3b6637d685aa5f6a9975a4797f931da3506d1d098bc614f3286321d547bfbdc9837817083a52cbcb2c53b34105ad3ce1a8916c678221a595d5196e8672074711f77a2c12224c33268a76a2185082bf7655971b4b590423ecc95fc7ab9c95cb4c4b0f1927dd4ed16021399cf2ac32ec45a298ff33b846ff8ceb07df29c569a1c11775a32d4d9f41f879bdf29f86f30fa34342e277de57f68db77dcc77ec78744df610f64b0173e14a0ca75d0351f36c984e1f8fb1b473d0a42919f58d27efede243e12415dade99150594b2c5d047f810967ab02c21bd6570952787c756394ce5ed3e45933cd5e37346005cc731615c27fdf193c46e9a46bf3fad958052c608410451c8ee97022d2a7598ed8fc84f826c8d5c12304621d8078fd98a00e75b164bf5f95857303899fd835923c723ec473975366477f5c203a9ee8b26f9cdd6be163c00cfa0362cb257adae5f4986272f52960fe2b33aa21c7058f2f41e0ca0c130a437270ee9726081fccb1e836c5487c2f676e0448efe65601640a7f85247ca850b74fbba4eef178b2f33fc3f147c18337bc3094eadaba1d2993e7db86cb38e50576589d89c48ea5d5ba0029fdfc11dbbdb9eb06f6cda595035a2c2b9d4b722a50ec4b007a6cf5fc80c032251fa60bb2904f041585578c760f28d2ee46c3c96774d750f731b36e71af425ea1b6bce77157eb6794b8a2bc3ec2d545149be3958e4c5174ff8c2b64c652cfca1b6477dbe73483cf4059b8e08b5df18a8bbf18dd20c53ed8b4d079c7845e0a09b87326711592bcb34d270ab94f8813213a1a2a06853c8ac571e5fb12af56acb42ba9db135d8bda2058dbd952e7692703184b8630ebbd0431b86c45ac8cdd6785d8a1ca5e60d7c63a12a5411adb130a2c4fe7598e51ea066432a1e1b3b0d7f2a975ac981b3c981ad959f39631677ec8ddbf484fc949dca6e366b8e0fad97d52b9ae0d23c493b46de4b2c29d3f762a0d2dcc035b3bd235baf359b0d58cae4b69dae4e4a7a89d2a57eecb10cd54dfe08684ea65c3adfeb3ce7cb9c21d2aeb81d9ef79771311ee52ca5d77befd9ca3992d28dd099233c438d6b2eed89803cba373ed83293cae0b5f8170abc8110d5cc26d170825a7087a3f0602cd1e7df7f2ccba9f731c0f72284c22435735d9e072872026e0107c78ea910720471b86de9da9bbe180724e8b0c52b0a0da3465db2cec9d9559969dd5edb6910781ddeb1e6e76539725ebf2e0bfc4ba8829de351a6dafe1c9a35919c8f701e53cec7665a1af61870eb6eebf8e218e5c4429a539341af8564ecaaf4a81ceac35f7443a57563d61812aa9e5c22aaf3d7508555be140f904b0fcda7513b3f4d49537f1c5cde0b1e619a554d42227edbb6c7f3bd6e03dfab29459c13ae50bb21caf7c6b736184a49b8474766217b7ecc1a5163d3cfad95a7f6cb3aa96a0a7f9cad996955cc374f44022f1b683df4d34ed35d2c4ca9651efd29a4192182c96db36fccde3d519fd585c3cda0c04a5683a9f5fad0d7fafccfc0852122be92c38441793e50cbea94b90b5e5c2dd9cf7eed0d5f89cd9e9d8c4a073eed07d6407ddd75dc6af2d06982c2dfcb6b8fad071840a7085d16039bd777c5f00de563ec913a5fd9c6e59a3a6ba7877b9993dcacb2e5ab4b43263f62fb429c383c228e1f544cbac53ce2a25b8e98bc7ad82f8a5c3a80ca9cc8ed31d8c3ec065659a753015ade8b36e2d759b076e1e618a899ea5d4738aba0fa7dd32dfa9f4bc13688cad637412f3209e211d8a9114ec5c0a06595622a4cdf5096f02a5c8026c7844bcc62c619392a50bce1e37d357ac391ac1cd5b345b66af8b59339b3a9f026deef412bfb282eee08f839a56449d59ad7f2539c0c9c03225c8ddb029f8dddee1263fd0b1a41b081b19702aa99b4ed5f8cb8a3ffb1b8a0f740aa30a5a4ce4bddec3cb6fd0bb26a688e67471eda368146171f9b912123c59ce71783e14f4ee9b13bfdea1d8ecc4107252f0de31b04437fe74fb66b0f25fc840f3a433831941999e99a9b943b5bf61d5fc4eead4cc5ee4a40334776c01967b4c2e028f00e4d5285c0618957bb05e9db04d6cbf3cfab413fc8a856810d471a23c980cabb5751dff2a2ee3b76dcb756ff6fb1d42d38f0a7bcbca574b3c84036e3849435a51"], 0x1015, 0x1) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) setxattr$security_selinux(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:audit_spool_t:s0\x00', 0x23, 0x7) 04:50:13 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3177.557935][T18189] legacy_parse_monolithic+0x9b/0xe0 [ 3177.563255][T18189] parse_monolithic_mount_data+0x3e/0x50 [ 3177.568893][T18189] path_mount+0x1263/0x1ce0 [ 3177.573439][T18189] __se_sys_mount+0x23d/0x2e0 [ 3177.578164][T18189] ? fput+0x2d/0x130 [ 3177.582078][T18189] __x64_sys_mount+0x63/0x70 [ 3177.586673][T18189] do_syscall_64+0x4a/0x90 [ 3177.591092][T18189] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3177.597096][T18189] RIP: 0033:0x4665f9 [ 3177.601052][T18189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3177.620665][T18189] RSP: 002b:00007f5c11367188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3177.629178][T18189] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 3177.637157][T18189] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3177.645199][T18189] RBP: 00007f5c113671d0 R08: 0000000020000200 R09: 0000000000000000 [ 3177.653173][T18189] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000001 [ 3177.661145][T18189] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 04:50:13 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x388, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:13 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='user.syz\x00') mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffff7, 0x6, &(0x7f0000001540)=[{&(0x7f0000000200)="892650ed493826b247913c6c512a7620c3840a138c24be80d2a0aa2db996492a5d289ef509f2ad4db24e7e14ce275b7b36a1a7138ab8fdaee526af75404db522673b54435f5d2b79359bbb2ee08ce157d68a1a8521e36f10872937b85ab5f253c94f7bb6d20d11953bb2652dedd79967f8aee6c77f29a15af14cf7fd528e3ef4ab4c900730573d626ffb43dd6b36ed33cc7df8e8ce9a679957d00518488f1e0d533f2cd88e0d3611956f1f7d92639147ba63480b0b18977bd331cf07093521336f268c4ca08e8c8f39eff5ec3d543bb9c8112de941db791d92e108383a0da6101eb5b81c310acced778d3e5bb054d44b70be5f41", 0xf4, 0x8}, {&(0x7f0000000380)="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", 0x1000, 0x40000000}, {&(0x7f00000016c0)="1ede1d5d7d6fa6f3be4de0c13f40f2e11202f7293decac107a97a6ec9a4188fc1cc63d57c10e9a752f191121ad7ca4c6a593a53e66443ef8a370bcc8724f8f71e28d928343ebf323d75b3548da27b9bdba25d1b307ceb4c63607f93ee6a31954f94c00aa38f307934bd6e74847d1bd29c1caee783a1d9970584c90c1edc5bc82643f9b31a0cf31a84f36ae3523047b56aca70b8ac19aa4a080627318652b260137850cb2497604ecb11fbd119a56bf6716666ccf50d75c0af7b8c02b1bec5895a7db56fd85de03c4f4add27814e5", 0xce, 0x4000008}, {&(0x7f0000000100)="ab29663dc185c8981febe5cef3", 0xd, 0x20db5136}, {&(0x7f00000014c0)="f364fdd5811ddddac2ca22cc3bc81853cd94a3cd7627730d1026a51c4458369d743dd969c0b75bb6542922d7d24c89bc9a2c1083532e2d6f06bbceac1cebe81ebf4c907bdfbef665a28e4ff2fa3fc7f3ab572388f96e1661cff600", 0x5b}, {&(0x7f0000000140)="7713b67c89ac69864073d031e98e3c0c3b1a48e45068410398", 0x19, 0x2509fc11e}], 0x0, &(0x7f00000013c0)={[{@oldalloc}, {@nojournal_checksum}, {@quota}, {@jqfmt_vfsv0}, {@noblock_validity}, {@data_err_abort}, {@sb={'sb', 0x3d, 0x40000000000008}}], [{@smackfshat={'smackfshat', 0x3d, ':'}}, {@dont_appraise}, {@obj_type={'obj_type', 0x3d, '\xbb\r\x17\x9e\xf4\xce\xda*Wpuly\b\x15\xc8\x96\x18\x12\xc8\x96\xde\xedv \xc3\x9f9\x88\xf8b\xa1\x1e\xdd\x9dQ\x8fPc\x85p?H75m$Qi\xb35=\x96\x03CuO\xdc\xb4h\r\xddi\xe6\x93\x7f\x01\xdf\x97\xbeD2\x13\x05@\xe0\xa7jv)\xf6\x0f\xb4\xa7\xa5J\xd5B\x99\xc4*\x9b\xc0\xf6\xae\x04\x90\xfeW\x84.S\xa3Yw\xa1\x1bM'}}]}) setxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000001380), &(0x7f0000001600)='system_u:object_r:hald_log_t:s0\x00', 0x20, 0x0) 04:50:13 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:13 executing program 1 (fault-call:2 fault-nth:7): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66, 0x34]}}}]}) [ 3177.780424][T18221] FAULT_INJECTION: forcing a failure. [ 3177.780424][T18221] name failslab, interval 1, probability 0, space 0, times 0 [ 3177.793116][T18221] CPU: 0 PID: 18221 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3177.802933][T18221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3177.805856][T18227] loop5: detected capacity change from 0 to 264192 [ 3177.813015][T18221] Call Trace: [ 3177.813027][T18221] dump_stack+0x137/0x19d 04:50:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x389, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3177.813053][T18221] should_fail+0x23c/0x250 [ 3177.831482][T18227] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3177.831543][T18221] __should_failslab+0x81/0x90 [ 3177.831569][T18221] ? selinux_add_opt+0xc4/0x1c0 [ 3177.847718][T18221] should_failslab+0x5/0x20 [ 3177.852231][T18221] kmem_cache_alloc_trace+0x49/0x310 [ 3177.852383][T18223] FAULT_INJECTION: forcing a failure. [ 3177.852383][T18223] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3177.857517][T18221] ? selinux_sb_eat_lsm_opts+0x6b5/0x7e0 [ 3177.857545][T18221] selinux_add_opt+0xc4/0x1c0 [ 3177.880983][T18221] selinux_sb_eat_lsm_opts+0x6d5/0x7e0 [ 3177.886448][T18221] security_sb_eat_lsm_opts+0x42/0x90 [ 3177.891845][T18221] legacy_parse_monolithic+0x9b/0xe0 [ 3177.897143][T18221] parse_monolithic_mount_data+0x3e/0x50 [ 3177.902845][T18221] path_mount+0x1263/0x1ce0 [ 3177.907434][T18221] __se_sys_mount+0x23d/0x2e0 [ 3177.912106][T18221] ? fput+0x2d/0x130 [ 3177.915999][T18221] __x64_sys_mount+0x63/0x70 [ 3177.920579][T18221] do_syscall_64+0x4a/0x90 [ 3177.925009][T18221] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3177.930981][T18221] RIP: 0033:0x4665f9 [ 3177.934923][T18221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3177.954553][T18221] RSP: 002b:00007f5c11367188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3177.962971][T18221] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 3177.970952][T18221] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3177.978925][T18221] RBP: 00007f5c113671d0 R08: 0000000020000200 R09: 0000000000000000 [ 3177.987538][T18221] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000001 [ 3177.995510][T18221] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 [ 3178.003516][T18223] CPU: 1 PID: 18223 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3178.013360][T18223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3178.023482][T18223] Call Trace: [ 3178.026761][T18223] dump_stack+0x137/0x19d [ 3178.031110][T18223] should_fail+0x23c/0x250 [ 3178.035525][T18223] __alloc_pages+0xe7/0x310 [ 3178.040034][T18223] alloc_pages_vma+0x3c3/0x5e0 [ 3178.041198][T18226] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3178.044792][T18223] shmem_getpage_gfp+0x980/0x1410 [ 3178.059412][T18223] shmem_write_begin+0x7e/0x100 [ 3178.064317][T18223] generic_perform_write+0x196/0x3a0 [ 3178.069682][T18223] ? shmem_write_begin+0x100/0x100 [ 3178.074820][T18223] __generic_file_write_iter+0x161/0x300 04:50:13 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:13 executing program 1 (fault-call:2 fault-nth:8): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3178.080476][T18223] ? generic_write_checks+0x250/0x290 [ 3178.085849][T18223] generic_file_write_iter+0x75/0x130 [ 3178.091399][T18223] vfs_write+0x69d/0x770 [ 3178.095655][T18223] __x64_sys_pwrite64+0xf5/0x150 [ 3178.100596][T18223] do_syscall_64+0x4a/0x90 [ 3178.105013][T18223] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3178.111349][T18223] RIP: 0033:0x419797 [ 3178.115250][T18223] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3178.135400][T18223] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3178.143803][T18223] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3178.151830][T18223] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3178.159795][T18223] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3178.167848][T18223] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66]}}}]}) [ 3178.175799][T18223] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:13 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:13 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r0) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r0) getpeername(r0, &(0x7f0000000080)=@qipcrtr, &(0x7f0000000000)=0x80) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3178.276106][T18250] FAULT_INJECTION: forcing a failure. [ 3178.276106][T18250] name failslab, interval 1, probability 0, space 0, times 0 [ 3178.288939][T18250] CPU: 1 PID: 18250 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3178.298829][T18250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3178.307412][T18258] FAULT_INJECTION: forcing a failure. [ 3178.307412][T18258] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3178.310188][T18250] Call Trace: [ 3178.310199][T18250] dump_stack+0x137/0x19d [ 3178.330943][T18250] should_fail+0x23c/0x250 [ 3178.335363][T18250] ? security_context_to_sid_core+0x53/0x380 [ 3178.341351][T18250] __should_failslab+0x81/0x90 [ 3178.346176][T18250] should_failslab+0x5/0x20 [ 3178.350705][T18250] __kmalloc_track_caller+0x64/0x340 [ 3178.355985][T18250] ? __lookup_mnt+0xd7/0xf0 [ 3178.360588][T18250] kmemdup_nul+0x27/0x70 [ 3178.364826][T18250] security_context_to_sid_core+0x53/0x380 [ 3178.370645][T18250] ? avc_has_perm_noaudit+0x19a/0x240 [ 3178.376030][T18250] ? kmem_cache_alloc_trace+0x215/0x310 [ 3178.381612][T18250] ? selinux_add_opt+0xc4/0x1c0 [ 3178.386464][T18250] security_context_str_to_sid+0x37/0x50 [ 3178.392099][T18250] selinux_sb_remount+0x478/0x670 [ 3178.397126][T18250] ? __down_write_common+0x45/0x890 [ 3178.402324][T18250] security_sb_remount+0x42/0x90 [ 3178.407309][T18250] reconfigure_super+0xeb/0x4f0 [ 3178.412174][T18250] path_mount+0x1442/0x1ce0 [ 3178.416747][T18250] __se_sys_mount+0x23d/0x2e0 [ 3178.421524][T18250] ? fput+0x2d/0x130 [ 3178.425438][T18250] __x64_sys_mount+0x63/0x70 [ 3178.430034][T18250] do_syscall_64+0x4a/0x90 [ 3178.434473][T18250] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3178.440421][T18250] RIP: 0033:0x4665f9 [ 3178.444355][T18250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3178.464105][T18250] RSP: 002b:00007f5c11367188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3178.472523][T18250] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 3178.480500][T18250] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3178.488507][T18250] RBP: 00007f5c113671d0 R08: 0000000020000200 R09: 0000000000000000 [ 3178.496485][T18250] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000001 [ 3178.504458][T18250] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 [ 3178.512456][T18258] CPU: 0 PID: 18258 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3178.512600][T18250] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-12 [ 3178.522290][T18258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3178.522304][T18258] Call Trace: [ 3178.522311][T18258] dump_stack+0x137/0x19d [ 3178.550073][T18258] should_fail+0x23c/0x250 [ 3178.554495][T18258] should_fail_usercopy+0x16/0x20 [ 3178.559524][T18258] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3178.565602][T18258] ? shmem_write_begin+0x7e/0x100 [ 3178.570649][T18258] generic_perform_write+0x1e4/0x3a0 [ 3178.575932][T18258] ? shmem_write_begin+0x100/0x100 [ 3178.581050][T18258] __generic_file_write_iter+0x161/0x300 [ 3178.586686][T18258] ? generic_write_checks+0x250/0x290 [ 3178.592080][T18258] generic_file_write_iter+0x75/0x130 [ 3178.597473][T18258] vfs_write+0x69d/0x770 [ 3178.601714][T18258] __x64_sys_pwrite64+0xf5/0x150 [ 3178.606655][T18258] do_syscall_64+0x4a/0x90 [ 3178.611074][T18258] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3178.617065][T18258] RIP: 0033:0x419797 04:50:14 executing program 1 (fault-call:2 fault-nth:9): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:14 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) setxattr$incfs_id(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), &(0x7f0000000500)={'0000000000000000000000000000000', 0x33}, 0x20, 0x1) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x1b45, 0x0, 0x0, 0x304000, &(0x7f0000000000)=ANY=[@ANYBLOB="0057cf8eeb2f63943ba2d1bf54ef65e786676c72"]) execve(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=[&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)=',^\'\x00', &(0x7f0000000200)='-\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='/@{)/}@)-.\x00', &(0x7f00000002c0)='tmpfs\x00'], &(0x7f0000000440)=[&(0x7f0000000380)='^{\x00', &(0x7f00000003c0)='tmpfs\x00', &(0x7f0000000400)='tmpfs\x00']) 04:50:14 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:14 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36, 0x66]}}}]}) 04:50:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3178.620953][T18258] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3178.640565][T18258] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3178.648983][T18258] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3178.657004][T18258] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3178.665029][T18258] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff 04:50:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3178.673005][T18258] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3178.681002][T18258] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3178.738327][T18279] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3178.754627][T18281] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:50:14 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x184800, &(0x7f0000000080)=ANY=[@ANYBLOB="6012915979601813e2647aefb5443de0ca95bcfa7c2920aaa66927928124e00b57572cb054b762997c8dd35bc27772d2b03aaaf157ffee50a7fc0ac690121b618095f33bb15e8a89b34015729eef3ff3f6333f08c2da70edf1ed7461a08e0ba24e5c7b81f66917c3b7d3e462cde3f9809f6a04858000938f6e112cce015c2fd88320fe0a01bbea0a871dc6808e469de698bb49cbc89e993746b97de5d32fbf1b538ae9fa5934892434"]) 04:50:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3178.798472][T18279] FAULT_INJECTION: forcing a failure. [ 3178.798472][T18279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3178.811604][T18279] CPU: 0 PID: 18279 Comm: syz-executor.1 Tainted: G W 5.12.0-syzkaller #0 [ 3178.821414][T18279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3178.831466][T18279] Call Trace: [ 3178.834765][T18279] dump_stack+0x137/0x19d [ 3178.839106][T18279] should_fail+0x23c/0x250 [ 3178.843669][T18279] should_fail_usercopy+0x16/0x20 [ 3178.848739][T18279] _copy_to_user+0x1c/0x90 [ 3178.853149][T18279] simple_read_from_buffer+0xab/0x120 [ 3178.858527][T18279] proc_fail_nth_read+0xf6/0x140 [ 3178.863552][T18279] ? rw_verify_area+0x136/0x250 [ 3178.868413][T18279] ? proc_fault_inject_write+0x200/0x200 [ 3178.874047][T18279] vfs_read+0x154/0x5d0 [ 3178.878213][T18279] ? __fget_light+0x21b/0x260 [ 3178.882941][T18279] ? __cond_resched+0x11/0x40 [ 3178.887615][T18279] ksys_read+0xce/0x180 [ 3178.891840][T18279] __x64_sys_read+0x3e/0x50 [ 3178.896415][T18279] do_syscall_64+0x4a/0x90 [ 3178.900830][T18279] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3178.906800][T18279] RIP: 0033:0x41937c [ 3178.910684][T18279] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3178.930309][T18279] RSP: 002b:00007f5c11367170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3178.938730][T18279] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c 04:50:14 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x390, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:14 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36, 0x36]}}}]}) [ 3178.946713][T18279] RDX: 000000000000000f RSI: 00007f5c113671e0 RDI: 0000000000000003 [ 3178.954717][T18279] RBP: 00007f5c113671d0 R08: 0000000000000000 R09: 0000000000000000 [ 3178.962690][T18279] R10: 0000000002000220 R11: 0000000000000246 R12: 0000000000000002 [ 3178.970658][T18279] R13: 00007ffc50f984ff R14: 00007f5c11367300 R15: 0000000000022000 [ 3179.025163][T18310] FAULT_INJECTION: forcing a failure. [ 3179.025163][T18310] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3179.038451][T18310] CPU: 0 PID: 18310 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3179.048393][T18310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3179.055464][T18314] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3179.058469][T18310] Call Trace: [ 3179.058480][T18310] dump_stack+0x137/0x19d 04:50:14 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:14 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3179.075623][T18310] should_fail+0x23c/0x250 [ 3179.080063][T18310] __alloc_pages+0xe7/0x310 [ 3179.084564][T18310] alloc_pages_vma+0x3c3/0x5e0 [ 3179.089336][T18310] shmem_getpage_gfp+0x980/0x1410 [ 3179.094368][T18310] shmem_write_begin+0x7e/0x100 [ 3179.099338][T18310] generic_perform_write+0x196/0x3a0 [ 3179.104684][T18310] ? shmem_write_begin+0x100/0x100 [ 3179.109842][T18310] __generic_file_write_iter+0x161/0x300 [ 3179.115508][T18310] ? generic_write_checks+0x250/0x290 [ 3179.120909][T18310] generic_file_write_iter+0x75/0x130 [ 3179.126286][T18310] vfs_write+0x69d/0x770 [ 3179.130519][T18310] __x64_sys_pwrite64+0xf5/0x150 [ 3179.135446][T18310] do_syscall_64+0x4a/0x90 [ 3179.139885][T18310] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3179.145835][T18310] RIP: 0033:0x419797 [ 3179.149751][T18310] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 04:50:14 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3179.169407][T18310] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3179.177888][T18310] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3179.185848][T18310] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3179.193838][T18310] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3179.201793][T18310] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3179.209763][T18310] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:14 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:50:14 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x391, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:14 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:15 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) [ 3179.316747][T18332] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3179.332783][T18336] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:50:15 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200020a, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) [ 3179.362825][T18345] FAULT_INJECTION: forcing a failure. [ 3179.362825][T18345] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3179.375973][T18345] CPU: 1 PID: 18345 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3179.385863][T18345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3179.395914][T18345] Call Trace: [ 3179.399179][T18345] dump_stack+0x137/0x19d [ 3179.403528][T18345] should_fail+0x23c/0x250 [ 3179.407950][T18345] should_fail_usercopy+0x16/0x20 04:50:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x392, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3179.412998][T18345] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3179.419070][T18345] ? shmem_write_begin+0x7e/0x100 [ 3179.424099][T18345] generic_perform_write+0x1e4/0x3a0 [ 3179.429519][T18345] ? shmem_write_begin+0x100/0x100 [ 3179.434662][T18345] __generic_file_write_iter+0x161/0x300 [ 3179.440373][T18345] ? generic_write_checks+0x250/0x290 [ 3179.445752][T18345] generic_file_write_iter+0x75/0x130 [ 3179.451164][T18345] vfs_write+0x69d/0x770 [ 3179.455425][T18345] __x64_sys_pwrite64+0xf5/0x150 [ 3179.460364][T18345] do_syscall_64+0x4a/0x90 04:50:15 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x4000, 0x800, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() setregid(0x0, r1) r2 = getegid() setregid(0x0, r2) statx(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x1000, 0x20, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r0, 0xffffffffffffffff) getgroups(0x4, &(0x7f0000000480)=[r0, r1, r2, r3]) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) [ 3179.464804][T18345] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3179.470711][T18345] RIP: 0033:0x419797 [ 3179.474607][T18345] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3179.494233][T18345] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3179.502683][T18345] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x393, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3179.510654][T18345] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3179.518631][T18345] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3179.526637][T18345] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3179.534592][T18345] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:15 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65]}}}]}) 04:50:15 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) setxattr$incfs_id(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={'0000000000000000000000000000000', 0x31}, 0x20, 