truncate(r2, 0x200004)
r4 = socket(0x10, 0x80002, 0x0)
sendfile(r4, r2, 0x0, 0x80001d00c0d0)

15:46:21 executing program 3:
sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x4}, 0x1c}}, 0x0)
r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x4000000000000070, 0x28841)
ioctl$USBDEVFS_GETDRIVER(r0, 0x41045508, &(0x7f00000000c0)={0x8, "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"})
r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000280)={0x6, &(0x7f0000000040)=[{0xff, 0x80, 0x7, 0x6}, {0x95, 0x0, 0x20, 0x2}, {0xfff, 0x5, 0x7f, 0x140}, {0x4, 0xff, 0x3, 0x2a715cf8}, {0x80c, 0x1, 0xc1, 0x401}, {0xc439, 0x5, 0x7, 0xfff}]})
io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xffffffffffffff1c}])
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$USBDEVFS_REAPURBNDELAY(r5, 0x4008550d, &(0x7f00000002c0))
socket$inet6_tcp(0xa, 0x1, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

15:46:21 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendfile(r0, r1, 0x0, 0x1000)

15:46:21 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001})
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)
write$tun(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/4043], 0xfca)

15:46:21 executing program 1:
prlimit64(0x0, 0x0, 0x0, 0x0)
symlink(0x0, &(0x7f0000000400)='./file0/file0\x00')
getpid()
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
waitid(0x5, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0))
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000840)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10)
fcntl$setpipe(r1, 0x407, 0x0)
write(r1, &(0x7f0000000340), 0x41395527)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0)
write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7)
r2 = gettid()
r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1)
write$binfmt_script(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="93e5d84419b1d7b41ea30b3919cab5446bb221cb52d148eab358624807c12eea941a0bbbed19d57dab8774a97b234725b2c155b12898b2ecef2d07459810f5f09db202cd1d0b22323c8351a4528c0baa0f4e87ff68760bf7e4b9f00b75aa86c420f26ffa015701157ff6a70f269008da55664105825664d0f83fe34e37c4b35c40067f8fb828cfeffce2af486d5fb7a0a5782ab03aa37f012a78e3f27f073ee9ba4d0948242304c99ca5835dbbe265d164cec474596d07e91c3ef68bdda1904c"], 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r3)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4)
setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB], 0x1)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0)
r4 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r4, 0x0, r4)
ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f0000000140))

[   93.880937][ T4573] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev fuse, type fuse) errno=-22
[   93.909893][ T4579] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev fuse, type fuse) errno=-22
15:46:21 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0)
r0 = creat(0x0, 0x10)
setresuid(0x0, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0)
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0)
r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0)
fallocate(r1, 0x0, 0x0, 0x2000402)
socket$inet6(0xa, 0x80000, 0x0)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfff}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket(0x10, 0x2, 0x0)
recvmmsg(r2, &(0x7f0000002ec0), 0x0, 0x2, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x4000)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$9p(0xffffffffffffffff, 0x0, 0x0)
unshare(0x40000000)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
r5 = dup2(r3, r4)
getpid()
socket(0x0, 0x2, 0x0)
setresuid(0x0, 0x0, 0x0)
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
r8 = socket$inet_udp(0x2, 0x2, 0x0)
r9 = dup2(r7, r8)
r10 = getpid()
r11 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r12=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, 0x0, r12)
r13 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r14=>0x0}, &(0x7f0000cab000)=0xc)
sendmmsg$unix(r9, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r12, r14}}}], 0x20}], 0x1, 0x0)
ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f0000000040)=r10)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)="a2e6", 0x2)
bind(0xffffffffffffffff, 0x0, 0x0)

[   93.931139][ T4571] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended
[   93.938147][ T4574] SELinux: ebitmap: truncated map
[   93.940797][ T4571] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (8100000)
[   93.948091][ T4574] SELinux: failed to load policy
15:46:21 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$9p(0xffffffffffffffff, 0x0, 0x0)
unshare(0x40000000)
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xf0, 0x3f, 0xc0, 0xe3, 0x0, 0x1, 0x82041, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x5b67, 0xfffffffffffffffe}, 0x80, 0xff, 0x1, 0x9, 0xfffffffeffffffff, 0x1, 0x80}, 0xffffffffffffffff, 0xb, r0, 0x1)
fstat(0xffffffffffffffff, 0x0)

[   93.973356][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
[   93.990345][ T4582] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[   94.003697][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
[   94.018787][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
15:46:21 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00')
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80)
r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r6 = dup3(r5, r3, 0x80000)
ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000240))

[   94.056100][ T4582] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[   94.124519][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
15:46:21 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000203010400000000e7ff00000a00ffff0800010001000000"], 0x1c}}, 0x0)
r1 = socket(0x0, 0xa, 0x81)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c1400000103010400000000e7ff00000a00ff8e7744190001000000da3a05fba511b15f5451bd90280f1ed2a0bcb15ba88508000000895a2b3f5b1277d75af64d4323669329547d63e767d38a552c6706219428286c3183f34ec5bf8943aa"], 0x1}}, 0x0)
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$RTC_EPOCH_SET(r5, 0x4008700e, 0x3e)
r6 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
sendmsg$IPSET_CMD_LIST(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, 0x7, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x8011}, @IPSET_ATTR_FLAGS={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0xff3b, 0x6, 0x1, 0x0, 0x800}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4010}, 0x8001)
bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfb, 0x2000}, 0xc)

[   94.165325][ T4602] SELinux: ebitmap: truncated map
[   94.173990][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
[   94.189836][ T4602] SELinux: failed to load policy
15:46:21 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00')
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80)
r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
dup3(r5, r3, 0x80000)

[   94.216249][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
[   94.253944][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
15:46:21 executing program 5:
sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0)
gettid()
r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe(0x0)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff)
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x1010, r0, 0xce5a3000)
syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000004000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}])

15:46:21 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
r3 = socket$netlink(0x10, 0x3, 0x8000000004)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
getsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4)
writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b45602117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1)
prctl$PR_GET_SECUREBITS(0x1b)

[   94.323343][ T4614] SELinux: ebitmap: truncated map
[   94.330552][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
[   94.343577][ T4617]  loop5: p2 < > p3 p4
[   94.355939][ T4617] loop5: p2 size 2 extends beyond EOD, truncated
[   94.366057][ T4614] SELinux: failed to load policy
[   94.366392][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
[   94.393953][ T4617] loop5: p3 start 225 is beyond EOD, truncated
[   94.406784][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0
[   94.428754][ T4617] loop5: p4 size 3657465856 extends beyond EOD, truncated
[   94.569841][ T4635]  loop5: p2 < > p3 p4
[   94.574155][ T4635] loop5: p2 size 2 extends beyond EOD, truncated
[   94.600131][ T4635] loop5: p3 start 225 is beyond EOD, truncated
[   94.613234][ T4635] loop5: p4 size 3657465856 extends beyond EOD, truncated
15:46:22 executing program 0:
openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe)
add_key$keyring(0x0, &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0)
add_key(0x0, 0x0, 0x0, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff)
add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, r0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0)
pipe(&(0x7f0000000200))
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000040)='./file0\x00', 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$inet6(0xa, 0x0, 0x2)
bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
socket$inet6(0xa, 0x400000000803, 0x5f)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46802)
io_setup(0x100000000000c333, &(0x7f0000000180)=<r1=>0x0)
io_submit(r1, 0x1867f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef4c7}])
io_getevents(r1, 0x4, 0x6, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000000))
setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000200)=@req3={0x8000, 0x400, 0x101, 0xc0000000, 0x8, 0x2, 0xffff}, 0x1c)
r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0)
r3 = socket$inet6(0xa, 0x80002, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x3, 0x0, 0x0)
getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000240)={'nat\x00'}, &(0x7f0000000180)=0x54)
ftruncate(r2, 0x200004)
r4 = socket(0x10, 0x80002, 0x0)
sendfile(r4, r2, 0x0, 0x80001d00c0d0)

15:46:22 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00')
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80)
r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:22 executing program 4:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback}, {@in6=@rand_addr="02ed4d73062b85e8a45dfa2e6a347805", 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x60, "b2dcae3f"}}]}, 0x140}}, 0x0)
r1 = dup3(0xffffffffffffffff, r0, 0x0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000200)={'team0\x00', <r4=>0x0})
sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xac, 0x0, 0x2, 0x70bd2a, 0x6, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}]}, 0xac}}, 0x20008805)

15:46:22 executing program 5:
pipe(&(0x7f0000000100)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket(0x10, 0x2, 0xc)
write(0xffffffffffffffff, &(0x7f0000000140)="1f0000000104ff", 0x7)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x0)
r3 = socket$inet(0x2, 0x4000000000000001, 0x0)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

[   94.802682][ T4647] SELinux: ebitmap: truncated map
[   96.104330][ T4704] cgroup1: Unknown subsys name 'perf_event'
[   96.110451][ T4704] cgroup1: Unknown subsys name 'net_cls'
[   97.126826][ T5100] FAT-fs (loop1): bogus number of reserved sectors
[   97.133578][ T5100] FAT-fs (loop1): Can't find a valid FAT filesystem
15:46:27 executing program 4:
socket$nl_netfilter(0x10, 0x3, 0xc)
r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x38, 0x3, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x40)
syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00')

15:46:27 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00')
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80)
r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:27 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$packet(0x11, 0x0, 0x300)
socket$packet(0x11, 0x3, 0x300)
bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0xf7, 0x6, @dev={[], 0x21}}, 0x14)
r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="21007b53a8c27830eeb66d0c1171c4e676c5592859d9063bd58c341c4335c16952f417562fb0c37dacba9027ee0a41bd80d44e8b02a2383fa02b122ba5cafe34a1b62ca78305f49acb65aa4aaaa7632c02e023bc8b2328d19f31c3db629e3936a01acf020ddfcb074f8a49d574c823b48776aa9f5dd5e427a9238f3f67861bb728f367cb3e61dc2097ac9e06a1"])
read$FUSE(r4, &(0x7f0000000580), 0xefee)
write$FUSE_CREATE_OPEN(r4, &(0x7f0000000380)={0xa0}, 0xa0)
r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff)
r6 = memfd_create(&(0x7f0000000280)='t\x05\x00\x00\x00\x8c\x00\x822@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcb\xe8\xfe\xd6\xa6\xea', 0x0)
pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005)
ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r6)
r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$get_keyring_id(0x0, r7, 0x0)
r8 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r8, 0x0, r8)
sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0x40000)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00')