0x1) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x4, &(0x7f0000001480)=[{&(0x7f0000000380)="3943648444e026a22674a6bcc6617346c3afde75cfb1da0bdb6a2145531676201a6f8670c45c3365bd357c7fccf0b488bd1ddb8d52341bc96ccf37d6f356cde938f7e84c40cf6c189e5e93f74d77c4392a917f1b1dec80e640e9c9cd260288bf1a3bcb24e48ce3bbee9d5146c744e30519d519a6ef1c949490e96f72726af8a62f1380e79b697e44ca651217233357532b058d718e4afb0431b10f347d15c171aa888305f1cf9c19d4c075fcea69553e2e9a3cc933b3e1ed25b9bcb89e5cb7bb0c0dc24416b6978cb1950ce7587c006fd70ff93b60a36db350aee65b8f6344e273b6487df90f2f1e8b760374cdda5d7f8611b48f646d35f991b3019a2c520fc754a566ed38d797acd346c73a21926b2d2438f11e2ce13399479d5c9a6c68dfc5d1a305fd6cf5d284b1c715d84cbcf64ab3f58c6857a228938176fb93f4fca6b6878d339bb6f5fbd1470c023367205a5a9a7318bf1cfd52aab14785872e668761d1db688c7d4b3074b3a10a6c5e0f50d24089f84a016f39b9fb8ca94a3c83be03ff1af6ee812a99391fcf0bf9cac4d4ced251af9991ffb03ee34f933f1e6fb75e23daac0221d36e4e9d257623e3621d3549b2197ea7a1a7a09ee41e0b3ae88dcfc7202c20517b4f5d38db8fd904cd45ca9d6a9e5bdc9eeef00090adec6670d478e41e7869f4a3f12e004e29bac423a97c3de7b8c77f2891b443794105c9bad4d8e07179204ef775028b0ef451bc35f987245f64ca47ddfcdb848a40e4cae23ea1093e0ef19632da804e847d6509dfd57734d7c246e2b0687a1179b39be4e00a1897d9b2f0962dac10ac63473322d8267e1cdcb4ae19b07c2baf2b128dc444e8939efff85da042a0791f57034be8a1ad4b11af51373d57570cded4e65e83d5306a41c7fabda634d5f6ee780c753bf10b7c21daa749239cf4050856a5fe4f97ad0cc5bb9ef069fe184f9c7646e0b6e3a9e1efa3f5caeea2b9af3866f39c256c21377015d7fe0a8b5c953def2be54f1deea6a4e1c61c3de60fe046a74e0243fc7375de1e5139c45be2b95612a7d120bec4007e718f06b4f0a822e00f83a6d086955305c0eda9971b426575b8752c6e1ff902731d3badd330e59bbc47c692ae73f00594e6a37b81de6aad7191729860cb5116b002796e9503e62a2f35e00dc84dc1482d7d54bc5611cef4f014ed8176415f902a4c68165ecc273ec3aefd738531a07a2382caec86b15c50727766341f2f710dcc8f1e243ed3dce7167bf270b4c8677fef17acbd2d0fdc09d4f3ac321a791fe360ce2f5260cfc8576de90b0072e1a7920a54765e3e1e6e3b120b890d1faaf14880dd7abaeebba8c99621fd74473e457abd583072151f166c5042d351ac763f62c1695fd96d44445722e63a67680e21edc19ad04846d61f2eaf51a018c617ca46c68db8e3397599c508e951c541d71ce7da2b73b1da223f454756326609eebbdf061f3f944a3fbbe04a94c4af15fceec1229f3e8d28238d1d774c20ca60f33d8e7033427f1a6fcf6a3d1f7ed90835443535286c6e128632e77958f0a53072caff30e545d4e4e8c6126d3219b73b4a1a3f02a36cb70ed4ceb24db700baa87fb8c5da874c11ca838de0dbb25c31175ed07b4bdb81b55719532a6c93e0fb508a3f9c56b25d8e6d968aed82878f90122591b7bc13bfc67f0ddf74bab51d2ed9985fc36ebe03900ebb4a1e6625984e52073e9048783b1bfd8e35c7209a6de616f58a57290f906eca6c2cf54136a05626dce1802abb27060d423b33cf2e5c7658748a42c769e3f4e43bdc28855450f0b074249001657e21e152c5353c4eca07a9eab90c8bd0f5625393d177ac3bf357d32b252cf4de1d491fa6d4f9cf757914cd03a293a2e9bc7b743803d4c4c64f64c6d4681cacc16d07dafc29267ce4f09e97cc35c2a7c42f205fbaa812f6fcffc02bc6c6cfbf1d8fddef264e3bcae35e88d6354d8d5d3e5040e7f36f8bfa134aae2d99854dab7d02cef03430fe714e4bbdfc6875807dc54916b93d44835f4ca0a94812d36d1aab6eb4a03c8a7a016f0806d272b5bb0325291d92a64ba322b829a35f7a13834638aa8a416b0cbc95cc59b87dc4150a1f669c7aeed9754b43130a21ae7d747a6ed6ccbd7da67500e9ee69bbd046bf414f590e87d5d699a91cdb2fce58000794963dc722135276ee340e616f9aa2bda46e7c1f6cdd8a1b5b5739c31145ef647764bb430a816a0021b97f8da0ce128de79654b78b8d64fdf7df0adde222eef0642e733102529467b22565df167b911a2faa64a5a67c74c2310fcdaa3176b4b410ed1b7609429efff069296208aee7a5cdefffb2d91cab0799d08f927384c5f6702d9bcb79637510e7d81adeaba16a27f581eefd1c3ec09e6e1def2754f2409eaaa9ea345c9dec24bddb50f1d11c13110353607f539d664ef8ad1b274450ecb1b85f70dd38f16158995b2372d222183fed0b924a750dcf4be86ff2fd70174e3f61e5a11bf4934204e1df240e5babed1aca2ccc653a530894f788787f7ce062fd7c540e1f8d94b44a545e3a090966b8c475529acdd6de5d70dd14cd5cb477d832051ca9971dfa12523cf5c41fd906d0478e86f4290d77ae5f42585ad6b37caf93b7a3bd5ac5cdc897cd263c803657ac30b8cd1267163d2ebcec0776568f8a9f211c94288686f841a9ff7fdad5541b30c040e0e37dca9d1415ac2c5d813633d41499ab0c48d27ff1a4d70e4aa360772759995ae91640b16749d5ad277fa57f0a87d4b6eef5d81967e61b520e8ebe202803466fd80a941646ff1bb9da111c97e2e3d121e23d6f7aeba219db0ba4fe799e790ff6b0b0c52c61ec52aca6d19f6ba866eb6b0d613ba93dcebd36baaffad98dcfbd262fb8d531d8c5642d80cd576d7e5a34759a810577de829667917e51ee961e01a27e2bb234e0586d0d87dd6983793b0aaefc240f41eb1a06aa6d86da788ce3526bb92386f6705e954f00e6ce567b4ab66453b2a7b4ecae4830c116a6fa3cf0e211b1442f9b6772b4a9550ad9375e40c7f595357a69b41df0fa69e6f03147449099b4956311149d013843ec1a4480a824fc23eeff349e35cf2bb9fd4f48c1bcaaee6398d6367de884e1ec2cc54e678b870c8beb68d4181a6f3b8c3dfb369a3931395b94724cdc98f6e8fd3f0473d539f161e5e24c32163768441ce3bf033cafd2d0d3bb5a1b818472a86e7f28c3700fa7aac229143b3d48c56d8b51720a939de7d9692a9ffb48acebac5d0ea23a783778a75b8b56c15695a1b41f51ea6a7e82ad94f5ed1e6bc6d630b18ed6cf3e9f4f7d7280b71d138c79b39080590082c366469df97231de8cd38af9a7de9d29b7edc9f387adb7c8fa513db95e5b91bb70457683c98d06b048e437c1af3df708f8b945f0313ed9e4e6bcd0eeb35e7091fbd49261c36b13d8da9131be571d5dc9634c603931d18f75635093c6581cf3eb8b0f2e19263165ad94e08e2a026d7afedb795f684828659fcd4b0ec0622384727e1f599973a22997900422e6911cc89a58b7ce59bfe28db4f6db18d0bd515b35331619d4deaf7f6048c263c6c552169418d65adf19a53b4bc05893bc4ccef6501d096990c002db7c8513f6ecec30d17d916754d6ce414406e164fef93b1c2fca3ebea650b1efa19cc0714f7cc53be9cc4d4fa390d26568090edfb13b558c506eb8af452d2345e37e00df255a621fc5a8e8afd254fe341c6fac4a0944a8a1b82af87514f8ac5cdf8f8e5e7fbe87b5c81016a5bb1104ce04e433de4bc83f012b8e26f95cc31ce372b93d54c958cc1ce2eacc06838f85d3adfff3e03b9f443295eaacb6b81a5db7c800d4f9a093ac26736e35417382cccee6525cdc104f40a867b7eebd8a10ad78c4cd1181f464cb3b5ae2b24515efceee0bdeb581ff8bcc824d0fdfe95082ee22f4a151f8145bbcd895dcdd58123dc2dde41d9618ee1dc3159ad751c2c4be77efdbb83445397fe9121c5edca415f57c29d6f497f44e832ae7676bb7c3a1b06b408e219ed74dfc39408f05042f208c33fe22b8d429b66b5f853f257c201f774b2c80e98d80881fbb7e50c07d5f590857388120c7c54db1abd52a5845d0883b7f9e30651b98f767534adc3062701c6f83021d352430139e0f711f4792c439b1fe223acaba6390da9f0f3fcbdda46cdc7a39f7ff32f1e549b2cc9ea65112a47c02b7b23ad27ddae37ee25b4dd775aa40c71480c25112b2feef3de2e3b4abc43d0fd27e2f36939ec08d37b15f7034aebc4f865daa89e16fa8c33ccc56b645a7d95be2c6e570e74057a92a4cb15c3f2282537e9857f2e5be6c77afc321eb0c72396f278b78fe2442f08a3e137650b02b0de6dd8ea90443059ca26d849b7e353d8997a6c067f9b9dbe0a0f282c022851c6093f8f585fdb6a80b4d9575c21b1d04fe3cb25f6b7a38ef7cbe761a57fbd7ff381d86784041213dd4eeb2ce6dc9e6ef1a0a32b40633beb139e17c52bcc09aa6577dc3a412c91a92328383151aef09c1ce5f259fdea773add8daf83e6d9636540c16662c48aa6b9fe667ef7df77a22d28f225eb8f7df584b4769777587552367a3b11e275f84dcc18285360d54c2ec6e569ca6a30f21d1d03ab4b84ef9896fbcc90c14b6b10e825cddc1b9c5d859cdf7ca9fc23f9aff523a3bc5a626985c39d52dac08e1b9c6ac86848a3e14f96815597f3a1b7e6d5093786a93eb1ef9635f8e3e07557ae7550e748399f1f50233dbc1d886aaaaa02af9a7d0d7fc4f36e193250c77a38476e9f945a863ee0161a973080b83879a467d111264e3e371531b2e5bc6dc20d0f5836855b391594e6b1ac0957628f93fac857ba026e60a11ab11dfdb6c43e1274bfb8242db2148e8097f624a11980be542e91616cc721288194a1095f4cc81dd73075edf0c5d1a1eba8db6ada0389750bac9328b5a65b7affa57d42a29c7a37f7fbc2c09f61c93d0ba57de5ee641e28342f87b4315cd62676fc4df5cf258badcc740346fdfabd3ffe0bec321bbec47df70149e5dfbed0085a37dc5a9720497c2728be49cec08644d78ab01b6d7e45e42b436a08f0566e68cec6f12552193bbded07f039268a876cfd2a5289c9e108585b07af3cf02bb4b506636e197105ee355348299a16b0da453067c886d80ee3e88f45d2951eed2b0a05ea1ccf55c8a1cdf8c2b3c7e8a14a7045c5f8d67cbee6799ce1ac559e0f1a4cf9e1b45cd7b54b7a243f08b1843946aa68fe14f68721204482005d663e2cda4090a8f9cc2dd0a8d91e2f992216461e8d5a4374e0ed2a72cec58acf6da9e8377711a918defca27b0d892db0607790d342579e146ee355b7ca9b23e6d66eb736e509155fe36dbaae5f44c5d8aaec698e37c577986aebb17f798843bed0c4ad8e941961613cf372218908adcb385c4eb6bf800c54f54cbd1bc8ea1cad72b05647deba39b12a468f50cbec790f823153c733a4ed9dd68f1c836ca00a14f3d4620f670584261f1a8b3c7369333d7d190bb8024aa342eac37d39d7e5487bcd56611333daf3f51b61988d0f84fa1e4addb2de7a90873fb4b30780989301fa4a6127532a167bbeecb6f21684eefdd8f49f3d1e7a6037add1d5426ff57cc3c975cf040e4a18723065ce016967a32194a7ec7d0cf06b27e97a84665a4d40ff30cf60547d33cf1d39315ebf2772170c101a96bf7d1e28cda260418c4665d5e0d7c2dee841edf3758bcb2321683c8a435804988335b78d0f39f0fcfe78f28dd63735721d920fcc7670e7b7b3df56ba0e21bfa6a64f6a4cf4dc4b308cf73d359bd670eeb7c9a654fd4f078", 0x1000, 0x8}, {&(0x7f0000000200)="cd489935384381faf9e54a794fb642d40df077a4e3ff2e35cfc1aca5fe0b35112fe91a1fd72e1b631dddf092384b3290d3be914124a16fdda1b0ce95100a3823a9deca5fabe9b1f6289b78cb842fef31e913c1b9d4181ac81ddfeb56d90833b20c4f884405468f588cdcf4a619c9e2ac91043e224edde512ee7c377c33d966de03699493ea1e1090864a1f9e8bd75b6a385177702ea77e74f333624431004b72960bad4c2f9b7e3a5e04538c463b361ae19a10c770fed1a8a258cf66aa4dea26bfc2582aaec087c12fc5365fa3cd7b9962162c3d", 0xd4, 0x287}, {&(0x7f0000000300)="7084d7b909afc5341576e023a72a4d1796bdb97de2d611355c3d8fdbb9a705af60c4", 0x22, 0x169b795b}, {&(0x7f00000013c0)="18037ab734bf41b7eac78d41b8d6a3ca3ec6ac41f19aa5d3f4fb5c86dcf0e7b945293af8425b07d35bb6ee41ea9b40f6801d14feb854be298a41e9f0c4a9726c5c36dae164280e5bb50247fc555e1ea73692152713462687fb08adf683bae516b6577b5871f82d45f89c47a881013fa32b394ca1b43c4d8562cc820b914ac11ab6d0ba963c44159dd2432a6fc6aa0e1b18ed2dbc09466538", 0x98, 0x800}], 0x800004, &(0x7f0000001600)={[{@data_writeback}, {@grpid}, {@grpid}, {@usrjquota}, {@block_validity}, {@dioread_nolock}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_type={'obj_type', 0x3d, 'usrjquota='}}, {@fowner_gt={'fowner>', 0xee00}}]}) faccessat(r0, &(0x7f00000015c0)='./file0\x00', 0x20) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x394, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:15 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000225, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:15 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) [ 3179.651728][T18365] loop5: detected capacity change from 0 to 264192 [ 3179.661861][T18363] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3179.673019][T18365] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:50:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x395, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3179.717883][T18369] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3179.783817][T18381] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:15 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:15 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000002, 0x80010, 0xffffffffffffffff, 0x8000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r1) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r1) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r1, 0x0, &(0x7f0000000380)="166d9ca0b57cc1f8f202a7c97489274dcb2d9f1fb3be44c875c50d38a08a842bb615ae5137bad73e5808edbff54438ed66d07826756604f4a1a56dbc70f5c980523d5c6f4e933a12b1c1a00fef2436c7144c2f0debfefe7ef34b6d1584112766101096767197484a9a3413aceee6863e4ae43c15040f85afba2e5ae396ab2f76a38b5c4d8503938e90c036d565f6653c0fb64bd8c8e4e70b64f940187b2d2aa7005fa5b7cb8e535ce5eeeea94eb5b43a2e22414a5c88ef1e8fba52898ee10faf9a2b1f141ab3588793ba6f7b34476b1dd1a7b227f8d8b828a0f09016e7aad4ed8ce3f6455b1071bf48f9565c8c79486ffae2c87e965cb1a52bc4021e7984186c2fa390e7b7ce8bce20e99696f8f3dbda0f77fd463cab4815f8760ca16a0d827d1342f66001e4ba782d38d427d07f720c30ab03c624c2a2c81c422c353aa0156ac9156c041915978494108674fd9276bbce2c7b7e4bec5f6ba6005ea7e9da1a16d30164399a57295d892ac3fff35ff68206d46247193c38026093cc14de23039913a5aa86f73037d3b8d30e70d27edba8ae80a0ee9ee7098a04f453c46b87ac076f118d45a913faa2139072bac618551bb5542bce33f6469f92418a12c1e9d94b80a8a2b7ab31e2ad93eb14de901caa8bcd60c2e3ed9ceda0812d1b077f166d42121ad5cfc795d7804bb06baaec834b86e4ed3a1e6d534bc8c5ae1d26cefa3f50d0ea71e48dc7c4e872f61477b717cda678e2ded7a0cbe7a271178d3b99f472ac54e84d1275e0a2f1db287ae042d7116b84c903d356510995db5494d6236e97137a74ef57cca8514b9846b742801dec8f905c33a57504525f885972366179ea8c286bcd30fa0ce4526d4ecad2311128e544722018f7de209f2297636389788bad97b5269a01f17b910b4d52c158161069698bcc1fedfc25d87825907e669bfe2ee50aefef82d9faba4ca50443e8a14ec1549f1f7843a891edee80a5f6cced7e652b4bcb9c667c40e0d4a6ee79f948282330bcbea6c631e09ddbedcfaa89c0934d162aae47e6812a7d60b80281fee4527df85ef39eb3aea03b798bc8e6d7172a4be689a406acc1b030b6b3586bdb83346e721134cd6c7de553a3c57fa259c7c667d197f7f98af9537a5ce092c28305114453070f45eb2e0942e16b3e628b17c59d4e7a0e5ee3c710518f31b0204f6bde91f542f285b47e4e7c0f9a6530c7998a1b322044eb7301d373491eef6a2a3d54f90426b10adb4222ddc879ef34dfb38f3b283ad222fdb2574dd7f7be33e3fc85bb589b7b4a5ca4ba97d337838c626d80da7fd590e5348480bae8ff9a8d10dc57cd5a60883bdbe244a0baaa4dee1e02b721c3b8d8b9d06c051b18b1809956c36f843a8e93e4d99e7fa174a1bacc9dfde13bc9da43b5d7fd049971ea5da129656841cdb7184c2ff00c2e72b37d6e08aaecc28f86a39db2ad51b3ccec468eff2c32dfa01158d7fcf261427241c61955b4ceb41614c9e0fe4f2a783fb7a310be035293c7937be5957799d5a878e811d8f147235e29d6d7dac3af54f34d162ae5d69ea98a89997cb22e90d6ffac577f1b8fbcae7c6626804c7867c17223121c48943f02fe11f7e4b75ba3448ad65a895e9ce9a9e1513927ea7e33fe054359320cf11f13042b0e2973064732a26bcde2a27a0fff3048f348f3adef52de8a7a03aa4efd1037b27b05e987e408145a36fc07fb69803927918348c034b1ee847d7f0046e8fb94e4d1cf98f10c28b27b150911e270073a612894d6542f8aeec76313e3ae674ac795f930b1fdd67dbf0168c33d28934d4cbda79a252aaa58d476f7650f576c4061aefee645449b3f3472e3137c7d925e2b6baebe543cd335e960bbc0627ed8fe71d4bb9012dfec06660e622dd0525169bd75db6166c0f4fa8daaf9e6f62b6f408151c78a867bfe29e0bb33ee42102284332f8f453d625f468a5718320250fd2ec0b13393fd31cb0a86f2c66be30efb109af50b81dd0ad500251d98dd8e70e03db0f1962555f3c0156944a5e54ad28f6d8e138af1f08457d664538c1d4e810c044222cda7c7412affed43bb419d346a30307b9eef06bdfa2d2703c560395bf56da7ea316cc56a9dfd2bdeb95d33908110366706ce81f03ee41f71aff905979ec9a3b5ab853990eb03c17153c5816388e620577a2eb532b7bf7c5a8e79a094f5eeaed4f8837c6aca650321651568c7792ff93a67cf534b5fb4f1b40c39d6ec02ccedbe50875dd3de48d6a32c58bd43baa1d9b48a928e16785df0c4af8b9238931f20d6c20b5172ee67ae0b180190e2eefec625ef7938d72ecb15264a321a75f0c2958b078b389ea5d18850716de7d10514438a9132e228aa0ac22902846f36a2c3a415daa0f977df7d780d2e71cfd6943f6687c971e80448b362806f8bbbe87b19f627903c20815a5682bbd2a7ac0a30886b69a3191f2e029c23ff5f03d5dc3668422860554aaa018404818d24fd2204d7bee0111ceaf969a3408511c64f52a3863b45907ad4c922e150ed5352741596ce1196fe9f3328e3ca8d3b75fe137e74c0999c5c64b5993bcb1ab256957509152e1540574043b01bb9ea81a0655b51c30d13ca0900c05f74123006be1e1c47f43c2d155326dc8d5dcc0f39b70f07248e8136d3e53c906493385e5987edb32686e0ddc770e835fccbc3dda5712859fc2250acc50b35bdd416633ef83ac6b0acd31b2d44495bc80cd48e324310d4ecbfd076e9fe1aa411ce2f10182456d3d7c19f603880774161ee716d2872f3259d3e1716912e124fece72d286f966eb19cdd6caf49856dce9e80c8e4ae9beed4f7aa39f1399ffca04bea38888fe96b4312d1edd15e4da93d5f20ab26a19d5f1c94de60b5c955066710ab0fd3e7e66a5b98debf3299c63781fe2b9f8634dc0aa1d3801ad9f1de3ec5e05d28d00d497d13327eafa53b378b6321b0c763cfdf138ff16a77bc1947ad1dabe1ae4698a3dfd3f5dd61f9741a998bf1ff449484dfffc4b5ba1097f2d99b8cb6c8901f3e63fe38738f0aafd8b1029a6f48241092edd32882a91435b4d54aec520061cfe443bad9efd22c1c8a14945f801d8807174a3110b3b379c0da7dcca72ea654ab325e9cce17a660a92b7491a8ba8a2c1fd4c8afe90c6be0bf36fb8bc8b34f551f78417484078c3ddd3b80a74a271bb2424fb9c989268d9f023a5011a66d435150352009d5a5fcbf7c7bcbd1dec9f5f5fab2916dda79b59492e639eea3b53f9d2434d00f2ff2281dc63d92c7ee6b585f72535672254314f8b65a2a025702588222420684b7ab0409854294f85df4e3fa4bcf6d4c53ef69e7f1cd9b8cd50e2334cbe45c0410b2f642369d2b6498171484eecca96a2e2699639d3f04946e5513e09481d73174d94c88212ef178ceb499921e5ab46112b7e84fa44b3515b734aa143ec3e882483297d82a760c168e9d6db94b5185a9162bb2df3fe7941555bef530b80ed5684e58a7f0a6d62da4a8348c7364e4e96ea3f2a627977c10b0220d4ec28a785cb66310924bbd87a7e3c0c57f1333c4e969cd812adde9a246b5651e3d7ef03a89807935faa9cd4684abd9b241d2839445f4f5947573a87b956fe2adf8050d1f0965459c1915cd125e7a4f9126acc69627f5ad6e093eaff54fe2b4d59981cf08c1070f03afc3413cc7f8a0d8ca3d31bd30db7b62e5f543243f3543482c6c89343ab15f24dd3a453e77d9ecf6ba4ad568447898ee12ab0b8ca392744327e76bd53605020ce6ccfd637685929af49a14708c7905f4f3257a006cb7592cdc69a067d8c79391668d8bdbd6993667fb0ee31ed67874b3a954f271232ac16f4bb451ef30599ff48cac5359802006540289b4980e991d08683fe37f71b95a71c5abb1c7e322e233fd5600487eaa1f6a315e55784c84380d24c80093d29335c0264ef8767fc3599fad4668fe37a63683a645963b6c9a332daebb834b122bd98007ec04e231130c9bf51f9e1c0d3e2a6dd918dad6cff371b07dd84cc99d272d9fe64625080aacfc39abe77a2f9d9909d088dbd189d14a2e9ca2b1fd914d6d66e4291b7252c70581782161700ef51dfe393d271f1ba2152a14b96f217e2d1a8e2b94de7ea578736bc10cd9e99d5392fecda3993bc2475c4817059c262765ce88eb1c17dc1bf5432509fe78680ef9caab3d2627390db42bb7fd78575b2668aca85a9cc7f34022e62b6af5e0f11dd5bb42d6f33a80fb595e7f39572aeb58eeef751a35970b8cca827369918a6dd4f8406ef404e3066629f6d9ca83a1a1355d36dfca7e70223dfb94b7d0e54e3e0ca96031a37a729f7d1f96ef0c7eed2efd138d652bb45f546ca3baf2db1d5591b0efba5f66f36bd1ed51d506b3c38c9bafcd2f4c78306491368c320304fb3a60f3ac5eecacb21a0b0e72d72d2717958ac0e502b8474f79165a094b80284570f7823c2720a7b6adafb847bc99f7ebcadd067ed8cbf73f4b472880e7b1442a87827ff87cacb5d75a74a59b25e27500bbce387f0868974f72a1fdca565ff8da46d8ee2006a652294ed40df671a60aff419da7433c12d8a9b05c73bf134f9537bd96d2ff54a262a4723037b9bbd53e16006c95af4aff69be5f0fb7005c6b6605548e62de80896ab549089706cf77668f0b8bda8b526d4b5ea44bde2dbd873f580e7d78cf949edad8628ef8b66f476124d7c061376bd07d57cc61cfd7bf8a7bb9d247ae1e1ae168b568f76206c0c35b1a00d5036a492c2411a533b51033090309c3d51a5aed9a7dd785dcddbbc53f27ccfbce3387e11f12fbaa908bd2cb76db6e7f93c1671c865f8ce5b483f53d782fe3c8bb0aad16a72794ba90e0cc53588f168ae7ea45a845a40f1921161bf1972e1d775020a6261c92fcfd627e52985f8d5c7aeb6bd289d8f07320fb7348f8f202aad8d8265b86ebd06d9ba19b1277e9c86c6f4f93c542764f00c8cbfe89ea280905583cc3ed8e8036402217a8ab257ce117ff9ec027ae17a202f9215613487371022c7cf430666ca6819265fddb2bd975dff71984a4368f947397b20009e5baff97b335e52477ee3aa2cba3b0dfe1d93c4116f5961d7942c3b7d8c7bb2e57f8e2a6a52b359d933416ffc1f5c1e5792a54e588d5cd43d83e3008170b5cabe9fe8ca5abf9325139b819edfac2d771729525760b087894b88499859a28b022c1d8f5c89c7ca74ecc483abee151583ee81896857579aac50d7c9b9265a8e1b6d2071b1bb239b51a91217508a04fae481ff592697d6afc7e92d3ceac070bd4567fbf7622e63bd16e8ad0276a8a7b05bec8213872a25a154e7b2ea17d1d54e858ac6ed5924976ce6b9039b59a47f14be53b2e529087d8354099445891b4c8b3cd8d9a7d9de6381ec88f456715a4f7ebad72414eb7db1a9dfbd6b995f4569f5b6e8236d8b67c9e5cc0b70e3944cf0b7114597af1bd2e86353ac7d992acd2035c6cb41ff03dadaba5e11ce30123c68fc7179abdfd3735070ab627fee9600758fb915cdfb95f70626120b1239cd453f639193329579b2223c8c7ef14917b7cf27946b9d3bafd376d3fe36435dc66e66aff6fac3d91c8104b9ac13034fda3b6435718014333975a78e3f4f1328e40c51bb915bfd610def0cc93a2b40ef9fae47e0a748846c28d38b0f2de9ea5cf793d92dea0cd5a2df5b6a8a2edf5ea5d0d1f0d704337f805002eac082cf6a3c25c0efe203cb03b84607a34bb77b13549cebc5d0d3c7c694bc9e1a77f5c5c2c4055f4331a4b2d1bf7f789520aa7a080b98711173fe4a075eb2690027623e6a6273195f2b2d3584aa248060f", 0x1000, 0x40010000, 0x1}, 0x99) 04:50:15 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:15 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65]}}}]}) 04:50:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x396, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:15 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000229, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) [ 3179.892540][T18393] FAULT_INJECTION: forcing a failure. [ 3179.892540][T18393] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3179.909439][T18393] CPU: 1 PID: 18393 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3179.919264][T18393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3179.929323][T18393] Call Trace: [ 3179.932615][T18393] dump_stack+0x137/0x19d [ 3179.936999][T18393] should_fail+0x23c/0x250 04:50:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x397, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3179.937869][T18400] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3179.941427][T18393] __alloc_pages+0xe7/0x310 [ 3179.941450][T18393] alloc_pages_vma+0x3c3/0x5e0 [ 3179.961257][T18393] shmem_getpage_gfp+0x980/0x1410 [ 3179.966344][T18393] shmem_write_begin+0x7e/0x100 [ 3179.967181][T18401] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3179.971247][T18393] generic_perform_write+0x196/0x3a0 [ 3179.971273][T18393] ? shmem_write_begin+0x100/0x100 04:50:15 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0xa, 'sysadm_u'}}]}}) [ 3179.991721][T18393] __generic_file_write_iter+0x161/0x300 [ 3179.997365][T18393] ? generic_write_checks+0x250/0x290 [ 3180.002745][T18393] generic_file_write_iter+0x75/0x130 [ 3180.008214][T18393] vfs_write+0x69d/0x770 [ 3180.012464][T18393] __x64_sys_pwrite64+0xf5/0x150 [ 3180.017424][T18393] do_syscall_64+0x4a/0x90 [ 3180.021851][T18393] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3180.027912][T18393] RIP: 0033:0x419797 [ 3180.031805][T18393] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3180.051405][T18393] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3180.059821][T18393] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3180.067782][T18393] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3180.068876][T18406] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3180.075751][T18393] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3180.075767][T18393] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3180.075779][T18393] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:15 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x398, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:15 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65]}}}]}) 04:50:15 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4a85040, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) fspick(r0, &(0x7f0000000000)='./file0\x00', 0x1) 04:50:15 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3180.182480][T18413] EXT4-fs (sda1): Unrecognized mount option "trans=unix" or missing value 04:50:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x399, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:15 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:15 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x22, 'sysadm_u'}}]}}) 04:50:16 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3180.280245][T18429] FAULT_INJECTION: forcing a failure. [ 3180.280245][T18429] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3180.293361][T18429] CPU: 0 PID: 18429 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3180.303176][T18429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3180.313226][T18429] Call Trace: [ 3180.316507][T18429] dump_stack+0x137/0x19d [ 3180.320978][T18429] should_fail+0x23c/0x250 [ 3180.325424][T18429] should_fail_usercopy+0x16/0x20 04:50:16 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39a, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3180.330462][T18429] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3180.336541][T18429] ? shmem_write_begin+0x7e/0x100 [ 3180.341648][T18429] generic_perform_write+0x1e4/0x3a0 [ 3180.347024][T18429] ? shmem_write_begin+0x100/0x100 [ 3180.352141][T18429] __generic_file_write_iter+0x161/0x300 [ 3180.357781][T18429] ? generic_write_checks+0x250/0x290 [ 3180.363173][T18429] generic_file_write_iter+0x75/0x130 [ 3180.368553][T18429] vfs_write+0x69d/0x770 [ 3180.372808][T18429] __x64_sys_pwrite64+0xf5/0x150 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39b, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39c, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:16 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={'0000000000000000000000000000000', 0x30}, 0x20, 0x2) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)=ANY=[@ANYBLOB='>']) [ 3180.377743][T18429] do_syscall_64+0x4a/0x90 [ 3180.382165][T18429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3180.388111][T18429] RIP: 0033:0x419797 [ 3180.392063][T18429] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3180.411674][T18429] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3180.420099][T18429] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39d, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39e, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3180.428248][T18429] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3180.436256][T18429] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3180.444304][T18429] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3180.452412][T18429] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:16 executing program 3 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:16 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r0) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)=ANY=[@ANYBLOB="02"]) 04:50:16 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x25, 'sysadm_u'}}]}}) 04:50:16 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39f, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:16 