15:46:27 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000002380)=[{{&(0x7f0000000340)=@pppoe, 0x80, 0x0}}, {{&(0x7f0000001b00)=@generic, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000002580)=""/249, 0xf9}], 0x1}}], 0x3, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket(0x10, 0x2, 0x0)
sendto(r4, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400})
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r7, @ANYBLOB="8014d350d222f279af0d78ae2ad00f524014f9dd39aa8c6a8a31e01bd55c0629fa7c13b24ce4e5da415ad7e753001596f63a00801763ae464465bd23e16ad948668e1a6c15f261cc209070df1d452e6a5a57a519ecdc5276ac95ab82942c0e83fba71d6581f342f79c721a7b0c621f4791b6547e11cfe366"], 0x38}}, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFA_ADDRESS={0x8, 0x9, @multicast1}]}, 0x28}}, 0x0)
getsockname$packet(r2, 0x0, &(0x7f0000000640))
fcntl$setpipe(r3, 0x407, 0x0)
r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
r9 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_STATION(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r8, 0xf2b, 0x0, 0x0, {}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x8}]}, 0x1c}}, 0x0)
sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000005c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000580)={&(0x7f0000001780)={0x13c, r8, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_SCAN_SUPP_RATES={0x10c, 0x7d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x4d, 0x0, "676170681707db9148849649d5dd20887c9084bebe057215682fc89dd937d03708d197db2ec1d1dd67c15a8cd05209335be0d2c2b2a307e56add3a233ccea5a8099628fe61a572139a"}, @NL80211_BAND_5GHZ={0xa1, 0x1, "620df30c1f05c28f85717b77805b766798757ed61ed74aa073979c33e8816d179ceb218236cd6c7d485a349987a2628fb1f715c7fa4e5f7472f42cfe053953b067c3999b53a733817aebfcf2d4a938cc1980c790e452a691e6d0b2959e9e31fb792bdbb92754602cab23f45de3ac6b919a893b72d95737e884fe473ea4b3ddef425799c78211babbfc66da97e7950a2a240cf81ba893241edf87d7c00a"}, @NL80211_BAND_6GHZ={0x14, 0x3, "2a4c02649d2668fce277199a49e4c587"}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_SCAN_FREQUENCIES={0x14, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x8}, {0x8, 0x0, 0x2ab}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4851}, 0xc0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x72, 0x3, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000402)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
fallocate(r10, 0x0, 0x0, 0x110001)
ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000000)={0x4, 0xffffffffffffffff, 0x20000000083})
mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x2010, 0xffffffffffffffff, 0x7)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad7, &(0x7f0000000480)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7086270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6a6f30481c4c5f0000000000000000"])

15:46:27 executing program 5:
syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a9ffffff00090000ff07000080ffffffa6ffffff0000000100000001000100ff81000004800000000a00000000050000eeffffff000000000000000055aa", 0x40, 0x1c0}])
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
sendto$unix(r1, &(0x7f0000000040)="dbe33f0f81951507d9907b5c29a1418adbd5c9ab3e27ff31d503ca39238e041f4224ce67d101", 0x26, 0xc9e560b3c3a9e508, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)

15:46:27 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001})
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f00000000c0)='./bus\x00', 0x0)
mount(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000010005fba060000000000000000000b00", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
fstatfs(r4, &(0x7f0000000180))
r5 = socket$inet_udplite(0x2, 0x2, 0x88)
r6 = fcntl$dupfd(r4, 0x0, r5)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1)
socket$inet6_tcp(0xa, 0x1, 0x0)
r7 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r7, 0x0, r7)
r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r9 = fcntl$dupfd(r5, 0x406, r8)
r10 = socket$unix(0x1, 0x2, 0x0)
r11 = fcntl$dupfd(r10, 0x0, r10)
setsockopt$CAN_RAW_RECV_OWN_MSGS(r11, 0x65, 0x4, &(0x7f0000000240), 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200)
perf_event_open$cgroup(&(0x7f0000000340)={0x3, 0x70, 0x1, 0x3f, 0x20, 0x7f, 0x0, 0x7ff, 0x40000, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x5, 0x4, 0x6, 0x0, 0x5838, 0x3ff}, r2, 0x9, r11, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200)
write$tun(r0, &(0x7f00000002c0)={@void, @val, @mpls={[], @ipv4=@tipc={{0x6, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @rand_addr=0x5e3, {[@ssrr={0x89, 0x3}]}}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa, 0xb, 0x2, 0x0, 0x30f}}}}}, 0x4a)

15:46:27 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x6af)

[   99.959344][   T22] kauditd_printk_skb: 281 callbacks suppressed
[   99.959353][   T22] audit: type=1326 audit(1580485587.446:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[   99.968138][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  100.005195][ T5120] SELinux: ebitmap: truncated map
[  100.005725][   T22] audit: type=1326 audit(1580485587.446:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  100.032403][ T5133] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables
[  100.035919][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  100.048644][ T5120] sel_write_load: 1 callbacks suppressed
15:46:27 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00')
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80)
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)

[  100.048646][ T5120] SELinux: failed to load policy
[  100.052557][   T22] audit: type=1326 audit(1580485587.446:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  100.085145][ T5123] SELinux: ebitmap: truncated map
[  100.088613][   T22] audit: type=1326 audit(1580485587.446:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  100.103293][ T5123] SELinux: failed to load policy
[  100.120846][ T5143] fuse: Bad value for 'group_id'
[  100.129621][ T5144] netlink: 'syz-executor.1': attribute type 274 has an invalid length.
[  100.140186][   T22] audit: type=1326 audit(1580485587.446:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  100.165961][   T22] audit: type=1326 audit(1580485587.446:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  100.298298][   T22] audit: type=1326 audit(1580485587.446:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:46:27 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00')
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80)

[  100.326914][   T22] audit: type=1326 audit(1580485587.446:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=72 compat=0 ip=0x45b349 code=0x7ffc0000
[  100.358028][   T22] audit: type=1326 audit(1580485587.446:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:46:27 executing program 1:
r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0)
sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c000000010a00000001000000000000000000000900010073797a30000000000900010073797a31000000001fa810d371a6efc59ed68fdaf2512938be3ed88bad07167ae60596db4bf71017a73f8eedf541b0"], 0x2c}}, 0x0)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x12)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

[  100.383712][   T22] audit: type=1326 audit(1580485587.446:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
15:46:27 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00')

15:46:28 executing program 5:
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4008550d, &(0x7f0000000040))
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080))
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
r4 = openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000180)=ANY=[@ANYBLOB='+s '], 0x6)

[  100.544662][ T5164] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support!
[  100.556806][ T5164] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  100.567154][ T5164] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  100.578314][ T5164] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock
15:46:28 executing program 5:
open(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
write$FUSE_DIRENT(r1, &(0x7f0000000100)={0x50, 0xfffffffffffffff5, 0x0, [{0x0, 0x0, 0x5, 0x3f, 'vfat\x00'}, {0x0, 0x179, 0x5, 0x8, 'vfat\x00'}]}, 0x50)
write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xfa)
sendfile(r1, r0, 0x0, 0xa198)

15:46:28 executing program 1:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$netlink(0x10, 0x3, 0x0)
timer_create(0x8, 0x0, 0x0)
ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x26e1, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140))
write$cgroup_int(r0, &(0x7f0000000080)=0x28, 0x87f1a7)

[  100.590845][ T5164] EXT4-fs error (device loop1): ext4_fill_super:4518: inode #2: comm syz-executor.1: iget: root inode unallocated
[  100.603152][ T5164] EXT4-fs (loop1): get root inode failed
[  100.609510][ T5164] EXT4-fs (loop1): mount failed
[  100.846434][ T5143] fuse: Bad value for 'group_id'
15:46:28 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$packet(0x11, 0x0, 0x300)
socket$packet(0x11, 0x3, 0x300)
bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0xf7, 0x6, @dev={[], 0x21}}, 0x14)
r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="21007b53a8c27830eeb66d0c1171c4e676c5592859d9063bd58c341c4335c16952f417562fb0c37dacba9027ee0a41bd80d44e8b02a2383fa02b122ba5cafe34a1b62ca78305f49acb65aa4aaaa7632c02e023bc8b2328d19f31c3db629e3936a01acf020ddfcb074f8a49d574c823b48776aa9f5dd5e427a9238f3f67861bb728f367cb3e61dc2097ac9e06a1"])
read$FUSE(r4, &(0x7f0000000580), 0xefee)
write$FUSE_CREATE_OPEN(r4, &(0x7f0000000380)={0xa0}, 0xa0)
r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff)
r6 = memfd_create(&(0x7f0000000280)='t\x05\x00\x00\x00\x8c\x00\x822@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcb\xe8\xfe\xd6\xa6\xea', 0x0)
pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005)
ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r6)
r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$get_keyring_id(0x0, r7, 0x0)
r8 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r8, 0x0, r8)
sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0x40000)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00')

15:46:28 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00')

15:46:28 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='c\xba(\x06\x01\t6(\x00\xbbk\xad%\xf3\xf6_|S\x93>\x94\x15#b\x91\xecr\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o*\xbd}EV\xba6\xae\xee\xe4\x8d\xae\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x03\x98Pm\x0f(\x98\xff\x05\xff\x0f\xad|\xa3\xc9Y>\xed\xfe\x8cK.\xa7N.+{\x95\x18\x87?~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00')
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1)

15:46:28 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x8, 0x0, 0x0, {{@in=@remote, @in=@multicast1=0xe0000002, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xb8}}, 0x0)

15:46:28 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$packet(0x11, 0x0, 0x300)
socket$packet(0x11, 0x3, 0x300)
bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0xf7, 0x6, @dev={[], 0x21}}, 0x14)
r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="21007b53a8c27830eeb66d0c1171c4e676c5592859d9063bd58c341c4335c16952f417562fb0c37dacba9027ee0a41bd80d44e8b02a2383fa02b122ba5cafe34a1b62ca78305f49acb65aa4aaaa7632c02e023bc8b2328d19f31c3db629e3936a01acf020ddfcb074f8a49d574c823b48776aa9f5dd5e427a9238f3f67861bb728f367cb3e61dc2097ac9e06a1"])
read$FUSE(r4, &(0x7f0000000580), 0xefee)
write$FUSE_CREATE_OPEN(r4, &(0x7f0000000380)={0xa0}, 0xa0)
r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff)
r6 = memfd_create(&(0x7f0000000280)='t\x05\x00\x00\x00\x8c\x00\x822@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcb\xe8\xfe\xd6\xa6\xea', 0x0)
pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005)
ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r6)
r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$get_keyring_id(0x0, r7, 0x0)
r8 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r8, 0x0, r8)
sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0x40000)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00')

15:46:28 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$packet(0x11, 0x0, 0x300)
socket$packet(0x11, 0x3, 0x300)
bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0xf7, 0x6, @dev={[], 0x21}}, 0x14)
r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="21007b53a8c27830eeb66d0c1171c4e676c5592859d9063bd58c341c4335c16952f417562fb0c37dacba9027ee0a41bd80d44e8b02a2383fa02b122ba5cafe34a1b62ca78305f49acb65aa4aaaa7632c02e023bc8b2328d19f31c3db629e3936a01acf020ddfcb074f8a49d574c823b48776aa9f5dd5e427a9238f3f67861bb728f367cb3e61dc2097ac9e06a1"])
read$FUSE(r4, &(0x7f0000000580), 0xefee)
write$FUSE_CREATE_OPEN(r4, &(0x7f0000000380)={0xa0}, 0xa0)
r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff)
r6 = memfd_create(&(0x7f0000000280)='t\x05\x00\x00\x00\x8c\x00\x822@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcb\xe8\xfe\xd6\xa6\xea', 0x0)
pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005)
ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r6)
r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$get_keyring_id(0x0, r7, 0x0)
r8 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r8, 0x0, r8)
sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0x40000)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00')

15:46:28 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)

15:46:28 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
r2 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r2, 0x0, r2)

15:46:28 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
waitid(0x5, 0x0, 0x0, 0x2, &(0x7f00000006c0))
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
pipe(&(0x7f0000000840)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10)
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0)
write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7)
getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0)
r3 = gettid()
r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1)
write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x219)
ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000200)={0x3f, 0x3f, [0x0, 0x8001, 0x7, 0x803], 0x3})
r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
r8 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00')
r9 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r10=>0xffffffffffffffff})
r11 = dup(r10)
getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, <r12=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
r13 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
r15 = dup(r14)
getsockname$packet(r15, &(0x7f00000000c0)={0x11, 0x0, <r16=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r13, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
r17 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r18=>0xffffffffffffffff})
r19 = dup(r18)
getsockname$packet(r19, &(0x7f00000000c0)={0x11, 0x0, <r20=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r17, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r20}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
r21 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r21, 0x0, r21)
getsockname(r21, &(0x7f0000000480)=@ll={0x11, 0x0, <r22=>0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(r7, &(0x7f0000000500)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000c00)={0x1cc, r8, 0x100, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r12}, {0x128, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r20}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x800}, 0x24000000)
close(r4)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r23 = dup2(r5, r5)
ioctl$RTC_IRQP_SET(r23, 0x4008700c, 0x1d96)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0x34)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0)
open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x80)

15:46:28 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  101.159575][ T5217] fuse: Bad value for 'group_id'
15:46:29 executing program 5:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0)
ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000200)={0x3})
r2 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0'])
chdir(&(0x7f00000002c0)='./bus\x00')
open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0)
link(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='./file0\x00')
creat(&(0x7f0000000040)='./file0\x00', 0x0)

15:46:29 executing program 0:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280), 0x2a7)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.controllers\x00', 0x275a, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80008000})
sendmsg$IPVS_CMD_DEL_DAEMON(r1, 0x0, 0x0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = gettid()
tkill(r4, 0x3c)
ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000040)=r4)
sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0)
ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000340)=0x3)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x44, r7, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000009}, 0x4001)

15:46:29 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socket$unix(0x1, 0x2, 0x0)

15:46:29 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071")
ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x6, 'veth0_to_hsr\x00', {0x3}, 0x2})
r1 = socket$inet6(0xa, 0x3, 0x2)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c)
sendmmsg$inet6(r1, &(0x7f0000000280)=[{{0x0, 0xfffffffffffffff3, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1400000000000000290000003e00000000000000000000d49065d3d7278d3bbd6db68317e100005eabbeef26226997e6563fe7b466c9a151d6b764be76904efc6a1e15b4ca9fd6cab31c3d90dcdd8283f69cc01b2083caafb8a33f6aae307ecfe4a14f23183171779dcdaa"], 0x18, 0xf401}}], 0x4000011, 0x0)

15:46:29 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socket$unix(0x1, 0x2, 0x0)

15:46:29 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYRES32, @ANYBLOB="4b8030255e42ead0a303d1588726cbe91430a5fd1e5eae3bfc774dc24efff17aa3fb4966d1361530dc728c04e91d2a12f210cee7f3cd71b269f35f75ec95d7a34dd6005cb83c0640570738335c2eeceefe4d06ae2d5bdb53fe604803f199f74c29dee7733f6a36e46f1c61e8fc1bcb3ee7971540329ae33ce5f587a1b6b15fa15aeb47be63ce75b9382f"], 0x5}}, 0x0)

[  101.685309][ T5235] overlayfs: './file0' not a directory
15:46:29 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socket$unix(0x1, 0x2, 0x0)

[  102.091269][ T1937] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF
[  102.099908][ T1937] FAT-fs (loop0): Filesystem has been set read-only
[  102.871672][ T5252] cgroup1: Unknown subsys name 'perf_event'
[  102.877897][ T5252] cgroup1: Unknown subsys name 'net_cls'
[  103.835424][ T5649] fuse: Bad value for 'group_id'
15:46:32 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
getpid()
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$selinux_create(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r0)
r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x280000, 0x0)
ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f00000002c0)={0x525, 0x1, "594ea11b440218824b58a7432ba85dbbb2df5301e8f61c7e96cafe93e056e7b582f0622dcd9fdf069fa0824272ecadde5a948f85b86b2d02d49fbecdc0084ef5a8b8874a2cafaa95edac1e322bbe4a3a37355283c5baa373323a983f089c33eeaabe2e2510996152cf0449781b9f8996f0e2ee081e565a8eb1d28aaaa7c1b8a6e05ca37b44808076b6dba076bc1aa46128ff048af34be9e5b9d9ff34115ce755a238ced99c58c6a2f9075f16359c308f11978473736ec75ed8afe6cf7d2233d77fcb86dd678ef0aec84fedc858ae94adf08d79d76edc4fed5b5a815ae231486592e040536da4b5245f614af8876438830e3b2d236b8ca1ef796bba7eba9218e9"})
bind(0xffffffffffffffff, &(0x7f00000000c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c954"}, 0x80)
r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0)
ftruncate(r2, 0x2008002)
sendfile(r0, r2, 0x0, 0x200fff)
r3 = socket$inet6(0xa, 0x800000003, 0xff)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty, 0x5}, 0x1c)
r4 = dup(r3)
r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
sendfile(r4, r5, 0x0, 0x8000fffffffe)

15:46:32 executing program 5:
syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="020185ffffff16a40000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c30000fdfdffff80000055aa", 0x40, 0x1c0}])
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={<r2=>0xffffffffffffffff})
ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f00000000c0)={0x0, 'veth1_to_team\x00', {0x4}, 0x5})

15:46:32 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
pipe(&(0x7f0000000480)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$key(0xf, 0x3, 0x2)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000007b40))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000003c0)=""/160)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
sendfile(r3, r4, 0x0, 0x320c)
r5 = socket$packet(0x11, 0x3, 0x300)
sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200))
r6 = socket$nl_route(0x10, 0x3, 0x0)
r7 = socket(0x11, 0x800000003, 0x0)
bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, <r8=>0x0, 0x1, 0x0, 0x6, @dev}, 0x0)
r9 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r10 = socket$netlink(0x10, 0x3, 0x0)
r11 = socket(0x0, 0x803, 0x0)
getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, <r12=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
r13 = socket$unix(0x1, 0x2, 0x0)
r14 = fcntl$dupfd(r13, 0x0, r13)
ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00', <r15=>r12})
sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)=@bridge_getneigh={0x0, 0x1e, 0x400, 0x70bd2c, 0x0, {0x7, 0x0, 0x0, r15, 0x40, 0x8400}, [@IFLA_NET_NS_PID, @IFLA_IFALIAS={0x0, 0x14, 'vlan0\x00'}, @IFLA_EXT_MASK={0x0, 0x1d, 0x4}, @IFLA_LINK_NETNSID, @IFLA_MAP={0x0, 0xe, {0x7, 0x7, 0x9, 0x4, 0x0, 0x8}}, @IFLA_IFALIAS={0x0, 0x14, 'veth1_to_hsr\x00'}, @IFLA_LINKMODE={0x0, 0x11, 0x1f}]}, 0x114}}, 0x0)
sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYRES32=r8, @ANYBLOB="007c00000000000008000400", @ANYRES32=r12, @ANYRES32=0x0, @ANYBLOB="476e3a81"], 0x5}}, 0x0)
pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00')

15:46:32 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:32 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)
io_setup(0x40000000008, &(0x7f0000000240)=<r14=>0x0)
io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}])
r15 = socket$unix(0x1, 0x2, 0x0)
r16 = fcntl$dupfd(r15, 0x0, r15)
ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200)
epoll_ctl$EPOLL_CTL_MOD(r16, 0x3, r13, &(0x7f0000000280)={0x10000000})

15:46:32 executing program 1:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
io_setup(0x3, &(0x7f00000000c0)=<r2=>0x0)
io_getevents(r2, 0x2, 0x8000000000002b9, &(0x7f0000d83f60), 0x0)
r3 = memfd_create(&(0x7f0000000140)='sec]ritynodev:ppp1bdev\x00', 0x0)
io_submit(r2, 0xd8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}])
io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])

[  104.598338][ T5655] SELinux: ebitmap: truncated map
[  104.621555][ T5655] SELinux: failed to load policy
15:46:32 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:32 executing program 3:
pipe(&(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000002498515fd8ddff00c5e17e000000000000000000"], 0x1c}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1)
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
r6 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_STATION(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r5, 0xf2b, 0x0, 0x0, {}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x8}]}, 0x1c}}, 0x0)
r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
r8 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_STATION(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r7, 0xf2b, 0x0, 0x0, {}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x8}]}, 0x1c}}, 0x0)
sendmsg$NL80211_CMD_NEW_STATION(r4, &(0x7f0000000200)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0xfffffffffffffd9a, r7, 0x8, 0x70bd2d, 0x25dfdbff}, 0x54}, 0x1, 0x0, 0x0, 0x4000800}, 0x804)
pipe2$9p(&(0x7f0000000040), 0x4000)
r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r10 = dup(r9)
ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x4ffde, 0x0)