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:16 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) [ 3180.732923][T18486] FAULT_INJECTION: forcing a failure. [ 3180.732923][T18486] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3180.746289][T18486] CPU: 0 PID: 18486 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3180.756181][T18486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3180.766235][T18486] Call Trace: [ 3180.769525][T18486] dump_stack+0x137/0x19d [ 3180.773911][T18486] should_fail+0x23c/0x250 [ 3180.778320][T18486] __alloc_pages+0xe7/0x310 04:50:16 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3180.782818][T18486] alloc_pages_vma+0x3c3/0x5e0 [ 3180.787638][T18486] shmem_getpage_gfp+0x980/0x1410 [ 3180.792719][T18486] shmem_write_begin+0x7e/0x100 [ 3180.797585][T18486] generic_perform_write+0x196/0x3a0 [ 3180.802919][T18486] ? shmem_write_begin+0x100/0x100 [ 3180.808056][T18486] __generic_file_write_iter+0x161/0x300 [ 3180.813808][T18486] ? generic_write_checks+0x250/0x290 [ 3180.819182][T18486] generic_file_write_iter+0x75/0x130 [ 3180.824563][T18486] vfs_write+0x69d/0x770 04:50:16 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x400000000, 0x0, 0x0, 0x278e0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x1000040) 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3180.828838][T18486] __x64_sys_pwrite64+0xf5/0x150 [ 3180.833772][T18486] do_syscall_64+0x4a/0x90 [ 3180.838249][T18486] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3180.844212][T18486] RIP: 0033:0x419797 [ 3180.848122][T18486] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3180.868029][T18486] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 04:50:16 executing program 3 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3180.876498][T18486] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3180.884462][T18486] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3180.892448][T18486] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3180.900399][T18486] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3180.908350][T18486] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:16 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x2c, 'sysadm_u'}}]}}) 04:50:16 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)) [ 3180.998336][T18512] FAULT_INJECTION: forcing a failure. [ 3180.998336][T18512] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3181.011456][T18512] CPU: 0 PID: 18512 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3181.021277][T18512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3181.031323][T18512] Call Trace: [ 3181.034597][T18512] dump_stack+0x137/0x19d [ 3181.038996][T18512] should_fail+0x23c/0x250 [ 3181.043420][T18512] should_fail_usercopy+0x16/0x20 04:50:16 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="27e0b35776668f6d7a0642bb82de44106bfffc660187e9fc078400014028b132d57e9e584a724388e4b1f7d8120fe7cb8d0fb933cfa1c133e03a6fb3c59b58916eea833f188b73504d1e93e35323a07554610d0a0c98023bc04be24885562e9c4cf6dc9b36d0df87cb4fae56b3120c5b3419d35225fbaeabe3e2b81429252c2966e0b67f4d10", 0x86, 0x7}], 0x1000084, &(0x7f00000002c0)={[{@debug}, {@user_xattr}, {@nodelalloc}, {@barrier}], [{@fowner_lt}, {@pcr={'pcr', 0x3d, 0xb}}, {@appraise_type}]}) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) socket$packet(0x11, 0x1, 0x300) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) fsmount(r0, 0x0, 0xb) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000380)=ANY=[@ANYBLOB="6e725f626c6f636b733d36741925653d616c776179732c6e6e6f6465733d398d423dd2c52a38ff534f242d2c687567653d6e657665722c6e725f696e6f6465733d6d2d2c6769643d000000b5c3e50b65b9f4d0c12e39f1d1f593069e468b208fe6f5071faa3d8d8c0cdee2d303504df87337228ed79cc903f2f7dfc146a14594fcd063755b9943c35dad92c2d762db4441ec6b90442d19a1ce7aca011700"/171, @ANYRESHEX=0xee01, @ANYBLOB=',huge=never,size=xtg,\x00']) 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3181.048444][T18512] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3181.054786][T18512] ? shmem_write_begin+0x7e/0x100 [ 3181.059811][T18512] generic_perform_write+0x1e4/0x3a0 [ 3181.065221][T18512] ? shmem_write_begin+0x100/0x100 [ 3181.070386][T18512] __generic_file_write_iter+0x161/0x300 [ 3181.076026][T18512] ? generic_write_checks+0x250/0x290 [ 3181.081397][T18512] generic_file_write_iter+0x75/0x130 [ 3181.086768][T18512] vfs_write+0x69d/0x770 [ 3181.091097][T18512] __x64_sys_pwrite64+0xf5/0x150 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3181.096063][T18512] do_syscall_64+0x4a/0x90 [ 3181.100485][T18512] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3181.106385][T18512] RIP: 0033:0x419797 [ 3181.110267][T18512] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3181.129916][T18512] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3181.138351][T18512] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 04:50:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:16 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r0) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)=ANY=[@ANYBLOB="02"]) [ 3181.146334][T18512] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3181.154304][T18512] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3181.162333][T18512] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3181.170287][T18512] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:16 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}, 0xa}]}}) [ 3181.253857][T18534] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:50:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:17 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) [ 3181.324897][T18551] SELinux: security_context_str_to_sid(sysadm_u [ 3181.324897][T18551] ) failed for (dev sda1, type ext4) errno=-22 [ 3181.409771][T18562] SELinux: security_context_str_to_sid(sysadm_u [ 3181.409771][T18562] ) failed for (dev sda1, type ext4) errno=-22 04:50:17 executing program 3 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:17 executing program 5: ioctl$sock_ifreq(0xffffffffffffffff, 0x89b0, &(0x7f0000000000)={'ipvlan1\x00', @ifru_map}) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)=ANY=[@ANYBLOB]) 04:50:17 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:50:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:17 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x61, 0x64, 0x31, 0x0, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62, 0x33], 0x2d, [0x36, 0x62, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65, 0x63], 0x2d, [0x36, 0x36, 0x66, 0x34, 0x30, 0x39, 0x30, 0x63]}}}]}) 04:50:17 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}, 0x22}]}}) [ 3181.540268][T18583] FAULT_INJECTION: forcing a failure. [ 3181.540268][T18583] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3181.553623][T18583] CPU: 1 PID: 18583 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3181.563428][T18583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3181.573500][T18583] Call Trace: [ 3181.576783][T18583] dump_stack+0x137/0x19d [ 3181.581112][T18583] should_fail+0x23c/0x250 04:50:17 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x5, &(0x7f00000002c0)=[{&(0x7f00000000c0)="df03287889da73446798f3b12d8d89a9e2b1063aa25e10c48185d55b7d29fcff56cb11ea47a88ca19085b141d6c0f338a28e8b988e4291cbe8e59a7b7620ed0d03f060f61fa6e0a013a1c7240890c19c3b6cef89d481cbc18280ce18a1715c024130bafa56b7c2f3e4867bbb160119fe6f14bddeb8ff61d80dd2ac9b67ebb776bee5987b5cd548ebff1404bfe699d04cd5e6bd76c2154faf312743f97bfa43536ee11277fa0c2ca6b04c88c8171a142b86", 0xb1, 0x1ff}, {&(0x7f0000000200)="2ea8259e28f5f455f6f55c7a1739ff8df47ea4", 0x13, 0xfffffffffffff7ac}, {&(0x7f0000000240)="37868b4e564c274e4893996f72a70e12bc397ef5a6264c4e56243791d9f99936a4a3fcd6b13fb57556802611325ae7504e4387205ca4a0f4dc345e3378747093438f9cbda2237dcd3d2f1c53d28938d985eccf48c6824b3f4d8d682aad9b752d0e77b98f7fc4dd2c3a3c93a846a1844c0077975185558745", 0x78, 0x53a}, {&(0x7f0000000380)="72300c69ca233953a097efa843a776c0092600b7306a895afa61ca87b81596bdf9ff55a540e096b8118220befe2611826a332f9246b3b8bc19b5c2d2687ed84a3c0a14adf359e7a3afade4377cba33973960b82f4ba0d38a5fefd5f722531c9e4056480a2f1798d1ebc6743e53899e4f33ef725cc9e7b4ea74c6d07f6322cfc8b7d5b61a057290aaf7e6b92c2cb68c09d2c6184918d4e38c6a85d345510c70fae37233", 0xa3, 0x5}, {&(0x7f0000000440)="061210eb831435d214b30e6f148df374ac37488fb2b1a8896ae0bdac9b8a3e61acbe369616d1f099bb0a7080f58e239dbb839d9472677b0882b0b53a3eaac00e84ceffd878d1e57e751e5acf6f549b7f2ea04de4ecc2e4f199b60767493061fc4067e4345ac654a0bd9513acd4408d43f5ff6cc52d4c1c874ffdb787369a44410a5729499a47ffcfc049dee26e2150a0c4b28ae60bacfee0531ca049a318b2395ba3737c1fa06f449bd54a2ec6d62c842fb0f8ff3b02b0dbd215318cd18e85b6a797eb06d9985a575861089e2c55b0a3c6d516615b4aeb9bdb2ad287cd4c65d09b186b6337d3889d6f8667db584e21bafc09dc5ede", 0xf5, 0x9}], 0x2, &(0x7f0000000540)={[{@dots}, {@fat=@usefree}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x40}}, {@nodots}, {@dots}, {@nodots}, {@fat=@errors_remount}, {@nodots}, {@nodots}, {@nodots}], [{@dont_hash}, {@appraise}]}) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:17 executing program 2 (fault-call:2 fault-nth:0): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:17 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0xa) r1 = syz_mount_image$nfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x38e, 0x2, &(0x7f0000000300)=[{&(0x7f0000000200)="f12274c77da42dfd6c0f15c5381de64d6f3169538ff4752a93157520bed90cfcb7915a498c4df2197e12272ad07646359eadc973d75bfd2f4b5b7478e9bfbc1a7e19fbade6ac3cb210763b24dd7d34e8399b1b45bc7350347572cc5ccbb1a7236d2ac3300742819d0a50bbe71b0e833dcad833573c650c585ba2265aa037ae52cf2a737d69a6ae566591509da8866bd8271c9e699b6b49e129f426a836d6e40d", 0xa0, 0x8}, {&(0x7f00000002c0), 0x0, 0x7}], 0x8836, &(0x7f0000000380)={[], [{@fowner_gt={'fowner>', 0xee01}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', 0xee01}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@audit}, {@obj_user={'obj_user', 0x3d, '+!'}}]}) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000080)='^\x00', &(0x7f00000000c0)='./file0\x00', r1) [ 3181.581216][T18585] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3181.585573][T18583] __alloc_pages+0xe7/0x310 [ 3181.585597][T18583] alloc_pages_vma+0x3c3/0x5e0 [ 3181.585623][T18583] shmem_getpage_gfp+0x980/0x1410 [ 3181.609980][T18583] shmem_write_begin+0x7e/0x100 [ 3181.615028][T18583] generic_perform_write+0x196/0x3a0 [ 3181.620315][T18583] ? shmem_write_begin+0x100/0x100 [ 3181.625428][T18583] __generic_file_write_iter+0x161/0x300 [ 3181.631061][T18583] ? generic_write_checks+0x250/0x290 04:50:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3aa, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:17 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}, 0x25}]}}) [ 3181.636487][T18583] generic_file_write_iter+0x75/0x130 [ 3181.639979][T18589] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3181.641857][T18583] vfs_write+0x69d/0x770 [ 3181.641885][T18583] __x64_sys_pwrite64+0xf5/0x150 [ 3181.641902][T18583] do_syscall_64+0x4a/0x90 [ 3181.641930][T18583] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3181.641951][T18583] RIP: 0033:0x419797 [ 3181.641964][T18583] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3181.694953][T18583] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3181.703403][T18583] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3181.711661][T18583] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3181.719616][T18583] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3181.727582][T18583] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:17 executing program 3 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ab, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3181.735583][T18583] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3181.786743][T18598] loop0: detected capacity change from 0 to 16375 [ 3181.802019][T18598] FAT-fs (loop0): Unrecognized mount option "dont_hash" or missing value [ 3181.817819][T18611] FAULT_INJECTION: forcing a failure. [ 3181.817819][T18611] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3181.819921][T18604] SELinux: security_context_str_to_sid(sysadm_u%) failed for (dev sda1, type ext4) errno=-22 [ 3181.830893][T18611] CPU: 1 PID: 18611 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3181.850806][T18611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3181.860865][T18611] Call Trace: [ 3181.862403][T18601] loop5: detected capacity change from 0 to 1 [ 3181.864236][T18611] dump_stack+0x137/0x19d [ 3181.864262][T18611] should_fail+0x23c/0x250 [ 3181.878863][T18612] FAULT_INJECTION: forcing a failure. [ 3181.878863][T18612] name failslab, interval 1, probability 0, space 0, times 0 [ 3181.879107][T18611] should_fail_usercopy+0x16/0x20 [ 3181.896734][T18611] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3181.902847][T18611] ? shmem_write_begin+0x7e/0x100 [ 3181.907980][T18611] generic_perform_write+0x1e4/0x3a0 [ 3181.913269][T18611] ? shmem_write_begin+0x100/0x100 [ 3181.918437][T18611] __generic_file_write_iter+0x161/0x300 [ 3181.924076][T18611] ? generic_write_checks+0x250/0x290 [ 3181.929447][T18611] generic_file_write_iter+0x75/0x130 [ 3181.934815][T18611] vfs_write+0x69d/0x770 [ 3181.939058][T18611] __x64_sys_pwrite64+0xf5/0x150 [ 3181.944001][T18611] do_syscall_64+0x4a/0x90 [ 3181.948425][T18611] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3181.954317][T18611] RIP: 0033:0x419797 [ 3181.958203][T18611] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3181.977820][T18611] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3181.986241][T18611] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3181.994219][T18611] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3182.002203][T18611] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3182.010172][T18611] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3182.018137][T18611] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3182.026121][T18612] CPU: 0 PID: 18612 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 [ 3182.034797][T18601] EXT4-fs: 17 callbacks suppressed [ 3182.034809][T18601] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000060929" or missing value [ 3182.035936][T18612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3182.035949][T18612] Call Trace: [ 3182.035956][T18612] dump_stack+0x137/0x19d [ 3182.068599][T18612] should_fail+0x23c/0x250 [ 3182.073016][T18612] ? getname_flags+0x84/0x3d0 [ 3182.077721][T18612] __should_failslab+0x81/0x90 [ 3182.082607][T18612] should_failslab+0x5/0x20 [ 3182.087220][T18612] kmem_cache_alloc+0x46/0x2f0 [ 3182.092060][T18612] getname_flags+0x84/0x3d0 [ 3182.096559][T18612] do_mkdirat+0x3b/0x200 [ 3182.100809][T18612] ? ksys_write+0x157/0x180 [ 3182.105342][T18612] __x64_sys_mkdir+0x32/0x40 [ 3182.109928][T18612] do_syscall_64+0x4a/0x90 [ 3182.114342][T18612] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3182.120250][T18612] RIP: 0033:0x465707 [ 3182.124138][T18612] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3182.143746][T18612] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3182.152158][T18612] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 3182.160138][T18612] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 3182.168106][T18612] RBP: 00007f2cd2f0a040 R08: 0000000000000000 R09: 0000000000000020 [ 3182.176070][T18612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 04:50:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ac, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:17 executing program 0 (fault-call:2 fault-nth:0): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:17 executing program 2 (fault-call:2 fault-nth:1): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:17 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) [ 3182.184059][T18612] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 [ 3182.198102][T18604] SELinux: security_context_str_to_sid(sysadm_u%) failed for (dev sda1, type ext4) errno=-22 [ 3182.208414][T18612] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value 04:50:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ad, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3182.270841][T18615] loop5: detected capacity change from 0 to 1 [ 3182.280171][T18615] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000060929" or missing value [ 3182.311559][T18632] FAULT_INJECTION: forcing a failure. [ 3182.311559][T18632] name failslab, interval 1, probability 0, space 0, times 0 [ 3182.324241][T18632] CPU: 0 PID: 18632 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3182.334238][T18632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3182.344313][T18632] Call Trace: [ 3182.347600][T18632] dump_stack+0x137/0x19d [ 3182.351992][T18632] should_fail+0x23c/0x250 [ 3182.356447][T18632] ? getname_flags+0x84/0x3d0 [ 3182.361136][T18632] __should_failslab+0x81/0x90 [ 3182.365962][T18632] should_failslab+0x5/0x20 [ 3182.370503][T18632] kmem_cache_alloc+0x46/0x2f0 [ 3182.375311][T18632] getname_flags+0x84/0x3d0 [ 3182.379810][T18632] do_mkdirat+0x3b/0x200 [ 3182.384038][T18632] ? ksys_write+0x157/0x180 [ 3182.388538][T18632] __x64_sys_mkdir+0x32/0x40 [ 3182.393130][T18632] do_syscall_64+0x4a/0x90 [ 3182.397532][T18632] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3182.403443][T18632] RIP: 0033:0x465707 [ 3182.407339][T18632] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3182.426968][T18632] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3182.435366][T18632] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 3182.443360][T18632] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 3182.451349][T18632] RBP: 00007fc38030d040 R08: 0000000000000000 R09: 0000000000000020 04:50:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ae, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3182.459309][T18632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 3182.467379][T18632] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 [ 3182.499745][T18637] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3182.516404][T18632] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3182.546449][T18643] FAULT_INJECTION: forcing a failure. [ 3182.546449][T18643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3182.559603][T18643] CPU: 0 PID: 18643 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 [ 3182.569416][T18643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3182.579472][T18643] Call Trace: [ 3182.582751][T18643] dump_stack+0x137/0x19d [ 3182.587112][T18643] should_fail+0x23c/0x250 [ 3182.591529][T18643] should_fail_usercopy+0x16/0x20 [ 3182.596554][T18643] strncpy_from_user+0x21/0x250 [ 3182.601481][T18643] getname_flags+0xb8/0x3d0 [ 3182.605985][T18643] do_mkdirat+0x3b/0x200 [ 3182.610229][T18643] ? ksys_write+0x157/0x180 [ 3182.614743][T18643] __x64_sys_mkdir+0x32/0x40 [ 3182.619333][T18643] do_syscall_64+0x4a/0x90 [ 3182.623752][T18643] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3182.629655][T18643] RIP: 0033:0x465707 [ 3182.633545][T18643] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3182.653133][T18643] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 04:50:18 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000000)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', r0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000380)=ANY=[@ANYBLOB="f866e6e5109326950300f1dadea3f999de77c337cb4399253e03748200faf94a4bd5ae5d3ff9ab288a41f6937b8f48c44f7bfcc179e66aafc9841dcca3746a6cf9710100000001000000b139008f759d3b8c400b1d4e7ee9b40541dc601e22a2427ef1416798ff132d49061a422275d71e5dcdf1d0d4a00042ce5f8df3e093356cdff32192259666434b7c574f94f5985eecd842f96cfd8b116f35ae1a8e8361c953fc4aab60995d00a9bf39c9b6de6f318cd98f79bd710076a577e1e465b4728a7e5b3a3b1961281c5c6eed41cc1f5d41a2681d0e956496e6b631056a3237658e72a854158a089b16b148219505c2124310573c12a183b885937b260200000000000000d06a851cdadd92dbf38e8e46534b92f78e828d7fef6f0c29ccbf818e3b8fb25843295f4de56f449638aaa70e487e849f92eb4a2dfe789c9669c9a8612fe98c8fc1790b0608bd05e22528bf40ee0a3e9f0e9e810a8e078a21856e7b81a70e7f0a3c5bcfb004dbbcec6574132a95c32e74c7daed54b1"]) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000006c0)={'wpan1\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x60, r2, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_IFTYPE={0x8, 0x5, 0xa51d5040cf2b6fac}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0002}}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x400c041) 04:50:18 executing program 3 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3af, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3182.661597][T18643] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 3182.669552][T18643] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 3182.677532][T18643] RBP: 00007f2cd2f0a040 R08: 0000000000000000 R09: 0000000000000020 [ 3182.685483][T18643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 3182.693452][T18643] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 04:50:18 executing program 0 (fault-call:2 fault-nth:1): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) [ 3182.709241][T18637] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3182.757494][T18652] FAULT_INJECTION: forcing a failure. [ 3182.757494][T18652] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3182.770767][T18652] CPU: 1 PID: 18652 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3182.780577][T18652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3182.790717][T18652] Call Trace: [ 3182.793994][T18652] dump_stack+0x137/0x19d [ 3182.798327][T18652] should_fail+0x23c/0x250 [ 3182.802745][T18652] __alloc_pages+0xe7/0x310 04:50:18 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x7, 0x6, 0x1, 0xfffffffb, 0x8001, 0x6, 0xb0d}, 0x1c) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:18 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x2}}) [ 3182.807319][T18652] alloc_pages_vma+0x3c3/0x5e0 [ 3182.812115][T18652] shmem_getpage_gfp+0x980/0x1410 [ 3182.817155][T18652] shmem_write_begin+0x7e/0x100 [ 3182.822111][T18652] generic_perform_write+0x196/0x3a0 [ 3182.823239][T18643] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3182.827424][T18652] ? shmem_write_begin+0x100/0x100 [ 3182.840572][T18654] FAULT_INJECTION: forcing a failure. [ 3182.840572][T18654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3182.841900][T18652] __generic_file_write_iter+0x161/0x300 [ 3182.841930][T18652] ? generic_write_checks+0x250/0x290 [ 3182.841950][T18652] generic_file_write_iter+0x75/0x130 [ 3182.871451][T18652] vfs_write+0x69d/0x770 [ 3182.875723][T18652] __x64_sys_pwrite64+0xf5/0x150 [ 3182.880660][T18652] do_syscall_64+0x4a/0x90 [ 3182.885204][T18652] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3182.891108][T18652] RIP: 0033:0x419797 [ 3182.894995][T18652] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3182.914677][T18652] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3182.923240][T18652] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3182.931206][T18652] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3182.939181][T18652] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3182.947151][T18652] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3182.955118][T18652] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3182.963143][T18654] CPU: 0 PID: 18654 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3182.972978][T18654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3182.983033][T18654] Call Trace: [ 3182.986319][T18654] dump_stack+0x137/0x19d [ 3182.990683][T18654] should_fail+0x23c/0x250 [ 3182.995084][T18654] should_fail_usercopy+0x16/0x20 [ 3183.000112][T18654] strncpy_from_user+0x21/0x250 [ 3183.004959][T18654] getname_flags+0xb8/0x3d0 [ 3183.009453][T18654] do_mkdirat+0x3b/0x200 [ 3183.013702][T18654] ? ksys_write+0x157/0x180 [ 3183.018226][T18654] __x64_sys_mkdir+0x32/0x40 [ 3183.022810][T18654] do_syscall_64+0x4a/0x90 [ 3183.027214][T18654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3183.033106][T18654] RIP: 0033:0x465707 [ 3183.036990][T18654] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3183.056765][T18654] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3183.065179][T18654] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 3183.073209][T18654] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 3183.081175][T18654] RBP: 00007fc38030d040 R08: 0000000000000000 R09: 