[  104.642329][ T5655] SELinux: ebitmap: truncated map
[  104.659130][ T5651]  loop5: p1 < > p2 p3 < p5 > p4
[  104.664812][ T5651] loop5: partition table partially beyond EOD, truncated
[  104.676616][ T5655] SELinux: failed to load policy
15:46:32 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  104.687760][ T5651] loop5: p1 start 42006 is beyond EOD, truncated
[  104.711113][ T5655] SELinux: ebitmap: truncated map
[  104.720540][ T5651] loop5: p2 size 1073741824 extends beyond EOD, truncated
[  104.729888][ T5655] SELinux: failed to load policy
15:46:32 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:32 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  104.737896][ T5651] loop5: p3 size 2 extends beyond EOD, truncated
[  104.752538][ T5651] loop5: p4 start 4294835456 is beyond EOD, truncated
[  104.767191][ T5651] loop5: p5 size 1073741824 extends beyond EOD, truncated
[  104.795037][ T5667] SELinux: ebitmap: truncated map
[  104.810685][ T5667] SELinux: failed to load policy
[  104.817660][ T5655] SELinux: ebitmap: truncated map
[  104.823741][ T5678] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[  104.824147][ T5655] SELinux: failed to load policy
15:46:32 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  104.839659][ T5677] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[  104.854107][ T5651] __loop_clr_fd: partition scan of loop5 failed (rc=-16)
[  104.854231][ T5680] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[  104.873953][  T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  104.884908][  T137] Buffer I/O error on dev loop5p3, logical block 0, async page read
[  104.892931][  T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  104.903806][  T137] Buffer I/O error on dev loop5p2, logical block 0, async page read
[  104.911828][  T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  104.922694][  T137] Buffer I/O error on dev loop5p5, logical block 0, async page read
[  104.930754][  T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  104.941680][  T137] Buffer I/O error on dev loop5p2, logical block 0, async page read
[  104.949711][  T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  104.950141][ T5675] SELinux:  policydb magic number 0x0 does not match expected magic number 0xf97cff8c
[  104.960591][  T137] Buffer I/O error on dev loop5p5, logical block 0, async page read
[  104.960628][  T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
15:46:32 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = dup(r1)
ioctl$TIOCGSERIAL(r2, 0x541e, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0)
ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000000c0)=ANY=[@ANYBLOB="d1b7ef19a336e7dd95b2ba44f92b8d6fbcab9868e78f3a0f990217cfe94996a6d3b6b47e5ce1230968498cb22e8fad5000207c6aa6666baf8cd3d0acf5e1ffec9a20738549f65f8b32b7cf3bd48e8e1f6b8a5fd33fd582bfd03f01336d1321d8708ea908d4acf8622c14afc555f33845ba6f58b2835a49353717fd0e7819a533293df817310c57f8ebe35af9a305f90d30262a868473a7873ee48c6b3088bec279a377ce96a4e021d40e597f7fc73bee6dd20cda090455bca11a092a01dd112bffd52c20fe0c643ec000c792650000"])
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x38142, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
r3 = socket$inet6(0xa, 0x3, 0xe3)
connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCGARP(r5, 0x8954, &(0x7f0000000200)={{0x2, 0x4e23, @rand_addr=0x7f}, {0x1, @random="386df98e87c7"}, 0x0, {0x2, 0x4e24, @broadcast}, 'bond_slave_0\x00'})
dup2(r4, r4)
ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000080))
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
fcntl$setsig(0xffffffffffffffff, 0xa, 0x1)
sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8)
r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0)
ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000340)={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x1}, 0x8, {0x2, 0x4e20, @broadcast}, 'nr0\x00'})
r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x2000, 0x0)
ioctl$TIOCL_UNBLANKSCREEN(r7, 0x541c, &(0x7f00000002c0))

[  104.989034][  T137] Buffer I/O error on dev loop5p2, logical block 0, async page read
[  104.997049][  T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  105.007922][  T137] Buffer I/O error on dev loop5p3, logical block 0, async page read
[  105.015968][  T137] Buffer I/O error on dev loop5p5, logical block 0, async page read
[  105.024000][  T137] Buffer I/O error on dev loop5p2, logical block 0, async page read
[  105.032040][  T137] Buffer I/O error on dev loop5p3, logical block 0, async page read
[  105.036401][ T5675] SELinux: failed to load policy
15:46:32 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  105.045285][   T22] kauditd_printk_skb: 171 callbacks suppressed
[  105.045294][   T22] audit: type=1326 audit(1580485592.526:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5686 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  105.118971][   T22] audit: type=1326 audit(1580485592.526:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5686 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  105.162985][   T22] audit: type=1326 audit(1580485592.526:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5686 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  105.188783][   T22] audit: type=1326 audit(1580485592.636:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  105.214470][   T22] audit: type=1326 audit(1580485592.636:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  105.239962][   T22] audit: type=1326 audit(1580485592.636:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  105.265509][   T22] audit: type=1326 audit(1580485592.636:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  105.290970][   T22] audit: type=1326 audit(1580485592.636:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  105.320993][   T22] audit: type=1326 audit(1580485592.636:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  106.464821][ T5708] cgroup1: Unknown subsys name 'perf_event'
[  106.470904][ T5708] cgroup1: Unknown subsys name 'net_cls'
[  106.760110][ T5845] cgroup1: Unknown subsys name 'perf_event'
[  106.766472][ T5845] cgroup1: Unknown subsys name 'net_cls'
15:46:35 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:35 executing program 5:
syz_read_part_table(0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff00000000000000010000000000ffffff81000004800000000affffff8005000042000000000000000000000055aa", 0x40, 0x1c0}])
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x3)

15:46:35 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)
io_setup(0x40000000008, &(0x7f0000000240)=<r14=>0x0)
io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}])
r15 = socket$unix(0x1, 0x2, 0x0)
r16 = fcntl$dupfd(r15, 0x0, r15)
ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200)
epoll_ctl$EPOLL_CTL_MOD(r16, 0x3, r13, &(0x7f0000000280)={0x10000000})

15:46:35 executing program 1:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0})
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0)
timer_create(0x0, 0x0, &(0x7f0000000040))
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="0721deef00008000000000000000000003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f001604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbb20265515428529b23fe3048f89de8d61a51f58d4e"], 0x87)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fallocate(r1, 0x10, 0x8003, 0x8020001)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
socket$unix(0x1, 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200))
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x81)
r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b)
fdatasync(0xffffffffffffffff)
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3})
r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b)
fdatasync(r5)
ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5})
r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b)
fdatasync(r6)
socket$tipc(0x1e, 0x2, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x55f2ce6, 0x2, 0x0, 0x10, 0xffffffffffffffff, 0x1000, [], 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x3c)
r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
creat(&(0x7f0000000300)='./file0\x00', 0x0)
fdatasync(0xffffffffffffffff)
write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b)

15:46:35 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
r5 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r5, 0x0, r5)
getsockopt$IP_SET_OP_GET_BYINDEX(r5, 0x1, 0x53, &(0x7f0000000140)={0x7, 0x7, 0x4}, &(0x7f00000002c0)=0x28)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newlink={0x48, 0x10, 0x705, 0x0, 0x200000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_VF_PORTS={0x4}, @IFLA_CARRIER={0x5, 0x21, 0x4}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xf98}]}, 0x48}}, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@ipv4_delrule={0x24, 0x21, 0x1, 0x70bd2d, 0x25dfdbfb, {0x2, 0x34, 0x10, 0x1, 0x1, 0x0, 0x0, 0x0, 0xd}, [@FRA_DST={0x8, 0x1, @local}]}, 0x24}, 0x1, 0xf0ffffff}, 0x0)

[  108.095785][ T6508] netlink: 'syz-executor.3': attribute type 274 has an invalid length.
[  108.126993][ T6508] netlink: 'syz-executor.3': attribute type 274 has an invalid length.
[  108.136127][   T22] audit: type=1326 audit(1580485595.626:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6511 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  108.137503][ T6508] selinux_nlmsg_perm: 1174 callbacks suppressed
[  108.137556][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=38948 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.163033][ T6515] SELinux: ebitmap: truncated map
[  108.168262][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.195685][ T6515] SELinux: failed to load policy
[  108.218311][ T6519] SELinux: ebitmap: truncated map
[  108.220282][ T6516]  loop5: p1 p3
[  108.227436][ T6516] loop5: p1 start 2304 is beyond EOD, truncated
[  108.234460][ T6519] SELinux: failed to load policy
[  108.248557][ T6516] loop5: p3 start 128 is beyond EOD, truncated
[  108.253185][ T6515] SELinux: ebitmap: truncated map
[  108.261523][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.262824][ T6515] SELinux: failed to load policy
[  108.275176][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.293270][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.297859][ T6526] SELinux: ebitmap: truncated map
[  108.311917][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.321682][ T6526] SELinux: failed to load policy
[  108.325373][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.342518][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.355300][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.368210][ T6525] SELinux: ebitmap: truncated map
[  108.368374][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3
[  108.377042][ T6525] SELinux: failed to load policy
[  108.391384][ T6516]  loop5: p1 p3
15:46:35 executing program 3:
pipe(&(0x7f00000001c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="ceff9ae4010000007456"], 0x9)
close(r2)
socket$netlink(0x10, 0x3, 0x4)
bind(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0)
splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0)

15:46:35 executing program 4:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
socketpair$tipc(0x1e, 0x1b01abcffcc525c0, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000100)=@generic={0x0, 0x4, 0x3})
tee(r0, r1, 0x4, 0x0)
pwrite64(r3, &(0x7f0000000140)="d5eb53be51c3bca80d4a75706150fb67073410c4c92660d929a105deafceb8db9c242cfc1d7ac9d149f4d192a76d19c45795c95157c498a42d99eaef30505bb1e8ba476e54a7be147ecaa415ebea9d4780a5193c260695be91e3526e4d95f87ee966e8ceb3243fe80721ba", 0x6b, 0x1)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(r4, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = socket(0x11, 0x800000003, 0x0)
ioctl$sock_inet_SIOCDARP(r6, 0x8953, &(0x7f0000000040)={{}, {}, 0x38, {0x2, 0x0, @empty}, 'vcan0\x00'})

15:46:35 executing program 2:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  108.393261][ T6508] netlink: 'syz-executor.3': attribute type 274 has an invalid length.
[  108.396200][ T6516] loop5: p1 start 2304 is beyond EOD, truncated
[  108.404298][ T6532] netlink: 'syz-executor.3': attribute type 274 has an invalid length.
[  108.411995][ T6516] loop5: p3 start 128 is beyond EOD, truncated
15:46:35 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x35}, [@ldst={0x6, 0x0, 0x3}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48)
ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x11, 0xa9, &(0x7f0000000080)="0427f3284a16e8a5b3199dd1aa043b7a98474355cedbf3e91e2dc98b5c8ae93eadf339ed7e6465950e3a80a6418bac46df95c09eeeb2b3b1558f02339d654c3a35106dc4ce4e0e2ab63cbb3d8fc358db47ccf8121c8958d2ddbd31eff825b09397cc24b06617286b0907ea9138558c207f71947a54f67fd575cc1f8b329b7b57833e395a01458de1f30484545f748903ec94c6b022a4ea880255730cfb2e8beba7cb7df111a3af6020"})