0000000000000020 [ 3183.089130][T18654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 3183.097089][T18654] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 04:50:18 executing program 3 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:18 executing program 2 (fault-call:2 fault-nth:2): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3183.187110][T18670] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3183.189871][T18677] FAULT_INJECTION: forcing a failure. [ 3183.189871][T18677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3183.210298][T18677] CPU: 1 PID: 18677 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3183.220146][T18677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3183.220521][T18680] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3183.230228][T18677] Call Trace: [ 3183.230241][T18677] dump_stack+0x137/0x19d [ 3183.230267][T18677] should_fail+0x23c/0x250 [ 3183.230284][T18677] should_fail_usercopy+0x16/0x20 [ 3183.257491][T18677] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3183.261219][T18654] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3183.263585][T18677] ? shmem_write_begin+0x7e/0x100 [ 3183.263615][T18677] generic_perform_write+0x1e4/0x3a0 [ 3183.283447][T18677] ? shmem_write_begin+0x100/0x100 [ 3183.288563][T18677] __generic_file_write_iter+0x161/0x300 [ 3183.293263][T18681] FAULT_INJECTION: forcing a failure. [ 3183.293263][T18681] name failslab, interval 1, probability 0, space 0, times 0 [ 3183.294195][T18677] ? generic_write_checks+0x250/0x290 [ 3183.294220][T18677] generic_file_write_iter+0x75/0x130 [ 3183.317825][T18677] vfs_write+0x69d/0x770 [ 3183.322084][T18677] __x64_sys_pwrite64+0xf5/0x150 [ 3183.327143][T18677] do_syscall_64+0x4a/0x90 [ 3183.331568][T18677] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3183.337474][T18677] RIP: 0033:0x419797 [ 3183.341369][T18677] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3183.360970][T18677] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3183.369454][T18677] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3183.377456][T18677] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3183.385431][T18677] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3183.393507][T18677] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3183.401474][T18677] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3183.409445][T18681] CPU: 0 PID: 18681 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 [ 3183.419256][T18681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3183.429308][T18681] Call Trace: [ 3183.432582][T18681] dump_stack+0x137/0x19d [ 3183.436933][T18681] should_fail+0x23c/0x250 [ 3183.441350][T18681] ? __se_sys_mount+0x4e/0x2e0 [ 3183.446131][T18681] __should_failslab+0x81/0x90 [ 3183.450895][T18681] should_failslab+0x5/0x20 [ 3183.455395][T18681] __kmalloc_track_caller+0x64/0x340 [ 3183.460675][T18681] ? strnlen_user+0x137/0x1c0 [ 3183.465356][T18681] strndup_user+0x73/0x120 [ 3183.469767][T18681] __se_sys_mount+0x4e/0x2e0 [ 3183.474366][T18681] ? do_mkdirat+0x69/0x200 [ 3183.478783][T18681] ? ksys_write+0x157/0x180 [ 3183.483286][T18681] __x64_sys_mount+0x63/0x70 [ 3183.487907][T18681] do_syscall_64+0x4a/0x90 [ 3183.492323][T18681] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3183.498672][T18681] RIP: 0033:0x467b1a [ 3183.502616][T18681] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3183.522380][T18681] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3183.530791][T18681] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a 04:50:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:19 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x3}}) 04:50:19 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = syz_io_uring_setup(0x72dc, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000280)) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x0, @fd_index=0x8, 0x9, 0x5, 0x7fffffff, 0x2, 0x0, {0x3}}, 0x9) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)=ANY=[@ANYBLOB='\x00']) 04:50:19 executing program 3 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3183.538766][T18681] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3183.546735][T18681] RBP: 00007f2cd2f0a040 R08: 00007f2cd2f0a040 R09: 0000000020000000 [ 3183.554700][T18681] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3183.562671][T18681] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 [ 3183.595750][T18684] FAULT_INJECTION: forcing a failure. [ 3183.595750][T18684] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3183.609012][T18684] CPU: 1 PID: 18684 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3183.618870][T18684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3183.623400][T18690] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3183.628929][T18684] Call Trace: [ 3183.628939][T18684] dump_stack+0x137/0x19d [ 3183.646585][T18684] should_fail+0x23c/0x250 [ 3183.651054][T18684] __alloc_pages+0xe7/0x310 [ 3183.655564][T18684] alloc_pages_vma+0x3c3/0x5e0 [ 3183.660329][T18684] shmem_getpage_gfp+0x980/0x1410 [ 3183.665423][T18684] shmem_write_begin+0x7e/0x100 [ 3183.666861][T18693] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3183.670484][T18684] generic_perform_write+0x196/0x3a0 [ 3183.670509][T18684] ? shmem_write_begin+0x100/0x100 04:50:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:19 executing program 0 (fault-call:2 fault-nth:2): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:19 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0xdac, 0x7, &(0x7f0000000540)=[{&(0x7f00000000c0)="0bb40121c130dcbb40b35a4d992b9863cf3891e292b116e862b113f331d41b329e4ffc7db8cf106b9ff52d3c116afc229e204484d24bd0b3863d04528b120895e1aba611de643150dbebeaebb951bc37c06051455afa1d42e5b2b38688758836a909f97e1f70a9d59d80", 0x6a, 0x8000}, {&(0x7f0000000140)="c45c07922a3b1ef8adcf", 0xa, 0xc}, {&(0x7f0000000200)="a9672d4c2504fc0c1f54599caf03b25681eb899bf73f7a60a200f870d0369840099548589abac0576121449cfb60d2155bd542482c1d8cac39340083d4a3ff3cf8a4a87552a8c5e5b23b009ca275f67c20d871", 0x53, 0xffff}, {&(0x7f0000000280)="099907237a26e31eef4cd1dbe86ed355aff257f34ba36f10797f5ee0322455f6760d4090", 0x24, 0xd0}, {&(0x7f00000002c0)="a798418de3842148a7ae7d6395fa", 0xe, 0x101}, {&(0x7f0000000380)="9735955aef4851220fb3605ba67d7a3bdd5ab82d5750fd5dd77858b2b5db788cb6f4ae054ce84063098319343c41cd7add7ce66001fb52059a8aacaa5935a33e58392f29ac20fa20113ad349ea89a66404510e33bd13889e873a268e9668e1717da933da35260e4a025fa62953fe745deb3fc3ea91dc1629f4ee8f85cc44330e7b98302217ae4afdddadc3bc6efaa43052a7b552ffcdc88a1407a2942562627844142d27e94ce0623f46acfc98aa57e03be5531a9e7521a50782738d1c4952051f13ca4d822b85e8fc854188b04e89339d9779628962aa0211a9cf6b", 0xdc, 0x8}, {&(0x7f0000000480)="4706daa1b1a1de9db8c1d655b140d5f685864c67bdff278b13dc855d4da122fafec985bedbad4f2c3e807cc506eb057dda60407d3094ad76fc29a5f1f7d6bed8798543e1fbf1ab57c749fb7af2b783a78667241c0ece14381a56fe71a9361d3041ae9a26ea6869c33e8cebe6b926bbeb431ddef51653b08ad0c6a259b7cfa4463c70ce7e85c1265a6a1368b4b12403e6382cc13917dfe40a4c3a3162a5adc62aadd54b2ed360b54ee1ca273f5050614be4a8a024d23386b6bc3a8d", 0xbb, 0x9}], 0x104000, &(0x7f0000000300)={[{@lazytime}, {@barrier}], [{@fsname={'fsname', 0x3d, '*'}}, {@hash}, {@smackfshat={'smackfshat', 0x3d, 'tmpfs\x00'}}]}) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:19 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x4}}) [ 3183.690928][T18684] __generic_file_write_iter+0x161/0x300 [ 3183.696640][T18684] ? generic_write_checks+0x250/0x290 [ 3183.702008][T18684] generic_file_write_iter+0x75/0x130 [ 3183.707407][T18684] vfs_write+0x69d/0x770 [ 3183.711671][T18684] __x64_sys_pwrite64+0xf5/0x150 [ 3183.716617][T18684] do_syscall_64+0x4a/0x90 [ 3183.721052][T18684] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3183.726957][T18684] RIP: 0033:0x419797 04:50:19 executing program 2 (fault-call:2 fault-nth:3): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3183.730879][T18684] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3183.750485][T18684] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3183.758896][T18684] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3183.766866][T18684] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3183.774850][T18684] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3183.782995][T18684] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3183.790961][T18684] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3183.846779][T18710] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3183.857068][T18708] loop5: detected capacity change from 0 to 255 [ 3183.878356][T18713] FAULT_INJECTION: forcing a failure. [ 3183.878356][T18713] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3183.891442][T18713] CPU: 1 PID: 18713 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 [ 3183.898144][T18716] FAULT_INJECTION: forcing a failure. [ 3183.898144][T18716] name failslab, interval 1, probability 0, space 0, times 0 [ 3183.901267][T18713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3183.901280][T18713] Call Trace: [ 3183.901288][T18713] dump_stack+0x137/0x19d [ 3183.931477][T18713] should_fail+0x23c/0x250 [ 3183.935889][T18713] should_fail_usercopy+0x16/0x20 [ 3183.940904][T18713] _copy_from_user+0x1c/0xd0 [ 3183.945492][T18713] strndup_user+0xb0/0x120 [ 3183.949904][T18713] __se_sys_mount+0x4e/0x2e0 [ 3183.954493][T18713] ? do_mkdirat+0x69/0x200 [ 3183.958923][T18713] ? ksys_write+0x157/0x180 [ 3183.963428][T18713] __x64_sys_mount+0x63/0x70 [ 3183.968015][T18713] do_syscall_64+0x4a/0x90 [ 3183.972692][T18713] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3183.978587][T18713] RIP: 0033:0x467b1a [ 3183.982490][T18713] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3184.002178][T18713] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3184.010588][T18713] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3184.018558][T18713] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3184.026529][T18713] RBP: 00007f2cd2f0a040 R08: 00007f2cd2f0a040 R09: 0000000020000000 [ 3184.034498][T18713] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3184.042461][T18713] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 [ 3184.050430][T18716] CPU: 0 PID: 18716 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3184.060277][T18716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3184.062592][T18718] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3184.070322][T18716] Call Trace: [ 3184.070333][T18716] dump_stack+0x137/0x19d [ 3184.088080][T18716] should_fail+0x23c/0x250 [ 3184.092503][T18716] ? __se_sys_mount+0x4e/0x2e0 [ 3184.097271][T18716] __should_failslab+0x81/0x90 [ 3184.102036][T18716] should_failslab+0x5/0x20 [ 3184.106555][T18716] __kmalloc_track_caller+0x64/0x340 [ 3184.111828][T18716] ? strnlen_user+0x137/0x1c0 [ 3184.116497][T18716] strndup_user+0x73/0x120 [ 3184.120897][T18716] __se_sys_mount+0x4e/0x2e0 [ 3184.125501][T18716] ? do_mkdirat+0x69/0x200 [ 3184.129928][T18716] ? ksys_write+0x157/0x180 [ 3184.134416][T18716] __x64_sys_mount+0x63/0x70 [ 3184.139007][T18716] do_syscall_64+0x4a/0x90 [ 3184.143418][T18716] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3184.149295][T18716] RIP: 0033:0x467b1a [ 3184.153186][T18716] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3184.172780][T18716] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3184.181193][T18716] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3184.189157][T18716] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 04:50:19 executing program 2 (fault-call:2 fault-nth:4): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:19 executing program 3 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:19 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x5}}) [ 3184.197107][T18716] RBP: 00007fc38030d040 R08: 00007fc38030d040 R09: 0000000020000000 [ 3184.205067][T18716] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3184.213029][T18716] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 04:50:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3184.284498][T18733] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3184.296218][T18734] FAULT_INJECTION: forcing a failure. [ 3184.296218][T18734] name failslab, interval 1, probability 0, space 0, times 0 [ 3184.308852][T18734] CPU: 0 PID: 18734 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 [ 3184.314556][T18735] FAULT_INJECTION: forcing a failure. [ 3184.314556][T18735] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3184.318689][T18734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3184.318703][T18734] Call Trace: [ 3184.318711][T18734] dump_stack+0x137/0x19d [ 3184.349325][T18734] should_fail+0x23c/0x250 [ 3184.353747][T18734] __should_failslab+0x81/0x90 [ 3184.358511][T18734] ? __se_sys_mount+0xf2/0x2e0 [ 3184.363267][T18734] should_failslab+0x5/0x20 [ 3184.367765][T18734] kmem_cache_alloc_trace+0x49/0x310 [ 3184.373043][T18734] ? _copy_from_user+0x94/0xd0 [ 3184.377805][T18734] __se_sys_mount+0xf2/0x2e0 [ 3184.382415][T18734] ? do_mkdirat+0x69/0x200 [ 3184.386828][T18734] ? ksys_write+0x157/0x180 [ 3184.391327][T18734] __x64_sys_mount+0x63/0x70 [ 3184.395911][T18734] do_syscall_64+0x4a/0x90 [ 3184.400332][T18734] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3184.406224][T18734] RIP: 0033:0x467b1a [ 3184.410120][T18734] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:50:19 executing program 0 (fault-call:2 fault-nth:3): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) [ 3184.429723][T18734] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3184.438140][T18734] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3184.446108][T18734] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3184.454078][T18734] RBP: 00007f2cd2f0a040 R08: 00007f2cd2f0a040 R09: 0000000020000000 [ 3184.462068][T18734] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3184.470048][T18734] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 04:50:20 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffe, 0x3d, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, &(0x7f0000000200)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5, 0x0, 0xfffffbff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0x1) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000000)=ANY=[@ANYBLOB="40fa611e2391cfa0d4f0a9ae00"]) setxattr$incfs_id(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), &(0x7f0000000140)={'0000000000000000000000000000000', 0x33}, 0x20, 0x2) 04:50:20 executing program 2 (fault-call:2 fault-nth:5): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3184.478022][T18735] CPU: 1 PID: 18735 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3184.487912][T18735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3184.497970][T18735] Call Trace: [ 3184.501325][T18735] dump_stack+0x137/0x19d [ 3184.505662][T18735] should_fail+0x23c/0x250 [ 3184.508959][T18738] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3184.510073][T18735] should_fail_usercopy+0x16/0x20 [ 3184.510098][T18735] iov_iter_copy_from_user_atomic+0x281/0xb60 04:50:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:20 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x6}}) [ 3184.531215][T18735] ? shmem_write_begin+0x7e/0x100 [ 3184.536251][T18735] generic_perform_write+0x1e4/0x3a0 [ 3184.541569][T18735] ? shmem_write_begin+0x100/0x100 [ 3184.546775][T18735] __generic_file_write_iter+0x161/0x300 [ 3184.552405][T18735] ? generic_write_checks+0x250/0x290 [ 3184.557784][T18735] generic_file_write_iter+0x75/0x130 [ 3184.563155][T18735] vfs_write+0x69d/0x770 [ 3184.567402][T18735] __x64_sys_pwrite64+0xf5/0x150 [ 3184.572406][T18735] do_syscall_64+0x4a/0x90 [ 3184.576821][T18735] entry_SYSCALL_64_after_hwframe+0x44/0xae 04:50:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ba, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3184.582784][T18735] RIP: 0033:0x419797 [ 3184.586672][T18735] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3184.606367][T18735] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3184.614802][T18735] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3184.622783][T18735] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 04:50:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3bb, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3184.630826][T18735] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3184.638811][T18735] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3184.646790][T18735] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3184.672687][T18751] FAULT_INJECTION: forcing a failure. [ 3184.672687][T18751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3184.685771][T18751] CPU: 1 PID: 18751 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3184.695569][T18751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3184.705620][T18751] Call Trace: [ 3184.708891][T18751] dump_stack+0x137/0x19d [ 3184.713224][T18751] should_fail+0x23c/0x250 [ 3184.717636][T18751] should_fail_usercopy+0x16/0x20 [ 3184.722669][T18751] _copy_from_user+0x1c/0xd0 [ 3184.727277][T18751] strndup_user+0xb0/0x120 [ 3184.731704][T18751] __se_sys_mount+0x4e/0x2e0 [ 3184.736287][T18751] ? do_mkdirat+0x69/0x200 [ 3184.740702][T18751] ? ksys_write+0x157/0x180 [ 3184.745212][T18751] __x64_sys_mount+0x63/0x70 [ 3184.749810][T18751] do_syscall_64+0x4a/0x90 [ 3184.754370][T18751] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3184.760293][T18751] RIP: 0033:0x467b1a [ 3184.764196][T18751] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3184.783810][T18751] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3184.792226][T18751] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3184.800200][T18751] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3184.808164][T18751] RBP: 00007fc38030d040 R08: 00007fc38030d040 R09: 0000000020000000 [ 3184.816997][T18751] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3184.824966][T18751] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 [ 3184.871935][T18767] FAULT_INJECTION: forcing a failure. [ 3184.871935][T18767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3184.885036][T18767] CPU: 1 PID: 18767 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 [ 3184.894843][T18767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3184.904880][T18767] Call Trace: [ 3184.908150][T18767] dump_stack+0x137/0x19d [ 3184.912480][T18767] should_fail+0x23c/0x250 [ 3184.916897][T18767] should_fail_usercopy+0x16/0x20 [ 3184.921917][T18767] _copy_from_user+0x1c/0xd0 [ 3184.926512][T18767] __se_sys_mount+0x115/0x2e0 [ 3184.931189][T18767] ? ksys_write+0x157/0x180 [ 3184.935695][T18767] __x64_sys_mount+0x63/0x70 [ 3184.940278][T18767] do_syscall_64+0x4a/0x90 [ 3184.944699][T18767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3184.950590][T18767] RIP: 0033:0x467b1a [ 3184.954653][T18767] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3184.974280][T18767] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3184.982698][T18767] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3184.990670][T18767] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3184.992441][T18766] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3184.998635][T18767] RBP: 00007f2cd2f0a040 R08: 00007f2cd2f0a040 R09: 0000000020000000 [ 3184.998653][T18767] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3184.998665][T18767] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 [ 3185.034687][T18767] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value 04:50:20 executing program 3 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:20 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x1, 0x9a8, 0xe6, 0x5, 0x3, 0x1, 0x5, 0x81}, &(0x7f0000000080)={0x1, 0x7ec, 0x9, 0x9, 0xffffffffffff666d, 0x9, 0x0, 0x1}, &(0x7f00000000c0)={0x1ff, 0x4, 0x1, 0x9, 0x7, 0x3, 0x0, 0x8001}, &(0x7f0000000100)={0x0, 0x3938700}, &(0x7f0000000200)={&(0x7f0000000140), 0x8}) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f0000000240)={'tunl0\x00', 0x0, 0x40, 0x700, 0x3, 0x296c00, {{0xd, 0x4, 0x3, 0x1, 0x34, 0x65, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@end, @rr={0x7, 0xf, 0x1, [@dev={0xac, 0x14, 0x14, 0x31}, @remote, @dev={0xac, 0x14, 0x14, 0x1b}]}, @timestamp={0x44, 0x10, 0x9c, 0x0, 0x7, [0x3, 0xff, 0x9]}]}}}}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)=ANY=[@ANYBLOB='L']) 04:50:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3bc, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:20 executing program 0 (fault-call:2 fault-nth:4): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:20 executing program 2 (fault-call:2 fault-nth:6): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:20 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x7}}) [ 3185.085687][T18774] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3185.176019][T18788] FAULT_INJECTION: forcing a failure. [ 3185.176019][T18788] name failslab, interval 1, probability 0, space 0, times 0 [ 3185.178509][T18789] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3185.188682][T18788] CPU: 1 PID: 18788 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 [ 3185.204247][T18792] FAULT_INJECTION: forcing a failure. [ 3185.204247][T18792] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3185.208503][T18788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3185.208516][T18788] Call Trace: [ 3185.208524][T18788] dump_stack+0x137/0x19d [ 3185.239315][T18788] should_fail+0x23c/0x250 [ 3185.243730][T18788] ? getname_flags+0x84/0x3d0 [ 3185.248406][T18788] __should_failslab+0x81/0x90 [ 3185.253186][T18788] should_failslab+0x5/0x20 [ 3185.257690][T18788] kmem_cache_alloc+0x46/0x2f0 [ 3185.262446][T18788] getname_flags+0x84/0x3d0 [ 3185.266941][T18788] ? should_fail+0xd6/0x250 [ 3185.271438][T18788] user_path_at_empty+0x28/0x50 [ 3185.276296][T18788] __se_sys_mount+0x209/0x2e0 [ 3185.280977][T18788] ? ksys_write+0x157/0x180 [ 3185.285480][T18788] __x64_sys_mount+0x63/0x70 [ 3185.290072][T18788] do_syscall_64+0x4a/0x90 [ 3185.294485][T18788] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3185.300383][T18788] RIP: 0033:0x467b1a [ 3185.304265][T18788] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3185.323899][T18788] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3185.332311][T18788] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3185.340273][T18788] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3185.348237][T18788] RBP: 00007f2cd2f0a040 R08: 00007f2cd2f0a040 R09: 0000000020000000 [ 3185.356376][T18788] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3185.364337][T18788] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 [ 3185.372302][T18792] CPU: 0 PID: 18792 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3185.382311][T18792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3185.392418][T18792] Call Trace: [ 3185.395678][T18792] dump_stack+0x137/0x19d [ 3185.399988][T18792] should_fail+0x23c/0x250 [ 3185.404473][T18792] __alloc_pages+0xe7/0x310 [ 3185.408955][T18792] alloc_pages_vma+0x3c3/0x5e0 [ 3185.413695][T18792] shmem_getpage_gfp+0x980/0x1410 [ 3185.418709][T18792] shmem_write_begin+0x7e/0x100 [ 3185.423568][T18792] generic_perform_write+0x196/0x3a0 [ 3185.424646][T18789] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3185.428859][T18792] ? shmem_write_begin+0x100/0x100 [ 3185.444184][T18792] __generic_file_write_iter+0x161/0x300 [ 3185.449907][T18792] ? generic_write_checks+0x250/0x290 [ 3185.455366][T18792] generic_file_write_iter+0x75/0x130 [ 3185.460802][T18792] vfs_write+0x69d/0x770 [ 3185.465045][T18792] __x64_sys_pwrite64+0xf5/0x150 [ 3185.470020][T18792] do_syscall_64+0x4a/0x90 [ 3185.471692][T18791] FAULT_INJECTION: forcing a failure. [ 3185.471692][T18791] name failslab, interval 1, probability 0, space 0, times 0 [ 3185.474515][T18792] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3185.474544][T18792] RIP: 0033:0x419797 [ 3185.496875][T18792] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3185.516482][T18792] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 04:50:21 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x8}}) 04:50:21 executing program 2 (fault-call:2 fault-nth:7): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3bd, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3185.524898][T18792] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3185.532867][T18792] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3185.540851][T18792] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3185.548817][T18792] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3185.556780][T18792] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3185.564749][T18791] CPU: 1 PID: 18791 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 04:50:21 executing program 3 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3185.574558][T18791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3185.584611][T18791] Call Trace: [ 3185.587896][T18791] dump_stack+0x137/0x19d [ 3185.592226][T18791] should_fail+0x23c/0x250 [ 3185.596642][T18791] __should_failslab+0x81/0x90 [ 3185.598725][T18796] FAULT_INJECTION: forcing a failure. [ 3185.598725][T18796] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3185.601428][T18791] ? __se_sys_mount+0xf2/0x2e0 [ 3185.601449][T18791] should_failslab+0x5/0x20 [ 3185.623798][T18791] kmem_cache_alloc_trace+0x49/0x310 [ 3185.629082][T18791] ? _copy_from_user+0x94/0xd0 [ 3185.633842][T18791] __se_sys_mount+0xf2/0x2e0 [ 3185.638424][T18791] ? do_mkdirat+0x69/0x200 [ 3185.642835][T18791] ? ksys_write+0x157/0x180 [ 3185.647335][T18791] __x64_sys_mount+0x63/0x70 [ 3185.651931][T18791] do_syscall_64+0x4a/0x90 [ 3185.656342][T18791] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3185.662232][T18791] RIP: 0033:0x467b1a [ 3185.666118][T18791] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3185.685739][T18791] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3185.694151][T18791] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3185.702119][T18791] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3185.710086][T18791] RBP: 00007fc38030d040 R08: 00007fc38030d040 R09: 0000000020000000 [ 3185.718047][T18791] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3185.726010][T18791] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 [ 3185.733977][T18796] CPU: 0 PID: 18796 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3185.743839][T18796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3185.753888][T18796] Call Trace: [ 3185.757224][T18796] dump_stack+0x137/0x19d [ 3185.761558][T18796] should_fail+0x23c/0x250 [ 3185.765997][T18796] should_fail_usercopy+0x16/0x20 [ 3185.771106][T18796] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3185.777231][T18796] ? shmem_write_begin+0x7e/0x100 [ 3185.782262][T18796] generic_perform_write+0x1e4/0x3a0 [ 3185.787557][T18796] ? shmem_write_begin+0x100/0x100 [ 3185.792676][T18796] __generic_file_write_iter+0x161/0x300 [ 3185.798332][T18796] ? generic_write_checks+0x250/0x290 [ 3185.803708][T18796] generic_file_write_iter+0x75/0x130 [ 3185.809098][T18796] vfs_write+0x69d/0x770 [ 3185.813400][T18796] __x64_sys_pwrite64+0xf5/0x150 [ 3185.818359][T18796] do_syscall_64+0x4a/0x90 [ 3185.822887][T18796] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3185.828879][T18796] RIP: 0033:0x419797 [ 3185.832768][T18796] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3185.852438][T18796] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3185.860887][T18796] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3185.865950][T18807] FAULT_INJECTION: forcing a failure. 