15:46:36 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:36 executing program 3:
r0 = socket$inet6(0xa, 0x800000000000002, 0x0)
sendmmsg$inet6(r0, &(0x7f0000004b80)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000001440)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, &(0x7f0000001880)=[{&(0x7f0000001480)="103697a04d07b0cfd7f260e105ec5411008f3bf249f074e131960b16e28936492674db4bf5da23a486cd223f34d53ea5d81aae81fccb7e72d05c6d12316ad2cdb43ad18812c5757283686db13fe379ec3d22dc1e554e8c5f55318441993307fd04b8dac74b5bfa4585fb3537e911df81fdf2fbb71753044f20c487575980c3713011a11ca45a989ee39c3fe3c92160fdacea63e8cbe408fbe6a80fc6d41a74c7a48a051ec0328f58b023b4d813ec9fdff5e36aa3111b174e6e9ec07bf072c6eba02dfabdce3d61a4cbb9f061593b44ae1b39c9cf89fbf56b438667fc0842f1580eb2c994beeb9ae95b3c4411d320db3d49b6daaf", 0xf4}, {&(0x7f0000001580)="1e767ea5b81fc5524ed99e276fc364f695315e8acb1c4b562aa44a619c75065f4797f7b031aa88f1ed7a018ffff67cb8d384221b5c1aabe2f5430ebab80f78f3dd44f7976a596525fc079e67643df445a66dee0b3da591c15a9e846bef824d3aaad8d2885c4ac87f9b33e8256e01aa2b3e14261864e834f5c5c50f7e7aa950cc94c229aa3504cfe3bb0fe2b83e1c4f30bfd0a6a8d7f1abae58e912041e21b457848b7e0ee3f8553d0ffa23795638ceb0a1d29d6cbc106fcc8b36d783cd0630a6531ecd09f98f1e54352898a2e157c41cde2aa706c259f183c33fe48a7db767d47a27a5e09fccb9435a93d3b61f61af4ff20610", 0xf3}, {&(0x7f0000001680)="359c240f01860a65410fc81d8170ad0a087ffb72af9c4fb52691009d2094058575781b6046fe441141e073aff553808cc54dd2aa", 0x34}, {&(0x7f00000016c0)="280c147569a714c38c72b3ccfc3c39508aa02dad352e104c77f471b33940a4a8b58646a0648fe16030a3981db64b3d45535b44cb5cdd3ba6a46285d2903525b9f7321c119c38b38d489fd97f2a6eda6f5e768b5cd4203dfbed1f7d1b", 0x5c}, {&(0x7f0000001740)="7354ccf45261e569df0b4374bcd6be64b50a9ac1001b3eb9d941c4796292ba9a17e39726dbecf9304dc771427a31d742cea5c42d06d257df05ef186dd144109fce2800752b4e5304f20a6fa052282350b9345b143da2b1fe5f42", 0x5a}, {&(0x7f00000017c0)="d4e0002ed75005b8176688aac12db7ef45f7bc81046aaa359a16d6c8fea8fc41ae151f473df49ac0ecd25a839aaae774dfdc52ae6bcc75009f5e9b85784c6018485b04cd8173e5ac2d9f56adbcd073680b74ab28571d7757fcd1a31c057ecbc27ec6d0f83c258988ea7a3fe46d5332ba6a14ef432ea9a5bc1e0947002583f172bbdebb00a949f07629e6a858f2fa8c291cf2d19ac0567ab4094d6a5e163a8d5480ba6ed0eb1749107f", 0xa9}], 0x6, &(0x7f0000001a40), 0x0, 0x2}}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000002bc0)="11983dafef07a41d3107f68b456c792484c3ee79b8c7287c8730a49ea2d77b22e41ecd18e8608c7ea480af6ec90ee93e5e71431bb7ed014a24628f20847b9a03c530f29e988ebdebe46d338696ebf90bfc67c10b8fdf656c06c2b0c6346fd03d0b5ec4f50d94df2efd08f94a22917bffba1b01620ae0e42d9baa168a0ea78cf134047b8288b285bbfbae59f45511376bec", 0x91}, {&(0x7f0000002c80)="63b41f8bfd6c6a4120c352c06f540e84c3734d161fc70dec33e176343b0eebfe0c9e91aa7e6287ada29bfc2b4ddc61a4fbe7229eb432b63ea5a0737d07f9789d48cac1dadca5ba7b89fb822ba751d79f889b1af3775a4dac0cb5b0790d4091701bef69df5d67e929d20d106b0d9a927cc4bdf4a8a53876c14b670f574b26c34eebab7382cb09c3ae95003b29f5173e3e0f9eba9154e8ed96", 0x98}, {&(0x7f0000002d40)="0f1d6c63f6a7222e1f914d77f118c533090b5533c01beb6c2f935e4d9a7e0c5a0f1770bceb51b424215b6e65ff9a522ad486bc5723dcba928fedc751a05d4e", 0x3f}, {&(0x7f0000002d80)="749f3545c18a6747891052582b386b67f4879c5c50d4aeac", 0x18}, {&(0x7f0000000040)="209d45b4865d4650356a62f720c98ef8a7b0cf37675c22ed766a3b9f92afdf9bd8902f52f84a6216d312e9cb958862ebd4204566c37f1cb17b69c057690ab977b73e3f51cc1686e0fdae057562060588536b6257a1cfc866cc2c9890b3963b7cd4c0a1b872b887963356", 0x6a}], 0x5}}, {{&(0x7f0000002f40)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000032c0)=[{0x0}, {0x0}, {&(0x7f00000030c0)="c4ac64e906cd89460e5ffcf211c3c4a6d55d1c4d30999b8fd17f986b499e0209d8005f8865eb42c54d0a6fd6d8e2178ef1e3", 0x32}], 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="140000000000000029001600003400000000000000000000001400000000000000290000003e0000000005000000000000930a49ad1909b4c03045f456d7ed4c8151183dd0af347796de96f295b7f6fd854418516d40ad2a7bc385063cb1c5ea721519ada6be9dd4b5878dc73d59ebabde002de0544040a2780501b2f035142231537099172c51de67"], 0x30}}, {{0x0, 0x0, &(0x7f0000004880)=[{&(0x7f0000003580)="e6", 0x1}], 0xfd}}], 0x5, 0x400d000)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000180))
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00')
sendmsg$NL80211_CMD_SET_BSS(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x78, r5, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_STA_WME_MAX_SP={0x11, 0x2, "996954aa737b2aeb4893f3b699"}, @NL80211_STA_WME_MAX_SP={0x23, 0x2, "6e0a6cee061f0cad109c1e985b6eb5c0e3a8676d041d00dcfbe5c4276b9460"}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x1}}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0xf9}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x2}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x40}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x8000)

15:46:36 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)
io_setup(0x40000000008, &(0x7f0000000240)=<r14=>0x0)
io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}])
r15 = socket$unix(0x1, 0x2, 0x0)
r16 = fcntl$dupfd(r15, 0x0, r15)
ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200)
epoll_ctl$EPOLL_CTL_MOD(r16, 0x3, r13, &(0x7f0000000280)={0x10000000})

15:46:36 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  108.615547][ T6553] SELinux: ebitmap: truncated map
15:46:36 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x100000000000019, &(0x7f0000000000)=0x5, 0x4)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000140))
getsockopt$sock_int(r0, 0x1, 0x4, 0x0, &(0x7f0000000440))
socket(0x10, 0x80002, 0x0)
r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
r4 = gettid()
tkill(r4, 0x3c)
write$cgroup_pid(r3, &(0x7f0000000100)=r4, 0x12)
r5 = socket$netlink(0x10, 0x3, 0xd)
ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071")
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c)
recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x199}, 0x80000000002100)

[  108.643221][ T6553] SELinux: failed to load policy
15:46:36 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  108.710025][ T6564] SELinux: ebitmap: truncated map
[  108.724319][ T6564] SELinux: failed to load policy
[  108.742704][ T6553] SELinux: ebitmap: truncated map
[  108.748040][ T6553] SELinux: failed to load policy
15:46:36 executing program 1:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0})
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0)
timer_create(0x0, 0x0, &(0x7f0000000040))
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="0721deef00008000000000000000000003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f001604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbb20265515428529b23fe3048f89de8d61a51f58d4e"], 0x87)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fallocate(r1, 0x10, 0x8003, 0x8020001)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
socket$unix(0x1, 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200))
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x81)
r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b)
fdatasync(0xffffffffffffffff)
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3})
r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b)
fdatasync(r5)
ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5})
r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b)
fdatasync(r6)
socket$tipc(0x1e, 0x2, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x55f2ce6, 0x2, 0x0, 0x10, 0xffffffffffffffff, 0x1000, [], 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x3c)
r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
creat(&(0x7f0000000300)='./file0\x00', 0x0)
fdatasync(0xffffffffffffffff)
write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b)

15:46:36 executing program 3:
r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0)
write$selinux_attr(r0, &(0x7f0000000200)='system_u:system_r:kernel_t:s0\x00', 0x1e)
r1 = socket$inet6(0xa, 0x2, 0x0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r4, 0x0, r4)
lseek(r4, 0xfffffffffffff800, 0x2)
socket$inet(0x2, 0x6, 0x6a)
ioctl$KDDELIO(r3, 0x4b35, 0x0)
bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c)
connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f0000000080))

15:46:36 executing program 5:
clone3(&(0x7f0000001240)={0xf0000100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x96f60ba188302d1f, 0x0, 0x0, {{}, {}, {0x8, 0x2, 0x2}}}, 0x24}}, 0x0)
sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r3, 0x800, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004814}, 0x4014)


INIT: Id "3" respawning too fast: disabled for 5 minutes

INIT: Id "5" respawning too fast: disabled for 5 minutes

INIT: Id "1" respawning too fast: disabled for 5 minutes

INIT: Id "2" respawning too fast: disabled for 5 minutes

INIT: Id "4" respawning too fast: disabled for 5 minutes

INIT: Id "6" respawning too fast: disabled for 5 minutes
[  110.134146][ T6600] cgroup1: Unknown subsys name 'perf_event'
[  110.140228][ T6600] cgroup1: Unknown subsys name 'net_cls'
15:46:38 executing program 4:
sched_setattr(0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x1c1)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x42100, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r0, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
socket(0x10, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0}, 0x2004c000)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$9p(0xffffffffffffffff, 0x0, 0x0)
unshare(0x40000000)
getpid()
r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0)
fallocate(r1, 0x70, 0x0, 0x429cacbd)
write$P9_RWALK(r1, &(0x7f0000000000)={0x30, 0x6f, 0x1, {0x3, [{0x10, 0x2, 0x7}, {0x20, 0x2, 0x1}, {0x4, 0x2, 0x6}]}}, 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00')
sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x24)
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080))
write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}], 0x18)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0)

15:46:38 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)
io_setup(0x40000000008, &(0x7f0000000240)=<r14=>0x0)
io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}])
r15 = socket$unix(0x1, 0x2, 0x0)
r16 = fcntl$dupfd(r15, 0x0, r15)
ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200)
epoll_ctl$EPOLL_CTL_MOD(r16, 0x3, r13, &(0x7f0000000280)={0x10000000})

15:46:38 executing program 5:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0})
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0)
timer_create(0x0, 0x0, &(0x7f0000000040))
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="0721deef00008000000000000000000003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f001604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbb20265515428529b23fe3048f89de8d61a51f58d4e"], 0x87)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fallocate(r1, 0x10, 0x8003, 0x8020001)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
socket$unix(0x1, 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200))
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x81)
r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b)
fdatasync(0xffffffffffffffff)
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3})
r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b)
fdatasync(r5)
ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5})
r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b)
fdatasync(r6)
socket$tipc(0x1e, 0x2, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x55f2ce6, 0x2, 0x0, 0x10, 0xffffffffffffffff, 0x1000, [], 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x3c)
r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
creat(&(0x7f0000000300)='./file0\x00', 0x0)
fdatasync(0xffffffffffffffff)
write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b)

15:46:38 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:38 executing program 3:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0})
accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0)
timer_create(0x0, 0x0, &(0x7f0000000040))
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="0721deef00008000000000000000000003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f001604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbb20265515428529b23fe3048f89de8d61a51f58d4e"], 0x87)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fallocate(r1, 0x10, 0x8003, 0x8020001)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
socket$unix(0x1, 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200))
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x81)
r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b)
fdatasync(0xffffffffffffffff)
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3})
r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b)
fdatasync(r5)
ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5})
r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b)
fdatasync(r6)
socket$tipc(0x1e, 0x2, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x55f2ce6, 0x2, 0x0, 0x10, 0xffffffffffffffff, 0x1000, [], 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x3c)
r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
creat(&(0x7f0000000300)='./file0\x00', 0x0)
fdatasync(0xffffffffffffffff)
write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b)