04:50:21 executing program 0 (fault-call:2 fault-nth:5): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3be, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:21 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0x9, &(0x7f0000000780)=[{&(0x7f00000002c0)="b012a7152d7db805736695a92df08c68ebf176b07fd16239b64f98bb9342c97443ee9623e51770343250853d60af204175f31bb4e9b765222384408eeb9bba901eb016afc8ca3fb1ec509689eb1478c63c6d13f48422c7bb4ff88add59835439a0c1b5e56bc34f3df269b3", 0x6b, 0x80}, {&(0x7f0000000380)="91b6319e1c1d868b9008166e03064cd94dd4ae2abe7e3d93f80f8173a4ec0da8cb83a8dabea8386f3efdb566a0b6707bd3fbc43cf93a06838765a323b7ac97d2dd153954644a61682f5aad98104965ba03c7f8e7ac7d338d22481712ef835c7b164969514e16d6ff83c7f2c726d822d6a949e584de01e1a2", 0x78, 0x9}, {&(0x7f0000000400)="3691ebf2b730f350c896dc50a9ed56304f1497d6976251604d67318b24821e783fa0ad08b00a1727ccb635c02daecce3e55094f54707bd4dd6cc7744148a7ee27cc1bc72d9811753d99672c373eec14804f4f50b29785948b7bd7581a5f8e38d321ce9960521c34a005e97c5dcd19fe6f42e025bb69d34cc59f1206ec066ce034c227a20e672365f78950d044e4c0ec605ab3aba1a5d6b0fbf27fd95f8e5dedd6d6b3c3402351f80", 0xa8, 0x100000000}, {&(0x7f00000004c0)="7f72b556aa90dd657eacd1aec95c42fd1c29889a6892cfcb75446407c7e1e864b932040aa9d6e26aba70d4e1e36c7126964eaa5d0140024d9b5f147b80572210ff83e0e06d57b56bb1c3", 0x4a, 0x9}, {&(0x7f0000000540)="934a3d654e69ffa3dfbb5f87551f5424de45630e6d6e431f69efbfefed0712ad676dab5e31641a80887d77b87f4505921670b08704d03ab34d0d57714e64a5fa36e589fc54490c3a37c659c85469fa6645cbf90407123711f9d111f7feb34bb460ae3439fc626de339e132b89ff8bbb0d5ee0a6cb66c77f0ea00b1ce475066c5903b120636f0609bba94b1aefdf2e86393ae5336f774c028b54e7a4167c2b0bc105ddd9f9efafa5ae18db4a8fc8ea538aaed2052cba86b729073c9120bfa2c6d472d054e346d36e8d3e672", 0xcb, 0x2}, {&(0x7f0000000640)="7a041b064b32c974bf2b7e59791bead120272f617272d1dfd7e72f45befa447868dc3fd4fa5c1dd3b9688d00ee93a85d9e89a5c6f369672a18de0ee0e5d290d044776cd1f1644702730b1f28fd6a5d33a9ad6fd59e9dcd02000954a70bd9a54f192991bf876298", 0x67, 0x6}, {&(0x7f00000006c0)="fc68bfc75e045402a515332f93240defe0bac48bddf6d3e677b35cfa708afbe659fdfbed54d0a91362a3be67284ec7e38bf71086994aca9f6f5d635031de9869b986f921938222adb018af7db12d", 0x4e, 0x76}, {&(0x7f0000001a80)="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", 0x1000, 0xfffffffffffffffd}, {&(0x7f0000000740)="565ce4eac904790a7006110d8031c48c4603a7f29c2105c6ac71e679134bd1b6c4ebc5ede1e286464dac4bab7fc2", 0x2e, 0x3}], 0x22, &(0x7f0000000880)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x6}}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x21}}, {@dioread_lock}, {@nodiscard}, {@nouser_xattr}], [{@dont_measure}, {@appraise_type}]}) r1 = fspick(r0, &(0x7f00000000c0)='./file0\x00', 0x1) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000100)='trusted.', &(0x7f0000000140)='./file0\x00', r0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'security.', '\x00\x00\x00\x00\x00\x00\x00\x00\x00'}) fspick(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) [ 3185.865950][T18807] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3185.868854][T18796] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3185.868872][T18796] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3185.897900][T18796] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3185.905876][T18796] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3185.913848][T18807] CPU: 1 PID: 18807 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 [ 3185.923655][T18807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3185.933745][T18807] Call Trace: [ 3185.937039][T18807] dump_stack+0x137/0x19d [ 3185.941371][T18807] should_fail+0x23c/0x250 [ 3185.945785][T18807] should_fail_usercopy+0x16/0x20 [ 3185.950805][T18807] strncpy_from_user+0x21/0x250 [ 3185.955656][T18807] getname_flags+0xb8/0x3d0 [ 3185.960155][T18807] ? should_fail+0xd6/0x250 [ 3185.964656][T18807] user_path_at_empty+0x28/0x50 [ 3185.969507][T18807] __se_sys_mount+0x209/0x2e0 [ 3185.974217][T18807] ? ksys_write+0x157/0x180 [ 3185.978719][T18807] __x64_sys_mount+0x63/0x70 [ 3185.983306][T18807] do_syscall_64+0x4a/0x90 [ 3185.987722][T18807] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3185.993704][T18807] RIP: 0033:0x467b1a [ 3185.997595][T18807] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3186.017202][T18807] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3186.025613][T18807] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3186.033595][T18807] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3186.041576][T18807] RBP: 00007f2cd2f0a040 R08: 00007f2cd2f0a040 R09: 0000000020000000 [ 3186.049541][T18807] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3186.057507][T18807] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 04:50:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3bf, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:21 executing program 3 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3186.129371][T18821] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3186.135583][T18820] FAULT_INJECTION: forcing a failure. [ 3186.135583][T18820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3186.152611][T18820] CPU: 1 PID: 18820 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3186.162420][T18820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3186.172478][T18820] Call Trace: [ 3186.173938][T18827] FAULT_INJECTION: forcing a failure. [ 3186.173938][T18827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3186.175755][T18820] dump_stack+0x137/0x19d [ 3186.193279][T18820] should_fail+0x23c/0x250 [ 3186.197715][T18820] should_fail_usercopy+0x16/0x20 [ 3186.202742][T18820] _copy_from_user+0x1c/0xd0 [ 3186.207378][T18820] __se_sys_mount+0x115/0x2e0 [ 3186.212061][T18820] ? ksys_write+0x157/0x180 [ 3186.216572][T18820] __x64_sys_mount+0x63/0x70 [ 3186.221177][T18820] do_syscall_64+0x4a/0x90 [ 3186.225694][T18820] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3186.231618][T18820] RIP: 0033:0x467b1a [ 3186.235516][T18820] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3186.255134][T18820] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3186.263566][T18820] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3186.271550][T18820] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3186.279558][T18820] RBP: 00007fc38030d040 R08: 00007fc38030d040 R09: 0000000020000000 [ 3186.287879][T18820] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3186.295848][T18820] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 [ 3186.303825][T18827] CPU: 0 PID: 18827 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3186.313698][T18827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3186.323751][T18827] Call Trace: [ 3186.327022][T18827] dump_stack+0x137/0x19d [ 3186.331370][T18827] should_fail+0x23c/0x250 [ 3186.335807][T18827] __alloc_pages+0xe7/0x310 [ 3186.340323][T18827] alloc_pages_vma+0x3c3/0x5e0 [ 3186.341690][T18820] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3186.345096][T18827] shmem_getpage_gfp+0x980/0x1410 [ 3186.345126][T18827] shmem_write_begin+0x7e/0x100 [ 3186.364547][T18827] generic_perform_write+0x196/0x3a0 [ 3186.369829][T18827] ? shmem_write_begin+0x100/0x100 04:50:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:22 executing program 2 (fault-call:2 fault-nth:8): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3186.375091][T18827] __generic_file_write_iter+0x161/0x300 [ 3186.380757][T18827] ? generic_write_checks+0x250/0x290 [ 3186.386139][T18827] generic_file_write_iter+0x75/0x130 [ 3186.391536][T18827] vfs_write+0x69d/0x770 [ 3186.395836][T18827] __x64_sys_pwrite64+0xf5/0x150 [ 3186.400769][T18827] do_syscall_64+0x4a/0x90 [ 3186.405192][T18827] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3186.411157][T18827] RIP: 0033:0x419797 [ 3186.415047][T18827] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3186.434684][T18827] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3186.436793][T18819] loop5: detected capacity change from 0 to 264192 [ 3186.443097][T18827] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3186.443114][T18827] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3186.443126][T18827] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3186.473479][T18827] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3186.481534][T18827] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3186.494296][T18835] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3186.525766][T18819] loop5: detected capacity change from 0 to 264192 [ 3186.566366][T18856] FAULT_INJECTION: forcing a failure. [ 3186.566366][T18856] name failslab, interval 1, probability 0, space 0, times 0 [ 3186.579117][T18856] CPU: 0 PID: 18856 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 [ 3186.589571][T18856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3186.599621][T18856] Call Trace: [ 3186.602888][T18856] dump_stack+0x137/0x19d [ 3186.607223][T18856] should_fail+0x23c/0x250 [ 3186.611638][T18856] __should_failslab+0x81/0x90 [ 3186.616415][T18856] ? alloc_fs_context+0x46/0x500 [ 3186.621362][T18856] should_failslab+0x5/0x20 [ 3186.625874][T18856] kmem_cache_alloc_trace+0x49/0x310 [ 3186.631223][T18856] alloc_fs_context+0x46/0x500 [ 3186.636050][T18856] ? security_capable+0x91/0xa0 [ 3186.641061][T18856] fs_context_for_reconfigure+0x42/0x50 [ 3186.646621][T18856] path_mount+0x1212/0x1ce0 [ 3186.651129][T18856] __se_sys_mount+0x23d/0x2e0 [ 3186.655867][T18856] __x64_sys_mount+0x63/0x70 [ 3186.660448][T18856] do_syscall_64+0x4a/0x90 [ 3186.664864][T18856] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3186.670758][T18856] RIP: 0033:0x467b1a [ 3186.674646][T18856] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3186.694256][T18856] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3186.702664][T18856] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a 04:50:22 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x9}}) 04:50:22 executing program 3 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:22 executing program 0 (fault-call:2 fault-nth:6): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:22 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) setxattr$incfs_id(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)={'0000000000000000000000000000000', 0x32}, 0x20, 0x3) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000200)='system_u:object_r:hald_log_t:s0\x00', 0x20, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x5c, @private=0xa010100, 0x4e23, 0x2, 'none\x00', 0x8, 0xffffffff, 0x3a}, 0x2c) [ 3186.710719][T18856] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3186.718763][T18856] RBP: 00007f2cd2f0a040 R08: 00007f2cd2f0a040 R09: 0000000020000000 [ 3186.726742][T18856] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3186.734719][T18856] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 [ 3186.780884][T18863] FAULT_INJECTION: forcing a failure. [ 3186.780884][T18863] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3186.794050][T18863] CPU: 0 PID: 18863 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3186.802860][T18865] FAULT_INJECTION: forcing a failure. [ 3186.802860][T18865] name failslab, interval 1, probability 0, space 0, times 0 [ 3186.803860][T18863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3186.803875][T18863] Call Trace: [ 3186.803884][T18863] dump_stack+0x137/0x19d [ 3186.834095][T18863] should_fail+0x23c/0x250 [ 3186.838514][T18863] should_fail_usercopy+0x16/0x20 [ 3186.843537][T18863] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3186.849611][T18863] ? shmem_write_begin+0x7e/0x100 [ 3186.854698][T18863] generic_perform_write+0x1e4/0x3a0 [ 3186.860036][T18863] ? shmem_write_begin+0x100/0x100 [ 3186.865148][T18863] __generic_file_write_iter+0x161/0x300 [ 3186.870786][T18863] ? generic_write_checks+0x250/0x290 [ 3186.876225][T18863] generic_file_write_iter+0x75/0x130 [ 3186.881601][T18863] vfs_write+0x69d/0x770 [ 3186.885939][T18863] __x64_sys_pwrite64+0xf5/0x150 [ 3186.890912][T18863] do_syscall_64+0x4a/0x90 [ 3186.895328][T18863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3186.901223][T18863] RIP: 0033:0x419797 [ 3186.905182][T18863] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3186.924790][T18863] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3186.933207][T18863] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3186.941182][T18863] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3186.949157][T18863] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3186.957151][T18863] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3186.965149][T18863] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3186.973204][T18865] CPU: 1 PID: 18865 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3186.983195][T18865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3186.993355][T18865] Call Trace: [ 3186.996631][T18865] dump_stack+0x137/0x19d [ 3187.000964][T18865] should_fail+0x23c/0x250 [ 3187.003004][T18866] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3187.005386][T18865] ? getname_flags+0x84/0x3d0 [ 3187.005411][T18865] __should_failslab+0x81/0x90 [ 3187.024886][T18865] should_failslab+0x5/0x20 [ 3187.029397][T18865] kmem_cache_alloc+0x46/0x2f0 [ 3187.034165][T18865] getname_flags+0x84/0x3d0 [ 3187.038670][T18865] ? should_fail+0xd6/0x250 [ 3187.043192][T18865] user_path_at_empty+0x28/0x50 [ 3187.048385][T18865] __se_sys_mount+0x209/0x2e0 [ 3187.053061][T18865] ? ksys_write+0x157/0x180 [ 3187.057570][T18865] __x64_sys_mount+0x63/0x70 [ 3187.062157][T18865] do_syscall_64+0x4a/0x90 [ 3187.066602][T18865] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3187.072499][T18865] RIP: 0033:0x467b1a 04:50:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:22 executing program 2 (fault-call:2 fault-nth:9): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3187.076409][T18865] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3187.096012][T18865] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3187.104421][T18865] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3187.112391][T18865] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3187.120381][T18865] RBP: 00007fc38030d040 R08: 00007fc38030d040 R09: 0000000020000000 04:50:22 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0xa}}) 04:50:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3187.128354][T18865] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3187.136320][T18865] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 04:50:22 executing program 3 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:22 executing program 0 (fault-call:2 fault-nth:7): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) [ 3187.195280][T18877] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3187.206199][T18878] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3187.206312][T18876] FAULT_INJECTION: forcing a failure. [ 3187.206312][T18876] name failslab, interval 1, probability 0, space 0, times 0 [ 3187.228983][T18876] CPU: 1 PID: 18876 Comm: syz-executor.2 Tainted: G W 5.12.0-syzkaller #0 04:50:22 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0xb}}) [ 3187.238824][T18876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3187.249011][T18876] Call Trace: [ 3187.252282][T18876] dump_stack+0x137/0x19d [ 3187.256611][T18876] should_fail+0x23c/0x250 [ 3187.261129][T18876] __should_failslab+0x81/0x90 [ 3187.265885][T18876] ? legacy_init_fs_context+0x2d/0x70 [ 3187.271280][T18876] should_failslab+0x5/0x20 [ 3187.275863][T18876] kmem_cache_alloc_trace+0x49/0x310 [ 3187.281128][T18876] ? kmem_cache_alloc_trace+0x215/0x310 [ 3187.286759][T18876] ? alloc_fs_context+0x46/0x500 [ 3187.291733][T18876] legacy_init_fs_context+0x2d/0x70 [ 3187.297004][T18876] alloc_fs_context+0x419/0x500 [ 3187.301859][T18876] fs_context_for_reconfigure+0x42/0x50 [ 3187.307413][T18876] path_mount+0x1212/0x1ce0 [ 3187.311906][T18876] __se_sys_mount+0x23d/0x2e0 [ 3187.316581][T18876] __x64_sys_mount+0x63/0x70 [ 3187.321146][T18876] do_syscall_64+0x4a/0x90 [ 3187.325555][T18876] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3187.331463][T18876] RIP: 0033:0x467b1a [ 3187.335333][T18876] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3187.354924][T18876] RSP: 002b:00007f2cd2f09fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3187.363330][T18876] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3187.371276][T18876] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3187.379238][T18876] RBP: 00007f2cd2f0a040 R08: 00007f2cd2f0a040 R09: 0000000020000000 [ 3187.387185][T18876] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 04:50:23 executing program 2 (fault-call:2 fault-nth:10): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3187.395167][T18876] R13: 0000000020000080 R14: 00007f2cd2f0a000 R15: 00000000200002c0 [ 3187.452854][T18885] FAULT_INJECTION: forcing a failure. [ 3187.452854][T18885] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3187.466285][T18885] CPU: 1 PID: 18885 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3187.476089][T18885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3187.486143][T18885] Call Trace: [ 3187.489436][T18885] dump_stack+0x137/0x19d [ 3187.490262][T18890] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3187.493782][T18885] should_fail+0x23c/0x250 [ 3187.493813][T18885] __alloc_pages+0xe7/0x310 [ 3187.493831][T18885] alloc_pages_vma+0x3c3/0x5e0 [ 3187.518293][T18885] shmem_getpage_gfp+0x980/0x1410 [ 3187.523325][T18885] shmem_write_begin+0x7e/0x100 [ 3187.528191][T18885] generic_perform_write+0x196/0x3a0 [ 3187.533499][T18885] ? shmem_write_begin+0x100/0x100 [ 3187.538667][T18885] __generic_file_write_iter+0x161/0x300 [ 3187.544303][T18885] ? generic_write_checks+0x250/0x290 04:50:23 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0xc}}) [ 3187.549704][T18885] generic_file_write_iter+0x75/0x130 [ 3187.555080][T18885] vfs_write+0x69d/0x770 [ 3187.556235][T18892] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3187.559449][T18885] __x64_sys_pwrite64+0xf5/0x150 [ 3187.559471][T18885] do_syscall_64+0x4a/0x90 [ 3187.578996][T18885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3187.584896][T18885] RIP: 0033:0x419797 [ 3187.588781][T18885] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3187.608389][T18885] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3187.616813][T18885] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3187.624778][T18885] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3187.632748][T18885] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3187.640711][T18885] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:23 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='-}\')+^\\\xe6/(\x00', &(0x7f00000000c0)='\x00'], &(0x7f00000002c0)=[&(0x7f0000000140)=',*(\x00', &(0x7f0000000180)='&{-&\x00', &(0x7f0000000200)='{\x00', &(0x7f0000000240)=')\xad\x00', &(0x7f0000000280)='\x943\x00']) [ 3187.648680][T18885] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3187.672650][T18894] FAULT_INJECTION: forcing a failure. [ 3187.672650][T18894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3187.685737][T18894] CPU: 1 PID: 18894 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 04:50:23 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x290401c, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3187.695546][T18894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3187.705700][T18894] Call Trace: [ 3187.708976][T18894] dump_stack+0x137/0x19d [ 3187.713313][T18894] should_fail+0x23c/0x250 [ 3187.717729][T18894] should_fail_usercopy+0x16/0x20 [ 3187.722748][T18894] strncpy_from_user+0x21/0x250 [ 3187.727615][T18894] getname_flags+0xb8/0x3d0 [ 3187.732114][T18894] ? should_fail+0xd6/0x250 [ 3187.736635][T18894] user_path_at_empty+0x28/0x50 [ 3187.741493][T18894] __se_sys_mount+0x209/0x2e0 [ 3187.746179][T18894] ? ksys_write+0x157/0x180 04:50:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3187.751213][T18894] __x64_sys_mount+0x63/0x70 [ 3187.755798][T18894] do_syscall_64+0x4a/0x90 [ 3187.760213][T18894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3187.766107][T18894] RIP: 0033:0x467b1a [ 3187.769992][T18894] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3187.789489][T18913] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3187.789622][T18894] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3187.800767][T18915] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3187.808428][T18894] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3187.808445][T18894] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3187.808456][T18894] RBP: 00007fc38030d040 R08: 00007fc38030d040 R09: 0000000020000000 [ 3187.808467][T18894] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 04:50:23 executing program 3 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:23 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:23 executing program 0 (fault-call:2 fault-nth:8): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3187.808479][T18894] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 [ 3187.893948][T18923] FAULT_INJECTION: forcing a failure. [ 3187.893948][T18923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3187.907043][T18923] CPU: 0 PID: 