15:46:38 executing program 1:
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x422200, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x406, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
dup(r0)
ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0)
r3 = socket$unix(0x1, 0x5, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xc)

[  111.037726][ T7004] SELinux: ebitmap: truncated map
[  111.043499][   T22] kauditd_printk_skb: 27 callbacks suppressed
[  111.043507][   T22] audit: type=1326 audit(1580485598.526:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  111.044165][ T7004] SELinux: failed to load policy
15:46:38 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
getpid()
socket$inet6(0xa, 0x2, 0x0)
pipe(&(0x7f0000000200)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
fcntl$setpipe(r0, 0x407, 0x0)
write(r0, &(0x7f0000000340), 0x41395527)
vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$packet(0x11, 0x0, 0x300)
accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x80000)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r2, 0x800)
lseek(r2, 0x0, 0x2)
r3 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0)
sendfile(r2, r3, 0x0, 0x8400fffffffa)
sendfile(r2, r3, 0x0, 0x280900)
syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00')
lseek(0xffffffffffffffff, 0x0, 0x2)
r4 = open(0x0, 0x0, 0x0)
sendfile(0xffffffffffffffff, r4, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
lseek(0xffffffffffffffff, 0x0, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x280900)
r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r5, 0x800)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x4010)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
ioctl$TIOCGPTPEER(r1, 0x5441, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
pivot_root(0x0, &(0x7f0000000340)='./file0\x00')

[  111.051262][   T22] audit: type=1326 audit(1580485598.536:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
15:46:38 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  111.131351][   T22] audit: type=1326 audit(1580485598.596:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  111.155948][ T7011] SELinux: ebitmap: truncated map
[  111.167435][ T7011] SELinux: failed to load policy
[  111.168759][   T22] audit: type=1326 audit(1580485598.596:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  111.198029][   T22] audit: type=1326 audit(1580485598.596:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  111.208318][ T7004] SELinux: ebitmap: truncated map
15:46:38 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  111.238984][   T22] audit: type=1326 audit(1580485598.596:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  111.266438][   T22] audit: type=1326 audit(1580485598.746:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  111.299115][   T22] audit: type=1326 audit(1580485598.746:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
15:46:38 executing program 3:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
writev(r2, &(0x7f0000000600), 0x0)
writev(r2, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000140)=ANY=[@ANYBLOB="0a65be5195ffcd4f"])
write$9p(r0, &(0x7f0000001400)="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", 0x600)
sendfile(r0, r1, 0x0, 0x1c500)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4)
connect$inet6(r4, &(0x7f0000000080), 0x1c)
dup2(r4, 0xffffffffffffffff)
socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
getsockopt$inet6_opts(r5, 0x29, 0x39, 0x0, &(0x7f0000000040))
sendmsg$IPSET_CMD_DEL(r5, &(0x7f0000000680)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000780)={0x30, 0xa, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x30}}, 0x4000000)
socket$packet(0x11, 0x2, 0x300)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x2)
ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8)
r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x40000, 0x0)
getsockopt$IP_VS_SO_GET_TIMEOUT(r9, 0x0, 0x486, &(0x7f0000000400), 0x0)

15:46:38 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  111.328328][   T22] audit: type=1326 audit(1580485598.746:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  111.356405][   T22] audit: type=1326 audit(1580485598.816:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7029 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:46:38 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:38 executing program 4:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000001c0)={0x1, {0x1, 0xd23f, 0xfffffffa, 0x4, 0x9, 0x20}})
sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\a\x00\x00', @ANYRES16=r0, @ANYBLOB="2b0f0000000000000000110000000800120100000000"], 0x1c}}, 0x0)
openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2800, 0x0)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00')
sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}]}, 0x2c}}, 0x0)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
sendmsg$TIPC_NL_MON_PEER_GET(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x108, r5, 0x0, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf7a8}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xb05}]}, @TIPC_NLA_BEARER={0x7c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff6a79}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1be5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100009}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4, 0x1, @dev={0xfe, 0x80, [], 0x1d}, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8cf}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x20008801}, 0x20)

15:46:38 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)
io_setup(0x40000000008, &(0x7f0000000240)=<r14=>0x0)
io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}])
r15 = socket$unix(0x1, 0x2, 0x0)
r16 = fcntl$dupfd(r15, 0x0, r15)
ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200)

15:46:38 executing program 5:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0))
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab00008257030000000000f89c1a2d463c67241d3181f1bd5e70bea8aff0eff0879777f9af4cd7b7493c4524ff8123909d487fdc02c6acb19999114dcdb4a0f36a5ee387b556a084382614cebc063df6d75ece051606f6b6e811e386f18bcfea04009b9b8c3d33a3a1be60a87fda95eff1cb0964653c806268339ad55989932878cab3fd7861116a4834f19e0ffe0544e313df87e96cb62df85dea17f8cfa403d758a7b7ab7ebc3ab8b35252a596143ae0d3f31e9e3f40e39dece6e69616d607012171af463b3abed065bf1845c96668f774814aa78caee72b78c9a71179ba769c585863053f6cd8d0b28ec180d52b9f3b1543527aca7a926151b9ee8b25e38516d0ea3358b7d70ff5b3274ef1e3d30df6d252f797579feeddfece52cc198a46ba5c754d7f1b447369be90c27498f744e6fbea96ddfde298ff422a9d106464533708913f4b8f34bb2fc8b17dc90279ea2fc184cf7e9ff086a03e99e0c3ff51b87ae4587aa7ce5f6db34b8f0cfd51c91499e30db887d0569dd3d18330ede8fe9794995ec52fc30b8056ba"], 0x38)
vmsplice(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="84a25ad80169306c86f60c4733bf0f67ef5f4ec4c5c242ff35d1b82f52a4df8a408e8eff7b7e274d3fe6c241b2fc51", 0x2f}], 0x1, 0x4)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100)=<r3=>0x0)
io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}])
fallocate(r0, 0x3, 0x0, 0x2000)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6628)

15:46:39 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:39 executing program 4:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f7765726469723d69723dac2168fe14206ffc9d890a382e2f66696c6530"])
chdir(&(0x7f00000002c0)='./bus\x00')
setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x73, 0x1, 0x5, "6716c4093bfd6d516ea7324110c914c9", "8fd719631012ff661e4d940f29b36e0efe899c55a784825d277cedcda5463c0b698b709d4496cb6c3230b46183cb65140f918a22b0f021672614db11adcbb7ebd27bba7f3477e286ec17d92dbdb0198963f16ec4938ba00bc87230971054"}, 0x73, 0x0)
lseek(0xffffffffffffffff, 0x0, 0x2)
dup(0xffffffffffffffff)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='q'], 0x1)
sendfile(r1, r0, 0x0, 0xa198)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80008000})
fchdir(0xffffffffffffffff)
openat$full(0xffffffffffffff9c, 0x0, 0x20940, 0x0)
r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='q'], 0x1)

15:46:39 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  111.520999][ T7058] SELinux: ebitmap: truncated map
[  111.526936][ T7058] SELinux: ebitmap: truncated map
[  111.539507][ T7058] SELinux: ebitmap: truncated map
[  111.546032][ T7059] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 446494720)
[  111.558750][ T7062] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent
[  111.715941][ T7067] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 446494720)
15:46:39 executing program 1:
unshare(0x600)
r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x54a1, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3)

15:46:39 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:39 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)
io_setup(0x40000000008, &(0x7f0000000240)=<r14=>0x0)
io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}])
r15 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r15, 0x0, r15)

15:46:39 executing program 5:
syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8800, &(0x7f0000000000)=ANY=[@ANYBLOB="f8e8fce35d92cb00"])

15:46:39 executing program 1:
sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x11020102}, 0xc, 0x0}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x111102, 0x0)
ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000002c0)=""/215)
pwritev(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd01009341", 0x6}], 0x1000000000000006, 0x0)

15:46:39 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  111.991622][ T7081] SELinux: ebitmap: truncated map
[  111.997173][ T7081] SELinux: ebitmap: truncated map
[  112.004160][ T7081] SELinux: ebitmap: truncated map
15:46:39 executing program 1:
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c)
chmod(&(0x7f0000000000)='./file0\x00', 0x2)
personality(0x5000004)

15:46:39 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:39 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0)
chdir(&(0x7f0000000300)='./file0\x00')
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000300)='./bus\x00', 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6c2e2f6275732c776f726b6469723d9c15d78e66696c653000000000000000005b0b3325851bd0d44efacf4dbd29adf1888e3526b5d71018bbdd0d1053dc70a70010426e14350d7d3953ce42547420be8d78b4c213643118f9b93949c79c11b40dec4189c1ebb4a3afb3e225abd2266d7160e6dfa8bb13e115dc1890c2bc3ace04f40f74371c3f1205638e15578f897298b2d625b68ea452c1459fb7d55509bf056a85027f022320bd745c915d32c00dcc406646354923f4"])
getresuid(&(0x7f0000000140), &(0x7f0000000180)=<r0=>0x0, &(0x7f00000001c0))
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
r2 = open(&(0x7f00000003c0)='./file1\x00', 0x212182, 0x194)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={<r3=>0x0, @multicast1, @local}, &(0x7f0000000140)=0xc)
r4 = socket(0xb, 0x4, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r5)
sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="3c020000100013070000000000000000fe880000000000000000000000000001ac1e00010000000000000000000000004e2200ff00000000020000000000000060b5f8d6ddea0626866d59c6fb12acc0607b0f06a315496ba897ae62d773ac8ecb4536fbd21560fcc806b9539e1215091262012704a0a2fb2b8dc08935bdbc8e6829dbae3e447861e9a8d8a6b8433612cc9c86a64c71de2a31a4363c336e5a148b5696ae03dda1963ff0cb67d6aa76d6f792d77cff50bce5207680db49eb95370366897b2456e7785aa457c0daebbd5cd516e372d75dc0a9218ec51a06d0fc0ae9a4425f6853b96aa9264353c3cc1a", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="f0000000000000000000ffff7f000001000004d632000000e000000200000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000009d1dad858458064500000000000000000000000000000a0000fd9600000000000000e40006000000006400000000000000000000000000007fff0000000000000000000000004e2300004e2100000a03dba1af46d753db6e8886135f78a066e3059792b8fb225fdb7a6abee93d9b1b78e6fd20fcc6d9b8d116275807a4e7cfac1aef5420ca767a189c26a46ba92bd9a372e5254840830f1cc4dc04", @ANYRES32=r3, @ANYRES32, @ANYBLOB], 0x7}}, 0x0)
r6 = socket$nl_xfrm(0x10, 0x3, 0x6)
r7 = open(&(0x7f00000003c0)='./file1\x00', 0x212182, 0x194)
getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000000c0)={<r8=>0x0, @multicast1, @local}, &(0x7f0000000140)=0xc)
r9 = socket(0x1, 0x5, 0x0)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="3c020000100013070000000000000000fe880000000000000000000000000001ac1e00010000000000000000000000004e2200ff00000000020000000000000060b5f8d6ddea0626866d59c6fb12acc0607b0f06a315496ba897ae62d773ac8ecb4536fbd21560fcc806b9539e1215091262012704a0a2fb2b8dc08935bdbc8e6829dbae3e447861e9a8d8a6b8433612cc9c86a64c71de2a31a4363c336e5a148b5696ae03dda1963ff0cb67d6aa76d6f792d77cff50bce5207680db49eb95370366897b2456e7785aa457c0daebbd5cd516e372d75dc0a9218ec51a06d0fc0ae9a4425f6853b96aa9264353c3cc1a", @ANYRES32=0x0, @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r8, @ANYRES32, @ANYBLOB], 0x7}}, 0x0)
r11 = socket$nl_xfrm(0x10, 0x3, 0x6)
r12 = open(&(0x7f00000003c0)='./file1\x00', 0x212182, 0x194)
getsockopt$inet_pktinfo(r12, 0x0, 0x8, &(0x7f00000000c0)={<r13=>0x0, @multicast1, @local}, &(0x7f0000000140)=0xc)
r14 = socket(0x1, 0x5, 0x0)
getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r15=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r15)
sendmsg$nl_xfrm(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="3c020000100013070000000000000000fe880000000000000000000000000001ac1e00010000000000000000000000004e2200ff00000000020000000000000060b5f8d6ddea0626866d59c6fb12acc0607b0f06a315496ba897ae62d773ac8ecb4536fbd21560fcc806b9539e1215091262012704a0a2fb2b8dc08935bdbc8e6829dbae3e447861e9a8d8a6b8433612cc9c86a64c71de2a31a4363c336e5a148b5696ae03dda1963ff0cb67d6aa76d6f792d77cff50bce5207680db49eb95370366897b2456e7785aa457c0daebbd5cd516e372d75dc0a9218ec51a06d0fc0ae9a4425f6853b96aa9264353c3cc1a", @ANYRES32=0x0, @ANYRES32=r15, @ANYBLOB="f0000000000000000000ffff7f000001000004d632000000e000000200000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000009d1dad858458064500000000000000000000000000000a0000fd9600000000000000e40006000000006400000000000000000000000000007fff0000000000000000000000004e2300004e2100000a03dba1af46d753db6e8886135f78a066e3059792b8fb225fdb7a6abee93d9b1b78e6fd20fcc6d9b8d116275807a4e7cfac1aef5420ca767a189c26a46ba92bd9a372e5254840830f1cc4dc04", @ANYRES32=r13, @ANYRES32, @ANYBLOB], 0x7}}, 0x0)
lsetxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {}, [{0x2, 0x2, r0}, {0x2, 0x1, r5}, {0x2, 0x0, r0}, {0x2, 0x3, r10}, {0x2, 0xc203530f960c5078, r15}]}, 0x4c, 0x0)

15:46:39 executing program 3:
mkdir(&(0x7f00000001c0)='./file0\x00', 0x94)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='affs\x00', 0x2082000, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0)
mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0)
umount2(&(0x7f0000000180)='./file0\x00', 0x0)
mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0)
mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000880)='sysfs\x00', 0x0, 0x0)

[  112.094952][ T7095] overlayfs: unrecognized mount option "l./bus" or missing value
[  112.118143][ T7100] overlayfs: unrecognized mount option "l./bus" or missing value
[  112.197610][ T7108] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  112.240078][ T7121] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:46:39 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)
io_setup(0x40000000008, &(0x7f0000000240)=<r14=>0x0)
io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}])
socket$unix(0x1, 0x2, 0x0)

15:46:39 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0xd)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r6, &(0x7f0000000200), 0x7ffff000)

15:46:39 executing program 4:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b660100666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x26100, 0x0)
sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x8c, 0xb, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0x9}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1f}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_ADT={0x68, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x2}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x29}}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x1ff}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x7}}]}]}, 0x8c}}, 0x20000000)
fchdir(r0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.controllers\x00', 0x275a, 0x0)
ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000})
write$cgroup_int(r2, 0x0, 0x0)
open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)

15:46:39 executing program 1:
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c)
chmod(&(0x7f0000000000)='./file0\x00', 0x2)
personality(0x5000004)

15:46:39 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:39 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000480)="ae17c373bb47424e2231db2e30253f601fd488660735a3480e1d8ba8777b116e6c8995e83ed70900000000000000ee131da2137f3e7013ae547ca6bc2f5c4e0e49e3a55b7cbbc8e5795f251572394dd6c70b23d6469a3e03dad96fcd84d4c2f7aab40ea31c2c35532214df7c914aa29e5d812275db7d9205db7bf99af1b39fa92282c9eedf1e5ffdc476bd2356dc3ae0361c4e5961de6b12b545085210b6d59b1228bffdf80ec780ee97ce3b753958bdb10b457424e65e61b6787c2da2df961c5b8df7c3268473d7fb78d427a87f73bef1560e086d15", 0xd6}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0)
socket$key(0xf, 0x3, 0x2)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0)
r4 = socket$inet6(0xa, 0x800000000000002, 0x0)
connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
sendmmsg(0xffffffffffffffff, &(0x7f0000004c00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000006e40)=[{0x10, 0x29}], 0x10}}], 0x2, 0x0)
ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, 0x0)
ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f00000003c0)=""/160)
pipe(0x0)
syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320c)
bind$unix(r2, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'})
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0)
remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x3, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0)
r5 = socket(0x11, 0x0, 0x0)
socket$inet6(0xa, 0x800000000000002, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
r6 = socket$can_raw(0x1d, 0x3, 0x1)
bind(r6, 0x0, 0x0)
getsockname$packet(r5, 0x0, &(0x7f0000000140))
socket(0x10, 0x0, 0x0)
r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r7, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='0', @ANYRES32, @ANYBLOB="f9", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=0x0], 0x6}}, 0x0)
pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00')

15:46:39 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  112.373759][ T7135] SELinux: ebitmap: truncated map
15:46:39 executing program 5:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$NFQNL_MSG_VERDICT_BATCH(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x7c, 0x3, 0x3, 0x0, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x20}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x6}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x101}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0xfffffff8}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x5}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x9}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x7}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x8}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x4}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x100}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x41)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r5=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r5, 0x0)
r6 = socket$inet6(0x10, 0x400000000000002, 0x0)
fsetxattr$security_selinux(r6, &(0x7f0000000700)='security.selinux\x00', &(0x7f0000000740)='/sbin/dhclient\x00', 0xfd03, 0x0)

15:46:39 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  112.399719][ T7137] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  112.420531][ T7135] SELinux: ebitmap: truncated map
[  112.441065][ T7135] SELinux: ebitmap: truncated map
15:46:39 executing program 1:
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c)
chmod(&(0x7f0000000000)='./file0\x00', 0x2)
personality(0x5000004)

15:46:40 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0)
socket$unix(0x1, 0x2, 0x0)

15:46:40 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)
io_setup(0x40000000008, &(0x7f0000000240)=<r14=>0x0)
io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}])

15:46:40 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
sendmmsg$inet6(r0, &(0x7f0000000840)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000480)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="2400001400000000000018000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x28}}], 0x2, 0x0)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff0000b28b749300000000f89c1aa51b69cad51e55e96accc446d428f7de16449f90050b48692ec2223deef4370735ac0751051b008834e210e6850792d5d1d1de443393f953879769685f1c9828a80f21b01f2ed41aa4f8894a0bb1d565bd9048fa405dcbbbfab7c8aeb626"], 0x38)
r2 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x1000)
ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @identifier="77cfff7c0dd0a997080feca21a38f93c"}})
fcntl$setpipe(r1, 0x407, 0x10000)

[  112.518591][ T7164] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:46:40 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0)
socket$unix(0x1, 0x2, 0x0)

[  112.563197][ T7173] SELinux: ebitmap: truncated map
[  112.572014][ T7173] SELinux: ebitmap: truncated map
[  112.580116][ T7175] SELinux: ebitmap: truncated map
[  112.586985][ T7173] SELinux: ebitmap: truncated map
[  112.596844][ T7175] SELinux: ebitmap: truncated map
15:46:40 executing program 5:
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss={0x2, 0x9e}], 0x3)
r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000002000000e4b0b07966000000000100000d0300000000000000030000000000003d05d6c00d00000000000000000000000202"], &(0x7f0000003580)=""/4096, 0x46, 0x1000, 0x1041}, 0x20)
write(r0, &(0x7f0000000000)="3a34523b3c528e8f0c7502566b3320cb477e6e9c06d6e177995a27b22b26be6dec067d23a84efc0c47890d060348f11436", 0x31)

15:46:40 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0)
socket$unix(0x1, 0x2, 0x0)

15:46:40 executing program 1:
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c)
chmod(&(0x7f0000000000)='./file0\x00', 0x2)
personality(0x5000004)

[  112.709198][ T6600] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF
[  112.718569][ T6600] FAT-fs (loop4): Filesystem has been set read-only
[  112.734858][ T7191] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:46:40 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)
io_setup(0x40000000008, &(0x7f0000000240))

15:46:40 executing program 3:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = accept4$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10, 0x80000)
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xb, 0x172, r2, 0x0)
llistxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000580)=""/104, 0x68)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r5 = dup2(r3, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
syz_open_dev$ttys(0xc, 0x2, 0x1)
pipe2(&(0x7f0000000600), 0x800)
ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000640)={0x0, 0x1, 0x8, 0x3, 0x105, &(0x7f0000000180)="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"})
mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000003000/0x3000)=nil)
ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000000))

15:46:40 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2808}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendto$inet(r3, &(0x7f0000000340)="556c133537389541fb27ab1b131c0d5f05076645488cc9c07c0d8188ef7bff52bf8226f1f80e089b6fd789f774d359b905abbac1219e7a8b4fb5de60d0dd5a4d93c3ff23dff8493fae85682059614641b08668eda3d88fce21b2e6588a9d82e350b9a9601c99bab327e5b59308af75fc1133058e7f551efd321a77fbcb71f7595a30c3d7e81e64352cc043c2558ea2d8a5b1f45c70b30157c675c994d2cd6f500aef783a2ae1690b3d8c4b457443bfaad74b5cffb67a2aa28bb81f4e8b99d6c2bb207b16624dc19cd335706a346a2707dd3391b3c18df8b397e76b7fb2d4ed5e2efb32998d5d7701f5b9321f46781f", 0xef, 0x10000, &(0x7f00000000c0)={0x2, 0x4e22, @remote}, 0x10)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)
r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x500c0, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00')
fchdir(r6)
getsockopt$CAN_RAW_JOIN_FILTERS(r6, 0x65, 0x6, &(0x7f0000000140), &(0x7f0000000240)=0x4)
r7 = socket(0x10, 0x803, 0x0)
getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000280), &(0x7f0000000440)=0x4)
sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c00000010000d0400"/20, @ANYRES32, @ANYBLOB="00000000000000001800120008000100767469000c00020008000400", @ANYRES32, @ANYBLOB="14000400677265df5b3ec9000000000000000000"], 0x4c}}, 0x0)