18923 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3187.916911][T18923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3187.924974][T18927] FAULT_INJECTION: forcing a failure. [ 3187.924974][T18927] name failslab, interval 1, probability 0, space 0, times 0 [ 3187.926962][T18923] Call Trace: [ 3187.942814][T18923] dump_stack+0x137/0x19d [ 3187.947281][T18923] should_fail+0x23c/0x250 [ 3187.951693][T18923] should_fail_usercopy+0x16/0x20 [ 3187.956729][T18923] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3187.962848][T18923] ? shmem_write_begin+0x7e/0x100 [ 3187.967884][T18923] generic_perform_write+0x1e4/0x3a0 [ 3187.973287][T18923] ? shmem_write_begin+0x100/0x100 [ 3187.978414][T18923] __generic_file_write_iter+0x161/0x300 [ 3187.984059][T18923] ? generic_write_checks+0x250/0x290 [ 3187.989477][T18923] generic_file_write_iter+0x75/0x130 [ 3187.994898][T18923] vfs_write+0x69d/0x770 [ 3187.999144][T18923] __x64_sys_pwrite64+0xf5/0x150 [ 3188.004117][T18923] do_syscall_64+0x4a/0x90 [ 3188.008535][T18923] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3188.014467][T18923] RIP: 0033:0x419797 [ 3188.018370][T18923] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3188.037987][T18923] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3188.046461][T18923] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3188.054483][T18923] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3188.062449][T18923] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3188.070414][T18923] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3188.078476][T18923] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3188.086498][T18927] CPU: 1 PID: 18927 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3188.096323][T18927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3188.106479][T18927] Call Trace: [ 3188.109751][T18927] dump_stack+0x137/0x19d [ 3188.114155][T18927] should_fail+0x23c/0x250 [ 3188.118594][T18927] __should_failslab+0x81/0x90 [ 3188.123356][T18927] ? alloc_fs_context+0x46/0x500 [ 3188.128338][T18927] should_failslab+0x5/0x20 [ 3188.132847][T18927] kmem_cache_alloc_trace+0x49/0x310 [ 3188.138127][T18927] alloc_fs_context+0x46/0x500 04:50:23 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0xd}}) [ 3188.142959][T18927] ? security_capable+0x91/0xa0 [ 3188.147819][T18927] fs_context_for_reconfigure+0x42/0x50 [ 3188.153446][T18927] path_mount+0x1212/0x1ce0 [ 3188.157946][T18927] __se_sys_mount+0x23d/0x2e0 [ 3188.162672][T18927] __x64_sys_mount+0x63/0x70 [ 3188.167254][T18927] do_syscall_64+0x4a/0x90 [ 3188.171674][T18927] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3188.177570][T18927] RIP: 0033:0x467b1a 04:50:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3188.181469][T18927] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3188.191602][T18928] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3188.201252][T18927] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3188.201276][T18927] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3188.201289][T18927] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3188.201301][T18927] RBP: 00007fc38030d040 R08: 00007fc38030d040 R09: 0000000020000000 04:50:23 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x3, 0x6, &(0x7f0000001640)=[{&(0x7f0000000200)="f0624a326423ddf26d537f7e7529925d43defcc8107da0c2ac6b323a42a26e4c99ed2b93e39bb25224c2c0d8a8ab79d2435b5e1cca3031c9ece25ce7477c4b8b14496f6875b12444617059110897cff543e5eedb32f552f20f42525257e0a2139b89a7510cdf43899603b5c3e7d464f383c4d89fe2cb27bca390b0f6618dc98b37004a24ad3e03e03c849112c386977028ca47dc2fe02d50bedd37dcafe855a4bbbb04c20bcc13cc90efed94ac25b5259a9d78bdc698e9d53940fb4ad4269306fe830868f9", 0xc5, 0x4}, {&(0x7f0000000100)="be172b076e8b1af388ba5ad9a7d8cda518676f9d89fd19bd4ad69e0751cf0fb934730bf8", 0x24, 0x5}, {&(0x7f0000000300)="ddf3dadafc691b8156c3982ddd1d8a868d7196fc6d99913a155445683c6d6c4c230f4e73754f00a972a2f3b26bc88751fedb055c01f0e7129e06c95035b98c3b1721d1be0359a5caf3795bc7ec98e1f6bc3636759387a1d3866d126781da6ecf54b1b0898fd1336908e5d993c4cc7f15eefe60c101d279194b7fb064d0fe62921a43444098488d80cf662efd24ea68bf08492c9665a1c75e766b17c9284f3429d0727a1fa19d10aeb7283a489539262c62ff45e46bdc57d169efa92e455340b965ad8088ddd501c0869b87234612ebdf7665ba200c602104502b4ab405917b38b7728e577d449edb45f0cada0f9a46f8e8ff0460dbbfe4ec3b1409b8989bc402b235106d8d5a2ebb5d22210ca9f61e883bf5760b62a950994504972d360551d170a7cfdfe1816e922fb7189f4a267a8c4aecd62e1762dfadb8a5bf86556b8710d3ff56a91998152db17f5d1eff2b39e2b6a41c140d78b94b22582abd5111e1797734cc8310a3e367c4e9b845cba5b8613ca8302ffeb96390ade6e1a2a4416c42c25a309b04a341c6b338aa44476bb1b4b7dd031ce944c25fc32ac44bc8551b31aceaa513dee2ed5373c0db7f3fda74798a40cc8b27396d05f29d16167a8b8b193ca551973b4c7f6a6df296fa3b2496c95068634370b139f5444b7326051239a8830616b0829929ad3c50766e6243945b753b03a01a03dc0f040f37a609efc797b6c636e00fc41489a8f719ccc364af9192a122a51ab30f5356fb9aded342e0f4c17cf0c1e0883c5697c90cff27acd6b2d5d0e2f39ef9ad7601bbd20c280481533423b97c467ed27c36b5bf7cd12b098f62a30e10dd8da30d44d520651b6e6d17d5917f187e28fa0f0fbb8608dbdc976fea0d303a1da2ddf8bb0951f4b238f1db708b1ba67fff62d632a0994d6a2c936b1dc8b6318cecb6e0cd7c88dffed4a7c9d5889b07758e0fb5d91ff2b1e4a94bd868e260389b7fb673c185275d5aada9c92a3bca5b5c5ba275eacb31dbe2faa07a179c66536ab565cae91e5767f99db6b10d94a8fc8bfd31085c724897116dd242f1af9d7c524af8a01953199ebe966c64cef05ba53e2bb294383e58cce02f1b2996fcaaa2bd66967e7852255e1f041e143e122a007a1c7496eedd1ee1f1be2156597b9cfd21018d8c82e17e1190a2e48d2563275f373cd4f267cc95e2a66ffd6a533883953c2b6b0d91406e5718952dbbc472119c6b0c49013065e1ca5c3af6a80c4c9ce1c1cec14014a6e9bd0d2cad0816b9ec12bc8c350db0d4a99b1b2cc43cc747b933085eac1b7bf227eeb8f23c676a7471d0caa11a685f2b9b880b37b65d6df19da8802eda310e04dc43c2c622c20d356671db7ee77a5c79caf302120fe5715b6bc815c0eb4f5ccb6ed61d4e3c63d448386bf6ac7c180394629ed3aa516d8e11b192414e5df53320bd10ed2c9f7e2d96c37b5e3f9d6b61f4d35978320ff7a59a7b83deab30a4314f54d2576b4957cee894e6ee3dd103710f4c6182b6ce6f7da2569ab2b311b8e1610423f42b67a45d6f2c1f974bafc9ddf84fe05524fe5ac928044263144cd8029e729ed16d06b4308a18925951b41404aa0c31bcc826c05ce7172b4f7b5f9ffccb44b40d3c2fb724fd0d7d6afe25590a20a61069e3df83d8f8ac8a0b690337c883e0d2a09d80f85f81c300b1dadbe3d13b6ff81ac1819e0a78854f5d6dae5e3d8090b7f6784e8cefed0a1bd17a3ee9ed940cb72059350dcf3e6f8413b977a284ad6e7d2bf4ee80708d01eac878961ef0f518d802b0b95a2b8a7ac457ad8c49958c7360727a7326f62a1826205003361425d1a2ba380507618dcf5efb15b25ff088512d0721fc39326ff6d8de81211b70632a37ccf8e661f4353bff9b5308bb21c87745fe3968db03259fe297e3bc6e2a2af91591c66d5854fbeb7e698febc81cf7970e77c289cd4b24ce426d16a884175a6b53ceed979db0da2cd6f8efcf2d662a082c35dadd65d386e79148c3114e7d1bac35732e938833c1fa2e7ef78ba73a883236b34e7104e60058e4c7e05b6a035e6586429e07d330e216ff2b1de86d243f93878e477d46101b15f05ba76fdfc41e4becf2ed205bd88bcfcbea93bb5290d65119e3cd624bc6bc512b1049c627762d4989a9ef31b5c72ac009497593121118e4d1ca3f1724ce9c5a44657115ec7431147f9828d8e11894d39955fa82113af0699368ddfb133cc8feabdde28f0ed8bb7b543f16076d959e380c98c9d07de7de394785095bbaa92da132ab176c0b4f84664af04fa7f6ecb4b7e030f4d9ef8ee83be64231459bef17764abd07fa4cbcef50104086b92e68c6a7acee9ebbdad36b2dc2be1845668645c01b13caf3403db28b8be204495a07292099455a7bf2af813fa161dad3f1f85fe192792dc168a08a69885bb1a93a2deb43bcf814b85e0876fd36f44852375d49756f50e031ed1830704f50b408da2d2847656cbb466caa09d3582821a54558e50839ca0fecc57336e7bbfdc3503a4473475c9514808fab5700ea2729e891368a2b72e42558644d8010fe924cde229d54ecb8b114d0526d05e80bf7e7b5c7ce22b0a41394e470a646a789ed9debcb51ac4d1264548414bc4638a7492d9678fa968800842fe8c17300b73bf73f63864524f1f8e038610297c3e5d9c463769e2105dbd830332bee15608af61f4738a728be7671606f66ebd50e1d57313cc0ec9d5f9f852d10b92b3efda2f9bba5793a9bc1445c6f1c851508b4f88ac44adf4d7fa70bb87d02c8a61da996d167ce3328ece4dd4b2165f6de5f3798e04ae47ff45efb2eb0d2a198cfb873c9cc248be602128a206d5f1f0d9718205ca62a2d19db6115b98f287d09c487573f4687bca9d9075314873055b6264da66d9a096ec8373b9d580f3cf17e83ee10dd42882efd19744d8a568fcd927da3e1089e461092ef3db245475f21f39571b8f1daf818428d529dee9a37cee77446f8608b574fe9b287a2d85d5c2b7cfb4105d0e2967be35da2bba0d1751841f9d958d1817b0f6332239f68576af524d533ab427d029c458e32f49e31d2b24565df7ef4f3d41b5a756f276a5354ef7e3fa751635d6d39aa558ad56b384ffe8da10a77442803165f23673df4f073db27d59a6ffee8d96b41cb0237873cad57f1568f588fd802ad69223f632f9a521cb2b2cdaf47d9670412e7bb06a81d4f8d7b6c3be53688e469f16c47d3a5343853604a4aa4ac3faa7487210581affee9a470b945c7f8a0215bada238e8e58db5f1be56b0b72ec84bb2a9f5237e595123f54f87f9eb47d28bda655a63e9bdda36c0baaaad143158534feac0178517b103a68d9e9e44111afc9e5d9b735bd7b8aa24945aab2eb35d4fa78a2e26ceff6d71dcbb275242f0f70c7f0c1ae8cd2d85f6ce7c8f7aea5764ce593200870f581a6c3b4891da1cb73a65b76314b0e399b2c6b622ecac8708e291bfe6ac22bc3acfa7d8033a86dff8ad8b03b1a5ec13d6f06737bf01a1c1b33c68679da5475935d428d4debe987f49c24c4f0963d1de10b770d84507b71a4eaf203b5492e1b6d48f0ab90788c1eb07791627f1b0465a8bd62d09b9b96adedff12d5ea38d2e8c2f1450bd6869fe432e708a8ac207c8113a2d00b14b8d62db98606e54839986163307f3abd01e8e499879accba608f1512f2cf3bcc507fbc3b76b5e71dd78e583571cfa4458d2cb0abb5c856c2b4bd6d014402e0d6a15f5de8b99d6a67765ef87e3080e604ae10018c8bccc17dfc5cc7ede3c5ef060a93730847926099880677224bc52894b207082899d74604870b2cc57b73b60d1ba4accf7b052a844b6b29f7ed181ad2b69e40c125f327b716e4ffa1a96fb23d4454057c28f286e6054608de44b08a931995972432e4ccb99c144afb0a0ca4daa116adbfd4b5f91de3c576f10e26ab53e2586ab0d22cb7bb0c4b94b09287f88f9aeda244874b2c07d7c86b292dbd5bbaac331ae07e2088c810aca227ca3f0779202d9fc2c08dccc55c53f4f4de785f208dae5f2b49a0dd876c3fcb6b18623a65e9dcdd522ff7dbfb2610e9a6e7eb96e2800ed314b9bd44fdd254b8ab78f705b8ea277774966d00d8e30cd86cffee49fc6afdcee7eacf48348af4ed41599facdb7fb992fe0146e750c024425d00131ad7759957e030f538c64fb6a244d5b7d0d34f935a2dbdcec5e215ff5ca7d5b5ec9fe70ff5be6f34eb043b812895728f51507d69797696107bcaa973d4e688c72b64b2787304fce0f358849228e13db198538ac83b0d612877ecc20d19dca1cdc13de852d22156202c3a58f20f121d6998ca1eaac8e8d9ee1b127d381f41ab10182c3808ed3d1d37764666a8f5ca2fa1395bc4c85e5eb6f4aa631c96300f6a478ce362b8222bf7858e62f26a34f07bdc0cbfac0f433a2d5d5626a5779d145bb402b2e2089d54e39276f70f9bb9a709b88732892decd2378fa77dd0bb17b9f084dd8c48de5a5e8d3f09314574207b3d0b0302c288b744eed00781ccfc681dc0945caeb454431a88ddf157dfe547352c3bdf6b5721c4de961803104497ec141489fd5e0ff03f0fe614917a9f72f0a0aac68c9def44e8af5bd99c615323ff691668940f708ef60543679e78276161b8ac67dd26082580caa75d7a7b5f0bb474b656565a5a92e0c4e4a72cfee7fed2955057dadcd295125d2670b477a572e9ec2a283c5f686f6beeec01a531f76cd9b8a15d5d6c803d75163fa41d8b9c7f874a8aba3442e16bec913373be367767914a1c0f122e0a1077f6d1f0a36238696b4327273fef0806c02566d50862624a383fac44439da0844d14901faa5ebf6ac4e75465632375a41e6b02c047b82a82e2d1e8f80e0db9e8a12adc49f465853a790ef39c3b90a121a400f5cc6763b19857708ffafa468b91b6731264d92768c98c2f20c32e6f7a3a467e9beb15e5750d43650b1a32e7757774c57cf6ed748777dff08ef4b2e78bbe2cd36e940e2756307558f8c34403b9037cf74c3ab85eac69ce71cbc74f42cf6015b1bfd013ca21f1508a3c873995eda4c0ae93ba9942ee3496a84b3ce7b1ecc85381821184eff8ce186c6b7b88b9c8e1e6020f67cc4eb5cc53528fdcc20fe5034261f722fca21dc550b50c230dcf0b2c795db9bb50704391443317ed4d0a80ec41ce270e2afc54377b78acbff15e89c0ffaa0371e7859a718be34fb4707ba68db16a5c16660107b534f4888db137ebc3f2c55fad23645e6a924d2975eb70b5dc0498a05aace6dfca3ae4eaf04bd79ff45bc15e4bf30ceb4eacb33492bddc4f18e6aa05995be8c3226095e7a7f5b79d670c7dfe3368e6a08cb733e9e8a68bb5dfd5f204762832f8b7e31cfb91f7856043031ba37625db13ce5e35ed5561f8680c2e05d54d829843e39eeabdab329674943eabc9c2f058521e15650439d539961cb4a6b3253538b5eed5317ec7cad6f6c577af5b1e72d813f8273ec4ff8af948bee729699ddff3a017750fca5cf2da3565cde9bf719e5bbdd24a071b527d5861fbf16e04e6ba386f1626948ae2ca2f9f9339684edb75c07f3e13a5a0e91f59bdf5bfebaba8b3eef2643a3d309d2100b91ba3e10e69a1f2708f0fbfaeccd09293d86536490de3aadbefa4ae5c3b93f5813dd2d69943ccd5503b0d520c1aef43ee5019c29666be5557137e48f778305e609c3d76b9afe81b438819b50b5acb6b5babc20f4e45fb8379836ea03bf7e6506456faa24c08dbbd7d61b6e6a92722a8a71453f8d81ad9d7737b3eee30d79bed8a1e7f306abe74fb51d012cfaddc1aacd0bb12ca96dfb86565a", 0x1000, 0x8}, {&(0x7f00000013c0)="10ae2219da0a9cca095ef642621bf56852398e6436935d91899412ff2090333fcc5b6336421fc7c5d6e9940d709afc23a4b278dc9d33bc05d0e6c769e44e85b0d22aa8518ae29a87d05ce61d172a4a6f7f314bb79d3cb7e9e97aa8f212992d84b9407cf4367f769bb55c6ca0a02ad0603fb8d9b140b1bcfc7d1340bd2ac8bebcf0d361ee1998e273c1022bc9ba94614d1c30c09d4b440111cdbb3aa11fd797914ddfa2d448dec48d6e2f6c", 0xab, 0x7f}, {&(0x7f0000001480)="d1fb0efd0887ca242bc82b73f4e7111ac71ba49fe0bd088161768ac3c68ffab0cf8ffbb77a84691e6f50ec29d02e5b244cb17c526102e6370eeb3eb0670c884c9c697382db2760a679393a813dd3910fdffc658f21cd97d0925c2d73a870ce6a7c5d3927493b2db062da71fa9883f4c5c6944599776df3e7554017b302acb9b80f6ba405ffc5946fc09a0145668f6e150ca2b9dde627360a07", 0x99, 0x2}, {&(0x7f0000001540)="a5dd6ef8752473d39ac499b6c6f926fd9ecbbdf66b5c66f8eac22db8722cd715d136b978130558126fcdcd26bd1e53d1ca256c99201e85f5e5004fde7b06b4b059bd1ed4d52a4adaf55c8e5b81b3b5ad55a84cf5f208164932157276ec4b995c5f87ceebd1110376b2e78ace2801304f33f12316ed0481b6f135f269f9474ba2f901c863992ba3cc3ba0cf9da0f4f88fec9de4fe674fa52acc648ed12a6c58c18f3207ee8a46925dba13d147733f77234b1d1eab047777155330eef43d5ec8766e9833fec50bd1564ef86373e353958ef737350f42b7a5c0228c65", 0xdb, 0xffffffffffffffff}], 0x4000, &(0x7f0000001700)={[{@fat=@sys_immutable}, {@dots}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_hash}, {@smackfshat={'smackfshat', 0x3d, 'tmpfs\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'tmpfs\x00'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, '&'}}, {@uid_eq={'uid', 0x3d, 0xee01}}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3188.242984][T18927] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3188.251027][T18927] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 04:50:24 executing program 0 (fault-call:2 fault-nth:9): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:24 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3188.345138][T18943] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3188.364408][T18946] loop5: detected capacity change from 0 to 16383 [ 3188.376894][T18947] FAULT_INJECTION: forcing a failure. [ 3188.376894][T18947] name failslab, interval 1, probability 0, space 0, times 0 [ 3188.377825][T18946] FAT-fs (loop5): Unrecognized mount option "euid=18446744073709551615" or missing value [ 3188.389584][T18947] CPU: 0 PID: 18947 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3188.409113][T18947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3188.410811][T18951] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3188.419167][T18947] Call Trace: [ 3188.419177][T18947] dump_stack+0x137/0x19d [ 3188.436853][T18947] should_fail+0x23c/0x250 [ 3188.441294][T18947] __should_failslab+0x81/0x90 [ 3188.446143][T18947] ? legacy_init_fs_context+0x2d/0x70 [ 3188.451521][T18947] should_failslab+0x5/0x20 [ 3188.456026][T18947] kmem_cache_alloc_trace+0x49/0x310 [ 3188.461309][T18947] ? kmem_cache_alloc_trace+0x215/0x310 [ 3188.466876][T18947] ? alloc_fs_context+0x46/0x500 [ 3188.471823][T18947] legacy_init_fs_context+0x2d/0x70 [ 3188.477030][T18947] alloc_fs_context+0x419/0x500 [ 3188.481924][T18947] fs_context_for_reconfigure+0x42/0x50 [ 3188.487612][T18947] path_mount+0x1212/0x1ce0 [ 3188.492191][T18947] __se_sys_mount+0x23d/0x2e0 [ 3188.496901][T18947] __x64_sys_mount+0x63/0x70 [ 3188.501662][T18947] do_syscall_64+0x4a/0x90 [ 3188.506105][T18947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3188.512014][T18947] RIP: 0033:0x467b1a [ 3188.515902][T18947] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3188.535504][T18947] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:50:24 executing program 3 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:24 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0xe}}) 04:50:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ca, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3188.538728][T18954] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3188.543927][T18947] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3188.563606][T18947] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3188.571593][T18947] RBP: 00007fc38030d040 R08: 00007fc38030d040 R09: 0000000020000000 [ 3188.579604][T18947] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3188.587600][T18947] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 04:50:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cb, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3188.600403][T18964] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3188.616282][T18958] loop5: detected capacity change from 0 to 16383 [ 3188.624130][T18962] FAULT_INJECTION: forcing a failure. [ 3188.624130][T18962] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3188.637378][T18962] CPU: 1 PID: 18962 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3188.647182][T18962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3188.653169][T18958] FAT-fs (loop5): Unrecognized mount option "euid=18446744073709551615" or missing value [ 3188.657246][T18962] Call Trace: [ 3188.657257][T18962] dump_stack+0x137/0x19d [ 3188.657284][T18962] should_fail+0x23c/0x250 [ 3188.657301][T18962] __alloc_pages+0xe7/0x310 [ 3188.683579][T18962] alloc_pages_vma+0x3c3/0x5e0 [ 3188.688418][T18962] shmem_getpage_gfp+0x980/0x1410 [ 3188.693473][T18962] shmem_write_begin+0x7e/0x100 [ 3188.698325][T18962] generic_perform_write+0x196/0x3a0 [ 3188.703614][T18962] ? shmem_write_begin+0x100/0x100 [ 3188.708787][T18962] __generic_file_write_iter+0x161/0x300 [ 3188.714443][T18962] ? generic_write_checks+0x250/0x290 [ 3188.719816][T18962] generic_file_write_iter+0x75/0x130 [ 3188.725186][T18962] vfs_write+0x69d/0x770 [ 3188.729434][T18962] __x64_sys_pwrite64+0xf5/0x150 [ 3188.734404][T18962] do_syscall_64+0x4a/0x90 [ 3188.738881][T18962] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3188.744869][T18962] RIP: 0033:0x419797 04:50:24 executing program 0 (fault-call:2 fault-nth:10): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cd, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ce, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3188.748756][T18962] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3188.768800][T18962] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3188.777216][T18962] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3188.785209][T18962] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3188.793173][T18962] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3188.801138][T18962] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3188.809164][T18962] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3188.818414][T18972] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:24 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x15001, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) mount(&(0x7f0000000000)=@md0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ntfs\x00', 0x280080, &(0x7f0000000100)='tmpfs\x00') 04:50:24 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cf, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:24 executing program 3 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:24 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x10}}) [ 3188.854998][T18986] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3188.921921][T18988] FAULT_INJECTION: forcing a failure. [ 3188.921921][T18988] name failslab, interval 1, probability 0, space 0, times 0 [ 3188.933690][T19003] FAULT_INJECTION: forcing a failure. [ 3188.933690][T19003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3188.934656][T18988] CPU: 0 PID: 18988 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3188.957444][T18988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3188.967508][T18988] Call Trace: [ 3188.970791][T18988] dump_stack+0x137/0x19d [ 3188.975166][T18988] should_fail+0x23c/0x250 [ 3188.979586][T18988] ? ext4_remount+0x53/0x1840 [ 3188.984341][T18988] __should_failslab+0x81/0x90 [ 3188.989102][T18988] should_failslab+0x5/0x20 [ 3188.993603][T18988] __kmalloc_track_caller+0x64/0x340 [ 3188.998904][T18988] ? list_lru_add+0xd6/0x2c0 [ 3189.003507][T18988] kstrdup+0x31/0x70 [ 3189.007452][T18988] ext4_remount+0x53/0x1840 [ 3189.012226][T18988] ? call_rcu+0x259/0x6c0 [ 3189.016614][T18988] ? __cond_resched+0x11/0x40 [ 3189.021339][T18988] ? __dentry_kill+0x456/0x4e0 [ 3189.026165][T18988] ? shrink_dentry_list+0x54e/0x580 [ 3189.031363][T18988] ? find_next_bit+0xa7/0xf0 [ 3189.035957][T18988] ? ext4_statfs+0x6b0/0x6b0 [ 3189.040550][T18988] legacy_reconfigure+0x8e/0xa0 [ 3189.045414][T18988] reconfigure_super+0x2d3/0x4f0 [ 3189.050347][T18988] path_mount+0x1442/0x1ce0 [ 3189.054851][T18988] __se_sys_mount+0x23d/0x2e0 [ 3189.059558][T18988] __x64_sys_mount+0x63/0x70 [ 3189.064152][T18988] do_syscall_64+0x4a/0x90 [ 3189.068565][T18988] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3189.074459][T18988] RIP: 0033:0x467b1a [ 3189.078345][T18988] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3189.097946][T18988] RSP: 002b:00007fc38030cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3189.106363][T18988] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 3189.114434][T18988] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 3189.122404][T18988] RBP: 00007fc38030d040 R08: 00007fc38030d040 R09: 0000000020000000 [ 3189.130373][T18988] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000020000000 [ 3189.138352][T18988] R13: 0000000020000080 R14: 00007fc38030d000 R15: 00000000200002c0 [ 3189.146325][T19003] CPU: 1 PID: 19003 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3189.156136][T19003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3189.166188][T19003] Call Trace: 04:50:24 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x80) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3189.169463][T19003] dump_stack+0x137/0x19d [ 3189.173797][T19003] should_fail+0x23c/0x250 [ 3189.178209][T19003] should_fail_usercopy+0x16/0x20 [ 3189.183244][T19003] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3189.189325][T19003] ? shmem_write_begin+0x7e/0x100 [ 3189.194410][T19003] generic_perform_write+0x1e4/0x3a0 [ 3189.199722][T19003] ? shmem_write_begin+0x100/0x100 [ 3189.204846][T19003] __generic_file_write_iter+0x161/0x300 [ 3189.210530][T19003] ? generic_write_checks+0x250/0x290 [ 3189.215947][T19003] generic_file_write_iter+0x75/0x130 [ 3189.221410][T19003] vfs_write+0x69d/0x770 [ 3189.225666][T19003] __x64_sys_pwrite64+0xf5/0x150 [ 3189.230632][T19003] do_syscall_64+0x4a/0x90 [ 3189.235124][T19003] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3189.237467][T19006] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3189.241110][T19003] RIP: 0033:0x419797 04:50:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:24 executing program 0 (fault-call:2 fault-nth:11): syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:25 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x3f7, 0x300, 0x70bd25, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x6000800}, 0x1) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) io_uring_setup(0x4d52, &(0x7f0000000200)={0x0, 0x2837, 0x0, 0x2, 0x28e, 0x0, r1}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) [ 3189.241127][T19003] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3189.241143][T19003] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3189.241160][T19003] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3189.241170][T19003] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3189.241181][T19003] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3189.241197][T19003] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3189.241208][T19003] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:25 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3189.337912][T19009] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3189.364248][T19022] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:25 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffffff7fffffff, 0x0, 0x0, 0x28024a0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x3000001) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000006c0)={'wpan1\x00'}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000080)=ANY=[@ANYRESOCT=r0]) [ 3189.399333][T19025] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3189.446928][T19025] FAULT_INJECTION: forcing a failure. [ 3189.446928][T19025] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3189.446975][T19030] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3189.460023][T19025] CPU: 0 PID: 19025 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3189.479238][T19025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3189.489315][T19025] Call Trace: [ 3189.492596][T19025] dump_stack+0x137/0x19d [ 3189.497163][T19025] should_fail+0x23c/0x250 [ 3189.501584][T19025] should_fail_usercopy+0x16/0x20 [ 3189.506616][T19025] _copy_to_user+0x1c/0x90 [ 3189.511035][T19025] simple_read_from_buffer+0xab/0x120 [ 3189.516532][T19025] proc_fail_nth_read+0xf6/0x140 [ 3189.521469][T19025] ? rw_verify_area+0x136/0x250 [ 3189.526329][T19025] ? proc_fault_inject_write+0x200/0x200 [ 3189.531987][T19025] vfs_read+0x154/0x5d0 [ 3189.536193][T19025] ? __fget_light+0x21b/0x260 [ 3189.540965][T19025] ? __cond_resched+0x11/0x40 [ 3189.545655][T19025] ksys_read+0xce/0x180 [ 3189.549813][T19025] __x64_sys_read+0x3e/0x50 [ 3189.554579][T19025] do_syscall_64+0x4a/0x90 [ 3189.558987][T19025] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3189.564885][T19025] RIP: 0033:0x41937c [ 3189.568771][T19025] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3189.588373][T19025] RSP: 002b:00007fc38030d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 04:50:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:25 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x11}}) [ 3189.596861][T19025] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 3189.604833][T19025] RDX: 000000000000000f RSI: 00007fc38030d1e0 RDI: 0000000000000003 [ 3189.612808][T19025] RBP: 00007fc38030d1d0 R08: 0000000000000000 R09: 0000000020000000 [ 3189.620781][T19025] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000002 [ 3189.628784][T19025] R13: 00007ffddfb83a1f R14: 00007fc38030d300 R15: 0000000000022000 04:50:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3189.654741][T19038] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value 04:50:25 executing program 3 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:25 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:25 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000000) 04:50:25 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3189.702507][T19043] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3189.740792][T19048] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:25 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x12}}) 04:50:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3189.808551][T19056] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3189.823253][T19061] FAULT_INJECTION: forcing a failure. [ 3189.823253][T19061] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3189.836507][T19061] CPU: 1 PID: 19061 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3189.846321][T19061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3189.856372][T19061] Call Trace: [ 3189.859645][T19061] dump_stack+0x137/0x19d [ 3189.864095][T19061] should_fail+0x23c/0x250 [ 3189.868546][T19061] __alloc_pages+0xe7/0x310 [ 3189.873074][T19061] alloc_pages_vma+0x3c3/0x5e0 [ 3189.877836][T19061] shmem_getpage_gfp+0x980/0x1410 [ 3189.882871][T19061] shmem_write_begin+0x7e/0x100 [ 3189.887726][T19061] generic_perform_write+0x196/0x3a0 [ 3189.893024][T19061] ? shmem_write_begin+0x100/0x100 [ 3189.898181][T19061] __generic_file_write_iter+0x161/0x300 [ 3189.903822][T19061] ? generic_write_checks+0x250/0x290 [ 3189.909194][T19061] generic_file_write_iter+0x75/0x130 [ 3189.914572][T19061] vfs_write+0x69d/0x770 [ 3189.918888][T19061] __x64_sys_pwrite64+0xf5/0x150 [ 3189.923912][T19061] do_syscall_64+0x4a/0x90 [ 3189.928336][T19061] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3189.934253][T19061] RIP: 0033:0x419797 [ 3189.938165][T19061] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3189.957780][T19061] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3189.966204][T19061] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3189.974208][T19061] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3189.982271][T19061] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3189.990246][T19061] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3189.998266][T19061] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3190.009645][T19060] ================================================================== [ 3190.017742][T19060] BUG: KCSAN: data-race in list_lru_add / list_lru_count_node [ 3190.025223][T19060] [ 3190.027554][T19060] write to 0xffff8881019b8f28 of 8 bytes by task 19064 on cpu 1: [ 3190.035280][T19060] list_lru_add+0x26d/0x2c0 [ 3190.039800][T19060] retain_dentry+0x226/0x260 [ 3190.044414][T19060] dput+0x3d/0x360 [ 3190.048150][T19060] do_symlinkat+0xf6/0x280 [ 3190.052577][T19060] __x64_sys_symlink+0x32/0x40 [ 3190.057357][T19060] do_syscall_64+0x4a/0x90 [ 3190.061791][T19060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3190.067721][T19060] [ 3190.070046][T19060] read to 0xffff8881019b8f28 of 8 bytes by task 19060 on cpu 0: [ 3190.077711][T19060] list_lru_count_node+0x28/0x30 [ 3190.082675][T19060] shrink_dcache_sb+0x14e/0x1c0 [ 3190.087634][T19060] reconfigure_super+0x2aa/0x4f0 [ 3190.092610][T19060] path_mount+0x1442/0x1ce0 [ 3190.097141][T19060] __se_sys_mount+0x23d/0x2e0 [ 3190.101829][T19060] __x64_sys_mount+0x63/0x70 04:50:25 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r1) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r1) getpeername(r1, &(0x7f0000000080)=@in, &(0x7f0000000000)=0x80) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r3) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r3) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x7800, 0x80, 0x5, 0x1, {{0x2e, 0x4, 0x2, 0x2, 0xb8, 0x67, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010101, @broadcast, {[@cipso={0x86, 0x36, 0x1, [{0x2, 0x5, "f4f598"}, {0x5, 0x12, "ba2d092f38165082e55141a350360137"}, {0x6, 0xd, "8533f09eb11de91ef35db9"}, {0x7, 0x4, "c2ff"}, {0x0, 0x5, "558dcd"}, {0x0, 0x3, 'o'}]}, @generic={0x88, 0x8, "7bb3e8288c0c"}, @timestamp={0x44, 0x18, 0xff, 0x0, 0x7, [0x5, 0xff, 0xfffffffa, 0x892, 0x0]}, @noop, @timestamp_prespec={0x44, 0x1c, 0xa6, 0x3, 0xa, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x27}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0x6}]}, @noop, @lsrr={0x83, 0x17, 0x24, [@private=0xa010101, @loopback, @private=0xa010100, @private=0xa010100, @multicast1]}, @cipso={0x86, 0x6, 0x3}, @lsrr={0x83, 0x13, 0xac, [@loopback, @multicast1, @dev={0xac, 0x14, 0x14, 0x3f}, @dev={0xac, 0x14, 0x14, 0x26}]}]}}}}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r5) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r5) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280), r1) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r5, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x28, r6, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x44000}, 0x4000000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000480)={'ip6_vti0\x00', 0x0, 0x4, 0x31, 0x0, 0x80000000, 0x66, @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, 0x8, 0x40, 0x10001, 0x2}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000500)={'ip_vti0\x00', &(0x7f0000000400)={'tunl0\x00', r7, 0x80, 0x7800, 0x2, 0x8, {{0xc, 0x4, 0x1, 0x3, 0x30, 0x66, 0x0, 0x7, 0x2f, 0x0, @local, @local, {[@timestamp_addr={0x44, 0x1c, 0x40, 0x1, 0x3, [{@multicast2, 0x10000}, {@rand_addr=0x64010102, 0x7}, {@multicast2}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000005c0)={'syztnl2\x00', &(0x7f0000000540)={'sit0\x00', 0x0, 0x29, 0xff, 0x6d, 0x3, 0x2c, @private2={0xfc, 0x2, '\x00', 0x1}, @private1, 0x1, 0x0, 0x0, 0x200}}) sendmsg$ETHTOOL_MSG_EEE_GET(r3, &(0x7f00000006c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000800)={0x218, r2, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xb4, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x40800}, 0x40400c0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:25 executing program 3 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3190.106441][T19060] do_syscall_64+0x4a/0x90 [ 3190.110877][T19060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3190.116873][T19060] [ 3190.119195][T19060] Reported by Kernel Concurrency Sanitizer on: [ 3190.125345][T19060] CPU: 0 PID: 19060 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 3190.135165][T19060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3190.145230][T19060] ================================================================== [ 3190.185091][T19078] FAULT_INJECTION: forcing a failure. [ 3190.185091][T19078] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3190.188523][T19060] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3190.198208][T19078] CPU: 1 PID: 19078 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3190.217550][T19078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3190.227603][T19078] Call Trace: [ 3190.230937][T19078] dump_stack+0x137/0x19d 04:50:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3190.235271][T19078] should_fail+0x23c/0x250 [ 3190.239757][T19078] should_fail_usercopy+0x16/0x20 [ 3190.244822][T19078] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3190.250949][T19078] ? shmem_write_begin+0x7e/0x100 [ 3190.255999][T19078] generic_perform_write+0x1e4/0x3a0 [ 3190.261294][T19078] ? shmem_write_begin+0x100/0x100 [ 3190.266417][T19078] __generic_file_write_iter+0x161/0x300 [ 3190.272058][T19078] ? generic_write_checks+0x250/0x290 [ 3190.277457][T19078] generic_file_write_iter+0x75/0x130 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3190.282944][T19078] vfs_write+0x69d/0x770 [ 3190.287201][T19078] __x64_sys_pwrite64+0xf5/0x150 [ 3190.292214][T19078] do_syscall_64+0x4a/0x90 [ 3190.296697][T19078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3190.302592][T19078] RIP: 0033:0x419797 [ 3190.306517][T19078] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3190.326742][T19078] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3190.335166][T19078] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3190.343143][T19078] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3190.351115][T19078] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3190.359156][T19078] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3190.367156][T19078] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3190.376156][T19073] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3da, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:26 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) r1 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="bfb0beb4dbc74399c6e139601556157c3f004e8c894483356bf7d62ea2121e7b924c88bd2de62105799cd636e6", 0x2d, 0x5}], 0x4000, &(0x7f0000000240)={[{@fat=@tz_utc}], [{@seclabel}, {@context={'context', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x39}}, {@pcr={'pcr', 0x3d, 0x8}}]}) setxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000380)='system_u:object_r:hald_log_t:s0\x00', 0x20, 0x1) renameat(r1, &(0x7f00000003c0)='./file0\x00', r0, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000000)='-\x00', &(0x7f0000000080)='./file0\x00', r2) 04:50:26 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:26 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) [ 3190.422946][T19071] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3190.449792][T19100] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:26 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x22}}) 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3db, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3190.522703][T19106] FAT-fs (loop5): Unrecognized mount option "pcr=00000000000000000057" or missing value 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3dc, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3190.577197][T19123] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3190.625032][T19134] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:26 executing program 3 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:26 executing program 5: r0 = syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)=ANY=[@ANYBLOB="04"]) r1 = creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) r2 = fsmount(0xffffffffffffffff, 0x0, 0x1) r3 = syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0/file0\x00', 0x57a, 0x1, &(0x7f0000000600)=[{&(0x7f0000000540)="d90085218210b9ed9797731af655dbd48ba24bc84e09d1f89b6ddaf6c7e17b29c4f0d8cd390f2c8b6a5a3952c7145314fca21ee41d58973dd8eb165f1cc22a9e734c1034ce235de9403798baa515f0fecaf93230b67e7da4707f5a4238af7a9457cdaa38bf00e58923f3c73c17e27fcc6a22fed5de4b5b06d53cd12041c1ff9a1f747158496a7ec8d6b2", 0x8a, 0x101}], 0x820000, &(0x7f0000000640)={[{@dax}, {@auto_da_alloc}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, '--'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'rootcontext'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@smackfsdef={'smackfsdef', 0x3d, 'uid<'}}, {@measure}, {@smackfstransmute={'smackfstransmute', 0x3d, 'rootcontext'}}]}) renameat(r3, &(0x7f0000000700)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00') r4 = openat$cgroup_ro(r1, &(0x7f00000008c0)='rdma.current\x00', 0x0, 0x0) sendmsg$AUDIT_GET_FEATURE(r4, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x10, 0x3fb, 0x200, 0x70bd2c, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4004040}, 0x20000840) unlinkat(r2, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0x2c) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x1000, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="845e9ff3c4a83fcf6538ba0d587f7dbfcf52d7e42bc3c9d2ef0097d66db8ace64cd1c47a199c322611d334264c81b1f4436a20ada45908e50de65d5b0116946089", 0x41, 0x80000000}], 0x210001, &(0x7f0000000380)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@nodots}], [{@uid_lt={'uid<', r5}}, {@fowner_gt}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_gt={'fowner>', 0xee01}}, {@appraise_type}, {@smackfshat={'smackfshat', 0x3d, 'tmpfs\x00'}}]}) fspick(r0, &(0x7f0000000240)='./file0/file0\x00', 0x0) 04:50:26 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:26 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3dd, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:26 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x25}}) [ 3190.722377][T19148] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3190.730316][T19152] FAULT_INJECTION: forcing a failure. [ 3190.730316][T19152] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3190.732974][T19146] loop5: detected capacity change from 0 to 2 [ 3190.745913][T19152] CPU: 0 PID: 19152 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3190.761809][T19152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3de, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3df, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3190.771886][T19152] Call Trace: [ 3190.775162][T19152] dump_stack+0x137/0x19d [ 3190.779497][T19152] should_fail+0x23c/0x250 [ 3190.783919][T19152] __alloc_pages+0xe7/0x310 [ 3190.788420][T19152] alloc_pages_vma+0x3c3/0x5e0 [ 3190.793221][T19152] shmem_getpage_gfp+0x980/0x1410 [ 3190.798248][T19152] shmem_write_begin+0x7e/0x100 [ 3190.809110][T19152] generic_perform_write+0x196/0x3a0 [ 3190.814486][T19152] ? shmem_write_begin+0x100/0x100 [ 3190.819596][T19152] __generic_file_write_iter+0x161/0x300 [ 3190.825294][T19152] ? generic_write_checks+0x250/0x290 [ 3190.830673][T19152] generic_file_write_iter+0x75/0x130 [ 3190.836085][T19152] vfs_write+0x69d/0x770 [ 3190.840319][T19152] __x64_sys_pwrite64+0xf5/0x150 [ 3190.845312][T19152] do_syscall_64+0x4a/0x90 [ 3190.849723][T19152] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3190.855679][T19152] RIP: 0033:0x419797 [ 3190.859635][T19152] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3190.879340][T19152] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3190.887914][T19152] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3190.895905][T19152] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3190.903884][T19152] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3190.911903][T19152] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:26 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3190.919974][T19152] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 [ 3190.929138][T19154] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3190.951022][T19159] loop5: detected capacity change from 0 to 264192 04:50:26 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:26 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x3a}}) 04:50:26 executing program 3 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3190.975850][T19159] FAT-fs (loop5): Unrecognized mount option "uid<00000000000000000000" or missing value 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:26 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:26 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:26 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) [ 3191.081693][T19181] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3191.100907][T19185] FAULT_INJECTION: forcing a failure. [ 3191.100907][T19185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3191.114022][T19185] CPU: 1 PID: 19185 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3191.123848][T19185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3191.133973][T19185] Call Trace: [ 3191.137247][T19185] dump_stack+0x137/0x19d [ 3191.141600][T19185] should_fail+0x23c/0x250 [ 3191.145996][T19185] should_fail_usercopy+0x16/0x20 [ 3191.151062][T19185] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3191.157114][T19185] ? shmem_write_begin+0x7e/0x100 [ 3191.162152][T19185] generic_perform_write+0x1e4/0x3a0 [ 3191.167446][T19185] ? shmem_write_begin+0x100/0x100 [ 3191.172687][T19185] __generic_file_write_iter+0x161/0x300 04:50:26 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000000)={[], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3191.178428][T19185] ? generic_write_checks+0x250/0x290 [ 3191.183784][T19185] generic_file_write_iter+0x75/0x130 [ 3191.189214][T19185] vfs_write+0x69d/0x770 [ 3191.193510][T19185] __x64_sys_pwrite64+0xf5/0x150 [ 3191.198464][T19185] do_syscall_64+0x4a/0x90 [ 3191.202901][T19185] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3191.208799][T19185] RIP: 0033:0x419797 [ 3191.212710][T19185] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3191.232428][T19185] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3191.240846][T19185] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3191.248844][T19185] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3191.256812][T19185] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3191.264926][T19185] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3191.272881][T19185] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:27 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:27 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:27 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x48}}) [ 3191.298076][T19197] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3191.379217][T19221] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3191.416314][T19230] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:27 executing program 3 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:27 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="e3640e804c76961e89ec8f2cad523343f97b5fc66227ec0327782c90219e2c68d6bf90c21ff955a3b9370035a7e41e90e9c7c6c5560dcc4bd047e67d547f31a6f42ba86fc90a1a6a026d0b90bc0fb3a2a0ce40a153fabf9e4f0fd976e72a3980ff3f184e955a487849716765f74daaf40ba4d16f3ef80cdb2d76fcc0ef19b0b8f3e276f25560c1e4cbcfdd6cdb7daba4879d87118584dffdce43cb47aeac84", 0x9f, 0x1fffc0000000000}], 0x1002000, &(0x7f0000000240)={[{@data_err_ignore}, {@lazytime}], [{@dont_appraise}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:27 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:27 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xb, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:27 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x4c}}) [ 3191.528521][T19250] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3191.531258][T19251] FAULT_INJECTION: forcing a failure. [ 3191.531258][T19251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3191.551885][T19251] CPU: 0 PID: 19251 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3191.561758][T19251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3191.571921][T19251] Call Trace: [ 3191.575244][T19251] dump_stack+0x137/0x19d [ 3191.579576][T19251] should_fail+0x23c/0x250 [ 3191.583988][T19251] __alloc_pages+0xe7/0x310 [ 3191.588578][T19251] alloc_pages_vma+0x3c3/0x5e0 [ 3191.593385][T19251] shmem_getpage_gfp+0x980/0x1410 [ 3191.598427][T19251] shmem_write_begin+0x7e/0x100 [ 3191.603285][T19251] generic_perform_write+0x196/0x3a0 [ 3191.608582][T19251] ? shmem_write_begin+0x100/0x100 [ 3191.613715][T19251] __generic_file_write_iter+0x161/0x300 [ 3191.619369][T19251] ? generic_write_checks+0x250/0x290 [ 3191.624750][T19251] generic_file_write_iter+0x75/0x130 [ 3191.630231][T19251] vfs_write+0x69d/0x770 [ 3191.634501][T19251] __x64_sys_pwrite64+0xf5/0x150 [ 3191.639450][T19251] do_syscall_64+0x4a/0x90 [ 3191.643848][T19251] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3191.649740][T19251] RIP: 0033:0x419797 [ 3191.653628][T19251] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3191.673246][T19251] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3191.681672][T19251] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3191.689648][T19251] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3191.697708][T19251] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3191.705678][T19251] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3191.713732][T19251] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:27 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x60}}) 04:50:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:27 executing program 3 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) [ 3191.729232][T19254] loop5: detected capacity change from 0 to 264192 [ 3191.771000][T19259] loop5: detected capacity change from 0 to 264192 [ 3191.776612][T19274] FAULT_INJECTION: forcing a failure. [ 3191.776612][T19274] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3191.786849][T19270] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3191.790639][T19274] CPU: 0 PID: 19274 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3191.810453][T19274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3191.820509][T19274] Call Trace: [ 3191.823798][T19274] dump_stack+0x137/0x19d [ 3191.828138][T19274] should_fail+0x23c/0x250 [ 3191.832553][T19274] should_fail_usercopy+0x16/0x20 [ 3191.837576][T19274] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3191.843664][T19274] ? shmem_write_begin+0x7e/0x100 [ 3191.847527][T19279] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3191.848687][T19274] generic_perform_write+0x1e4/0x3a0 [ 3191.864011][T19274] ? shmem_write_begin+0x100/0x100 04:50:27 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:27 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xc, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:27 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x68}}) [ 3191.869164][T19274] __generic_file_write_iter+0x161/0x300 [ 3191.874793][T19274] ? generic_write_checks+0x250/0x290 [ 3191.880173][T19274] generic_file_write_iter+0x75/0x130 [ 3191.885585][T19274] vfs_write+0x69d/0x770 [ 3191.889884][T19274] __x64_sys_pwrite64+0xf5/0x150 [ 3191.894821][T19274] do_syscall_64+0x4a/0x90 [ 3191.899244][T19274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3191.905308][T19274] RIP: 0033:0x419797 [ 3191.909366][T19274] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3191.928981][T19274] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3191.937546][T19274] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3191.945499][T19274] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3191.953907][T19274] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3191.961862][T19274] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3191.970052][T19274] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:27 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000080)=ANY=[@ANYBLOB="0ffedeb24f2a17ecdb58bfe6ed47071809c3fe642a58f0b810c2db77d3cbf529bab7a6a5bc9433d8a03096adedbd28b8eff4937eb4788e14f4e2ee8e50335eb09fe47296de38ef58d1fca5f4666debf95d77317875a13d15f216cca159efce7f503d0004000000000000eafb72c06af7cd33a2548c02762826a0b2dcb5298e756eba328e894d5404de6cdf07"]) 04:50:27 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:27 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xd, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3192.053618][T19294] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:27 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000000)=ANY=[@ANYBLOB="887e070b162846"]) [ 3192.117155][T19308] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:27 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:27 executing program 3 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:27 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xe, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:27 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x6c}}) 04:50:27 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x1f, 0x6, &(0x7f00000013c0)=[{&(0x7f0000000380)="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", 0x1000, 0x4}, {&(0x7f00000000c0)="808e63a6aefff67b362d9acc45b717fe664cda634057de5f349b23e5d558b9b7e9ea7dbc4048d13132161e87dffb8226905a123c3fba054183befc4760eccb27346e00b3f17a165ddce9165641ffa218813f38ae46c4559c5c", 0x59, 0x80}, {&(0x7f0000000140)="1496e8ea5040fd00843ea903de9c9044d40b178073649a14bb15429c0d494c8459cf", 0x22, 0x40}, {&(0x7f0000000200)}, {&(0x7f0000000240)="4a3ddf45b42645a58171198c29c0afab1e34bf", 0x13, 0x400}, {&(0x7f0000000280)="96ce1f580d854708add4511332bfe04674738ad8044dac3a26b668e9447a8a76a1c341", 0x23, 0x9}], 0x80, &(0x7f0000001480)={[{'(^{\''}, {'tmpfs\x00'}], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x65, 0x8, 0x66, 0x61, 0x5086f4809e4b71b9, 0x65, 0x35], 0x2d, [0x30, 0x57, 0x37, 0xfd], 0x2d, [0x34, 0x63, 0x37, 0x62], 0x2d, [0x31, 0x37, 0x34, 0x66], 0x2d, [0x65, 0x0, 0x38, 0x62, 0x61, 0x39, 0x39, 0x33]}}}, {@appraise}, {@smackfshat={'smackfshat', 0x3d, 'tmpfs\x00'}}, {@fowner_lt={'fowner<', 0xee01}}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:27 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xb, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e9, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3192.297476][T19344] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3192.300174][T19342] FAULT_INJECTION: forcing a failure. [ 3192.300174][T19342] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3192.307968][T19343] loop5: detected capacity change from 0 to 8 [ 3192.320843][T19342] CPU: 0 PID: 19342 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3192.320867][T19342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3192.330491][T19343] nfs: Unknown parameter '(^{'' [ 3192.336711][T19342] Call Trace: [ 3192.336721][T19342] dump_stack+0x137/0x19d [ 3192.336791][T19342] should_fail+0x23c/0x250 [ 3192.336808][T19342] __alloc_pages+0xe7/0x310 [ 3192.368125][T19342] alloc_pages_vma+0x3c3/0x5e0 [ 3192.372953][T19342] shmem_getpage_gfp+0x980/0x1410 [ 3192.378042][T19342] shmem_write_begin+0x7e/0x100 [ 3192.384035][T19342] generic_perform_write+0x196/0x3a0 [ 3192.389366][T19342] ? shmem_write_begin+0x100/0x100 [ 3192.394478][T19342] __generic_file_write_iter+0x161/0x300 [ 3192.400265][T19342] ? generic_write_checks+0x250/0x290 [ 3192.405615][T19342] generic_file_write_iter+0x75/0x130 [ 3192.411024][T19342] vfs_write+0x69d/0x770 [ 3192.415284][T19342] __x64_sys_pwrite64+0xf5/0x150 [ 3192.420233][T19342] do_syscall_64+0x4a/0x90 [ 3192.424709][T19342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3192.430600][T19342] RIP: 0033:0x419797 [ 3192.434492][T19342] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3192.454106][T19342] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3192.462520][T19342] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3192.470544][T19342] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3192.478533][T19342] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3192.486510][T19342] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 04:50:28 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x74}}) 04:50:28 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xc, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:28 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3192.494595][T19342] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:28 executing program 3 (fault-call:0 fault-nth:80): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:28 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0xffff, 0x5, &(0x7f0000001440)=[{&(0x7f0000000200)="fb296ecd61287692bc0e8900f0b50f2c89f49f966cd7d255efca163c3e085376ec4a031a5af63d58034dd4a985b5673b68e378bcfaedbc7c9366408215f5dd99a0b6aaff2648852fd034a55eef8d61b08394c46d320aa43e7a1a31fe4273068e4cac738c8010b990fac1b6413f69d9329da41dfdb0ae2ba61b6efaa29f8c60f6c03506a30785bb500e6653fe2e43b8f8186c4a55e831b35b310704e2e0e7cd08c27ac08f97ad463c32001afeba3ed6d6fd933710edc15d2d69ace5358759772c49b430e5de80bd5a70af0854aaccd02fa2534dcfc0f14d492fdbd63f40359fdcd384295571bafc2b51505d05", 0xec, 0x7d}, {&(0x7f0000000380)="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", 0x1000, 0x2e27e8df}, {&(0x7f00000000c0)="f581850bc5f190f4a3893d2dab1d27f42c0e1f63b143943c520cd58c45239e897e7e9287ff50ff0596673fdf665822ca5bc514842a8fbb5affff6368fb6e918337f79fe8e6ba2ca5", 0x48, 0xad}, {&(0x7f0000000140)="41468fe8d082fb3fc515b5e0e4402b4702f3b043ec1e5a", 0x17, 0x9}, {&(0x7f00000013c0)="b30c977123ea40eb92472f63eb19e2f6cf4bcd6264fd8d4754917bd26332858ade2f63d4391eacf78b97a94efa37b5202d5ca2d00e27e89ac75ecc91c324b604911bfe6b29eef87ea662853cb3864be33c3488d22661a78efcef26b3", 0x5c, 0x7fffffff}], 0x5088, &(0x7f0000000300)={[{@dots}, {@nodots}, {@nodots}, {@dots}], [{@appraise}, {@fsname={'fsname', 0x3d, '(^{{]'}}, {@obj_type={'obj_type', 0x3d, 'tmpfs\x00'}}]}) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) 04:50:28 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xd, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) [ 3192.579040][T19349] loop5: detected capacity change from 0 to 8 [ 3192.580609][T19360] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3192.585623][T19349] nfs: Unknown parameter '(^{'' [ 3192.616882][T19366] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:28 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x11, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:28 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x7a}}) [ 3192.662923][T19369] FAULT_INJECTION: forcing a failure. [ 3192.662923][T19369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3192.676019][T19369] CPU: 1 PID: 19369 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3192.685841][T19369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3192.695896][T19369] Call Trace: [ 3192.696619][T19374] loop5: detected capacity change from 0 to 264192 [ 3192.699173][T19369] dump_stack+0x137/0x19d [ 3192.709985][T19369] should_fail+0x23c/0x250 [ 3192.714420][T19369] should_fail_usercopy+0x16/0x20 [ 3192.719442][T19369] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3192.725522][T19369] ? shmem_write_begin+0x7e/0x100 [ 3192.730557][T19369] generic_perform_write+0x1e4/0x3a0 [ 3192.735915][T19369] ? shmem_write_begin+0x100/0x100 [ 3192.741100][T19369] __generic_file_write_iter+0x161/0x300 [ 3192.746745][T19369] ? generic_write_checks+0x250/0x290 [ 3192.752126][T19369] generic_file_write_iter+0x75/0x130 [ 3192.757517][T19369] vfs_write+0x69d/0x770 04:50:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ec, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3192.761870][T19369] __x64_sys_pwrite64+0xf5/0x150 [ 3192.766898][T19369] do_syscall_64+0x4a/0x90 [ 3192.771390][T19369] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3192.777355][T19369] RIP: 0033:0x419797 [ 3192.781249][T19369] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3192.800866][T19369] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 04:50:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ed, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ee, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3192.809286][T19369] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3192.817258][T19369] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3192.825246][T19369] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3192.833221][T19369] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3192.841229][T19369] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:28 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xe, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ef, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:28 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x12, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3192.898406][T19398] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 [ 3192.970791][T19412] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev sda1, type ext4) errno=-22 04:50:28 executing program 3 (fault-call:0 fault-nth:81): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:28 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:28 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x22, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:28 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xce080, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {r0, r1/1000+10000}}) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)={'trans=unix,', {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 04:50:28 executing program 5: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000480), 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) r4 = getpgid(0x0) sched_rr_get_interval(r4, &(0x7f0000000000)) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x128, r2, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}]}, 0x128}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000011) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="10002bbd7000fedbdf25000000000800090000000000080002000100000008000700", @ANYRES32, @ANYBLOB="0000000000000000861f7bd1f98f3cea7279d942cf622bebd03c006f3a0f8130317ffff525b04991aad7f3d9772ad80618d5c3bd39c66810f20e2c1f91cf6273c02c2cff8a3981c5092a57f1a11e24b0eb341a1c6bc29b8b15923e5f47506d"], 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x11c810, &(0x7f00000002c0)={[], [{@subj_user}]}) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000840), r3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r5) syz_genetlink_get_family_id$gtp(&(0x7f0000000e40), r5) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r1) sendmsg$BATADV_CMD_GET_ORIGINATORS(r5, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x4c, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x60}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xfffffc01}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x20040000) r7 = socket(0x11, 0x4, 0xffffff00) sendmsg$AUDIT_MAKE_EQUIV(r7, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x28, 0x3f7, 0x100, 0x70bd2d, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 04:50:28 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x1) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e38c492dcd883733d756e69782c646566736f6e746578743d73797361"]) [ 3193.143370][T19428] FAULT_INJECTION: forcing a failure. [ 3193.143370][T19428] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3193.156637][T19428] CPU: 1 PID: 19428 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3193.166533][T19428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3193.176594][T19428] Call Trace: [ 3193.179885][T19428] dump_stack+0x137/0x19d [ 3193.184227][T19428] should_fail+0x23c/0x250 [ 3193.188656][T19428] __alloc_pages+0xe7/0x310 [ 3193.193165][T19428] alloc_pages_vma+0x3c3/0x5e0 [ 3193.197934][T19428] shmem_getpage_gfp+0x980/0x1410 [ 3193.202964][T19428] shmem_write_begin+0x7e/0x100 [ 3193.207887][T19428] generic_perform_write+0x196/0x3a0 [ 3193.213190][T19428] ? shmem_write_begin+0x100/0x100 [ 3193.218307][T19428] __generic_file_write_iter+0x161/0x300 [ 3193.223950][T19428] ? generic_write_checks+0x250/0x290 [ 3193.229399][T19428] generic_file_write_iter+0x75/0x130 [ 3193.229426][T19428] vfs_write+0x69d/0x770 04:50:28 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:auditd_initrc_exec_t:s0\x00', 0x2a, 0x3) [ 3193.229477][T19428] __x64_sys_pwrite64+0xf5/0x150 [ 3193.229497][T19428] do_syscall_64+0x4a/0x90 [ 3193.229549][T19428] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3193.229574][T19428] RIP: 0033:0x419797 [ 3193.229592][T19428] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3193.229612][T19428] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3193.229635][T19428] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3193.283715][T19430] EXT4-fs: 49 callbacks suppressed [ 3193.283729][T19430] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3193.286276][T19428] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3193.286295][T19428] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3193.324719][T19428] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3193.332697][T19428] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:29 executing program 3 (fault-call:0 fault-nth:82): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="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", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f1, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:29 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x3, &(0x7f0000000000)=0x401, 0x4) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000220, &(0x7f00000000c0)=ANY=[@ANYBLOB="747261079e5a75fd8a30a2d27f6e733d8ba4f3ad8c67f59a6e69782c645666636f6e746578743d73797361646d5f752c00"]) [ 3193.345891][T19452] EXT4-fs (sda1): Unrecognized mount option "tran8Ä’Ü؃s=unix" or missing value [ 3193.355914][T19454] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value 04:50:29 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x11, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) [ 3193.406543][T19460] FAULT_INJECTION: forcing a failure. [ 3193.406543][T19460] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3193.419616][T19460] CPU: 1 PID: 19460 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3193.429475][T19460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3193.439559][T19460] Call Trace: [ 3193.442832][T19460] dump_stack+0x137/0x19d [ 3193.447161][T19460] should_fail+0x23c/0x250 [ 3193.451605][T19460] should_fail_usercopy+0x16/0x20 [ 3193.456665][T19460] iov_iter_copy_from_user_atomic+0x281/0xb60 [ 3193.462736][T19460] ? shmem_write_begin+0x7e/0x100 [ 3193.467831][T19460] generic_perform_write+0x1e4/0x3a0 [ 3193.473162][T19460] ? shmem_write_begin+0x100/0x100 [ 3193.474224][T19467] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value [ 3193.478296][T19460] __generic_file_write_iter+0x161/0x300 [ 3193.478324][T19460] ? generic_write_checks+0x250/0x290 [ 3193.498965][T19460] generic_file_write_iter+0x75/0x130 [ 3193.504470][T19460] vfs_write+0x69d/0x770 [ 3193.508716][T19460] __x64_sys_pwrite64+0xf5/0x150 [ 3193.514215][T19460] do_syscall_64+0x4a/0x90 [ 3193.518635][T19460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3193.524533][T19460] RIP: 0033:0x419797 [ 3193.528408][T19460] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3193.548037][T19460] RSP: 002b:00007fce478a1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 04:50:29 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x25, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) [ 3193.556452][T19460] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 0000000000419797 [ 3193.564476][T19460] RDX: 0000000008100000 RSI: 0000000020000b40 RDI: 0000000000000004 [ 3193.572464][T19460] RBP: 0000000000000007 R08: 0000000000000000 R09: ffffffffffffffff [ 3193.580439][T19460] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 3193.588413][T19460] R13: 0000000000000004 R14: 0000000020000698 R15: 0000000000000001 04:50:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:29 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x4010, 0xffffffffffffffff, 0x10000000) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000480), 0x400) syz_io_uring_submit(0x0, r0, &(0x7f00000002c0)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x5, 0x4007, @fd_index=0x4, 0x3, 0x0, 0x0, 0x16, 0x1, {0x2}}, 0x7) r1 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="e09f7331f8b58ff278371c88c89e5b297e4d3beb1eaf65ad4e7f5049d21ee828f641705ccbf29d8cb34675c5d3b1edf6a1b7e29effaebb9c81f8fba181724cab27d88406c06e9fb47a8d29390114a04c5f123b34", 0x54}], 0x44000, &(0x7f0000000200)={[{@huge_within_size}, {@huge_within_size}, {@size={'size', 0x3d, [0x38, 0x36]}}, {@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x2c, 0x39, 0x39]}}}}], [{@obj_user={'obj_user', 0x3d, '#.@\'+:'}}, {@uid_lt={'uid<', 0xee00}}]}) statx(r1, &(0x7f0000000280)='./file0\x00', 0x2000, 0x200, &(0x7f0000000380)) r2 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000001380)='./file0\x00', 0x1000, 0x0, 0x0, 0x23044c0, &(0x7f0000001a40)) fspick(r2, &(0x7f0000000500)='./file0\x00', 0x0) [ 3193.614125][T19473] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:50:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:29 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x12, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) [ 3193.664243][T19480] loop5: detected capacity change from 0 to 4 [ 3193.664480][T19472] EXT4-fs (sda1): Unrecognized mount option "tražZuýŠ0¢Òns=‹¤ó­Œgõšnix" or missing value 04:50:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:29 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) quotactl(0x8, &(0x7f0000000140)='./file0\x00', 0xee01, &(0x7f0000000380)="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") setxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280), 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000001a40)) mount(&(0x7f0000000000)=@filename='./file0/file0\x00', &(0x7f0000000080)='\x00', &(0x7f00000000c0)='rootfs\x00', 0x800, &(0x7f0000000100)='tmpfs\x00') [ 3193.722688][T19485] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3193.756031][T19472] EXT4-fs (sda1): Unrecognized mount option "tražZuýŠ0¢Òns=‹¤ó­Œgõšnix" or missing value 04:50:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f5, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3193.775903][T19497] EXT4-fs (sda1): Unrecognized mount option "appraise_type=imasig" or missing value [ 3193.797911][T19496] EXT4-fs (sda1): Unrecognized mount option "uid=0x000000000000ee00" or missing value 04:50:29 executing program 3 (fault-call:0 fault-nth:83): syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000b40)="104865ef6ae43a99ae1df6115762811aaa00f555840563d5ba678ea6a03513844d654db6ad2a303fa375668f2c3eeb25a1d46e0b26ebbc895845dcf5a7758d201dcea63da55477aec819759bb49ac546187e9d9fb422c01f1c801aff284db71e111c097d6478da0df2618cf8a8490351dc86d9304470f8d2fac426b2e54882293e85b26e17ed799bbdca4ed183a9ded6f75d137bc34519d78a2b10603f60e1cdb681a9a9244082e908114145aef607ec1f466fe98e31d23d30b2577276c6101cfb57607a6078872a70de77680004e70fa89183e5aa95d0261ecbe8ca5e17b395e485cebf81eac521c1cb3f18672cd80eb700e8a69eac1c322e217e03a00754", 0xfffffd6d}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6419d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x2}, {0x0}, {&(0x7f0000000a40)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c15716de2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd659df1e108c57e988426b15682648246126ccb12d4f0693d3773ae314a8ae6e0400982ff58e4316b2ef0eff5624b2b546a4a12e380ae953d0db6981bf0255033ef7511399035bebdc8f4c00"/149, 0x48, 0x7}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='journal_ioprio=0x0000000000000007,smackfsfloor=,euid<', @ANYRESOCT, @ANYBLOB="2c61756469742c736d61636b66737472616e736d7574653d3a267b275c2e2c66756e633d46494c455f4d4d41502c6673757569643d366239366d3965352d383260342d363534322d313361352d31313535363136662c726f6f74636f6e746578743d756e636f6e66696ebd045ba16505aa058765645f752c00"]) 04:50:29 executing program 1: syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0x1, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) mount$9p_unix(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000220, &(0x7f0000000100)=ANY=[@ANYBLOB="0500616e73627652b2b8b2ee77d62611ec74a28cc33df56e69782c6e04657874656f640c6300000100"]) 04:50:29 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2e, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[], [{@appraise_type}]}) 04:50:29 executing program 0: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x22, 0x0, 0x0, 0x20, &(0x7f00000002c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x62, 0x35, 0x66, 0x64], 0x2d, [0x35, 0x38, 0x62], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x425cf11fa9a8b545, 0x34, 0x65], 0x2d, [0x36]}}}]}) 04:50:29 executing program 5: setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:devpts_t:s0\x00', 0x1e, 0x2) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) setxattr$incfs_id(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000200)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000001380)='./file0\x00', 0x0, 0x0, 0x0, 0x304000, &(0x7f0000000240)=ANY=[@ANYBLOB="00e31c5e0256"]) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0xd4000002) 04:50:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f6, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f7, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3193.938911][T19522] FAULT_INJECTION: forcing a failure. [ 3193.938911][T19522] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3193.952288][T19522] CPU: 1 PID: 19522 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 3193.962100][T19522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3193.972157][T19522] Call Trace: [ 3193.975546][T19522] dump_stack+0x137/0x19d [ 3193.979934][T19522] should_fail+0x23c/0x250 [ 3193.984411][T19522] __alloc_pages+0xe7/0x310 04:50:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f8, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:29 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x97) mount$9p_unix(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x1) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@private0}}, &(0x7f0000000840)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x98, 0x7, &(0x7f0000000680)=[{&(0x7f00000001c0)="8ac4b7ae71a380193c23efed2aa40fe0455ab12526dd795570d975ef8ba83d929d87d54c82eabbcdd4c8f80ffd50a5478b4aa4befb39420f86966acf8d4a6f993fc257435ae715bfa9f1106844521bcb8b476dfd5e7815e3d599d45345dc56a7f6", 0x61, 0x8}, {&(0x7f0000000240)="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", 0xff}, {&(0x7f0000000340)="e31e62ba333299d0fae1d54891f49b113f8ee7fecc4294862025d0b83e4c0b793688d8656554a5eaded4807d8bbd15335435644eee908cb9e23f65f30e30265c1671ef51071c59097077655d685a23265f00d346d66495b9", 0x58, 0x2}, {&(0x7f00000003c0)="1b1c85d11bf0fbd8d69a32a58cec11ec3515558eaf0ee5efcec9c065675a19ee4584903aea1f35ec8f2fe6a88d88a6e0692aabb57ded2b3a5e0652bf786108b288eb91", 0x43, 0x72c8}, {&(0x7f0000000440)="19de53bc4c53fbe2ccc8e203a59283ae6499d617265500965d2fc01acc8ebf3c1716c20266ce08239c409e9e35c2b871be5c80be04219a41751d4c989619f557b1626e4b4fe57979b1bce7461532a6ed134bae8c628ddf46a4e01a5dc583648d9cf66eea81a53807b51c559dceaacd578e454059cad88cbcc77bd796a6bb3b87cb977a12754a30a8c03c", 0x8a, 0x6}, {0x0, 0x0, 0xfffffffffffffffb}, {&(0x7f0000000600)="bc6af137581de4deed147d985b601ca008ba046446602db2012315677796c1571bde2f6d7a2c8afb09b65d9cd4418a480fed14ca6187ae37847b2c632d00fcd6ed545e4b8c57e988", 0x48, 0x6}], 0x0, &(0x7f0000000880)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x7}}], [{@smackfsfloor}, {@euid_lt={'euid<', r1}}, {@audit}, {@smackfstransmute={'smackfstransmute', 0x3d, ':&{\'\\.'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x62, 0x39, 0x36, 0x57ce3aa21198906d, 0x39, 0x65, 0x35], 0x2d, [0x38, 0x32, 0x60, 0x34], 0x2d, [0x36, 0x35, 0x34, 0x32], 0x2d, [0x31, 0x33, 0x61, 0x35], 0x2d, [0x31, 0x31, 0x35, 0x35, 0x36, 0x31, 0x36, 0x66]}}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) r2 = fsmount(r0, 0x1, 0x8) fspick(r2, &(0x7f0000000500)='./file0\x00', 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1023000, &(0x7f0000000200)={'trans=unix,', {[{@cachetag}, {@access_user}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'tmpfs\x00'}}, {@euid_eq={'euid', 0x3d, r1}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_gt}, {@mask={'mask', 0x