15:46:40 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001})
socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = dup3(r3, r2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r5, 0x28, &(0x7f0000000240)={0x0, <r6=>0x0}}, 0x10)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r6}, 0xc)
r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r6, 0x4, 0x10}, 0xc)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r7, 0x28, &(0x7f0000000180)}, 0x10)
r8 = socket$inet_udplite(0x2, 0x2, 0x88)
r9 = fcntl$dupfd(r1, 0x0, r8)
setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1)
write$tun(r0, &(0x7f0000000040)={@void, @val={0x0, 0x0, 0x505}, @mpls={[], @ipv4=@generic={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x84, 0x0, @loopback, @empty}, "919de81e6d27a81b30e714120e95ba22"}}}, 0xfdef)

15:46:40 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0})
socket$unix(0x1, 0x2, 0x0)

15:46:40 executing program 1:
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c)
chmod(&(0x7f0000000000)='./file0\x00', 0x2)

15:46:40 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0})
socket$unix(0x1, 0x2, 0x0)

[  113.227577][ T7210] SELinux: ebitmap: truncated map
[  113.239659][ T7210] sel_write_load: 17 callbacks suppressed
[  113.239661][ T7210] SELinux: failed to load policy
[  113.252850][ T7213] netlink: 'syz-executor.5': attribute type 4 has an invalid length.
[  113.255330][ T7210] SELinux: ebitmap: truncated map
[  113.266795][ T7210] SELinux: failed to load policy
15:46:40 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
getpid()
socket$inet6(0xa, 0x2, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, 0x0, 0x0)
socket$packet(0x11, 0x0, 0x300)
accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x80000)
socket$packet(0x11, 0x0, 0x300)
r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r3, 0x800)
lseek(r3, 0x0, 0x2)
r4 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0)
sendfile(r3, r4, 0x0, 0x8400fffffffa)
sendfile(r3, r4, 0x0, 0x280900)
syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00')
lseek(0xffffffffffffffff, 0x0, 0x2)
r5 = open(0x0, 0x0, 0x0)
sendfile(0xffffffffffffffff, r5, 0x0, 0x0)
sendfile(0xffffffffffffffff, r5, 0x0, 0x0)
r6 = creat(0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x800)
lseek(0xffffffffffffffff, 0x0, 0x2)
r7 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0)
sendfile(r6, r7, 0x0, 0x280900)
r8 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r8, 0x800)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x4010)
open(0x0, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="000000001000"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000906995df4557769ca4c4e09bc97950d0c92d1c153e2a9102a4c5f0da712314431253c456d2769b4d8998196611ec0c2cd00b7b1f204f97136a9d72e72d9be546b9b7c413637c8f25f3084bc4dcb7109e464c1ad425974b9029a862e9431565c364e197311b5f45ab96654fac4a16684abf3f1b4e80a642f796533372ced176507a2f2434148f061a16e1b6886b"]}}, 0x0)
mknod$loop(&(0x7f0000000100)='./file0\x00', 0x8000, 0x0)
ioctl$TIOCGPTPEER(r2, 0x5441, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
pipe2(&(0x7f00000001c0), 0x0)
pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00')

[  113.269851][ T7212] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables
[  113.288270][ T7216] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  113.292039][ T7210] SELinux: ebitmap: truncated map
[  113.304140][ T7222] netlink: 'syz-executor.5': attribute type 4 has an invalid length.
[  113.314661][ T7210] SELinux: failed to load policy
15:46:40 executing program 1:
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c)

15:46:40 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0})
socket$unix(0x1, 0x2, 0x0)

15:46:40 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, &(0x7f00000001c0)})
socket$unix(0x1, 0x2, 0x0)

15:46:40 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, &(0x7f00000001c0)})
socket$unix(0x1, 0x2, 0x0)

15:46:40 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78)

15:46:40 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  113.401765][ T7235] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:46:41 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, &(0x7f00000001c0)})
socket$unix(0x1, 0x2, 0x0)

[  113.487159][ T7250] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  113.500827][ T7253] SELinux: ebitmap: truncated map
[  113.514117][ T7253] SELinux: failed to load policy
[  113.526545][ T7253] SELinux: ebitmap: truncated map
15:46:41 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
ftruncate(r0, 0x400)
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2, 0x0)
memfd_create(&(0x7f0000000280)='batadv_slave_1\x00', 0x7)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r3 = syz_genetlink_get_family_id$ipvs(0x0)
sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r3, 0x400, 0x0, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0xc1}, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xb8, r3, 0x1, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd2b}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x12}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x29}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc96}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3ff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20008000}, 0x8001)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_tcp_int(r4, 0x6, 0x1a, 0x0, &(0x7f00000000c0))
ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000100))

[  113.537646][ T7253] SELinux: failed to load policy
[  113.567514][ T7253] SELinux: ebitmap: truncated map
[  113.578211][ T7253] SELinux: failed to load policy
15:46:41 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:41 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:41 executing program 5:
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c)

[  113.797114][ T7278] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:46:41 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00')
read$FUSE(r0, &(0x7f0000000280), 0xfffffed3)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
recvfrom$inet6(r2, &(0x7f0000001280)=""/4096, 0x1000, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x4, @mcast2, 0x2}, 0x1c)

15:46:41 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:41 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)

15:46:41 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
utimensat(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={{0x77359400}}, 0x0)
sched_setattr(r0, &(0x7f0000000080)={0x38, 0x6, 0x0, 0x0, 0x3, 0x0, 0x0, 0x54b, 0x3}, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0)
socket$inet6_udplite(0xa, 0x2, 0x88)
r3 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e2c, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
connect$inet(r4, 0x0, 0x0)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
dup3(0xffffffffffffffff, r9, 0x80000)
r10 = socket$unix(0x1, 0x2, 0x0)
r11 = fcntl$dupfd(r10, 0x0, r10)
ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200)
accept4(r11, &(0x7f00000000c0)=@nfc_llcp, &(0x7f0000000000)=0x80, 0x800)
openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0)
r12 = socket$unix(0x1, 0x2, 0x0)
r13 = fcntl$dupfd(r12, 0x0, r12)
ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200)
getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000000780)={{{@in, @in=@dev}}, {{@in=@empty}}}, &(0x7f0000000180)=0xfffffe97)
r14 = perf_event_open(&(0x7f0000000700)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x8000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, r14, 0x0)
open(&(0x7f0000000300)='.\x00', 0x55bb82, 0x0)
getpid()
sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getpid()
fstat(0xffffffffffffffff, &(0x7f00000001c0))
socket(0x0, 0x2, 0x0)
setregid(0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000200)}, 0x20)

15:46:41 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:41 executing program 5:
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c)

15:46:41 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:41 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  114.254596][ T7297] SELinux: ebitmap: truncated map
[  114.266265][ T7297] SELinux: failed to load policy
[  114.272331][ T7297] SELinux: ebitmap: truncated map
[  114.278263][ T7297] SELinux: failed to load policy
[  114.285736][ T7297] SELinux: ebitmap: truncated map
[  114.290736][ T7300] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  114.294762][ T7297] SELinux: failed to load policy
15:46:41 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0)
r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r13, 0x0, 0x0, 0x8020001)
ftruncate(r12, 0x8200)

15:46:41 executing program 5:
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c)

15:46:41 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6}]})
socket$unix(0x1, 0x2, 0x0)

15:46:41 executing program 1:
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  114.414022][ T7313] SELinux: ebitmap: truncated map
[  114.419262][ T7313] SELinux: failed to load policy
[  114.467646][ T7334] SELinux: ebitmap: truncated map
[  114.476974][ T7334] SELinux: ebitmap: truncated map
[  114.484547][ T7334] SELinux: ebitmap: truncated map
15:46:42 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
creat(&(0x7f0000000140)='./bus\x00', 0x0)
r12 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fallocate(r12, 0x0, 0x0, 0x8020001)

15:46:42 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:42 executing program 1:
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:42 executing program 3:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8)
mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x800400, &(0x7f00000002c0)={[{@xino_off='xino=off'}, {@xino_auto='xino=auto'}, {@xino_on='xino=on'}, {@default_permissions='default_permissions'}, {@metacopy_off='metacopy=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}], [{@obj_user={'obj_user', 0x3d, 'keyring'}}, {@smackfsroot={'smackfsroot', 0x3d, 'wlan0@self.bdev#!'}}, {@fowner_eq={'fowner', 0x3d, r2}}]})
mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)={[], [{@context={'context', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]})

15:46:42 executing program 4:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
ioctl$TIOCEXCL(r0, 0x540c)
r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
pipe(0x0)
writev(0xffffffffffffffff, &(0x7f0000000000), 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x2, 0x0)
socket(0x10, 0x0, 0x0)
r3 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r3, 0x406, r3)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r4=>0x0}, &(0x7f0000cab000)=0xc)
sendmsg$netlink(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x20}, 0x0)
r5 = socket(0x10, 0x2, 0x0)
r6 = gettid()
r7 = socket(0x0, 0x0, 0x0)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r8=>0x0}, 0x0)
sendmsg$netlink(r5, &(0x7f0000000300)={0x0, 0xffffffffffffff6d, &(0x7f0000000140)=[{&(0x7f00000006c0)={0x10}, 0x10}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r8}}}], 0x20}, 0x0)
r9 = socket(0x10, 0x2, 0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r10=>0x0}, &(0x7f0000cab000)=0xc)
r11 = getpid()
sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
sendmsg$netlink(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r11, 0x0, r10}}}], 0x20}, 0x0)
r12 = socket(0x10, 0xa, 0x0)
gettid()
r13 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r13, 0x1, 0x11, 0x0, 0x0)
sendmsg$netlink(r12, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000006c0)={0x10}, 0x10}], 0x1, &(0x7f00000001c0)}, 0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0)
socket(0x0, 0x2, 0x0)
gettid()
lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280))
lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0))
getgroups(0x0, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240))
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0', [{0x20, ')'}, {0x20, 'cgroupsystem]vboxnet0\xb1procselinuxsystem)wlan1em0'}, {0x20, 'sit\x00'}, {0x20, ':&,'}, {0x20, 'sit\x00'}], 0xa, "224940f52d2ce92d7934dde2b9e6695d5d9a10593d24a720bd72b990a65296c1d1524bc0e820b6164c03fd6267c7713f4940a8115c9948f9"}, 0x84)
write$9p(r0, &(0x7f0000001400)="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", 0x600)
sendfile(r0, r1, 0x0, 0x1c500)

[  115.108734][ T7356] SELinux: ebitmap: truncated map
[  115.115284][ T7356] SELinux: ebitmap: truncated map
[  115.122768][ T7361] overlayfs: unrecognized mount option "obj_user=keyring" or missing value
[  115.132712][ T7356] SELinux: ebitmap: truncated map
[  115.138138][ T7361] SELinux:  duplicate or incompatible mount options
15:46:42 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:42 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
creat(&(0x7f0000000140)='./bus\x00', 0x0)
creat(&(0x7f0000000080)='./bus\x00', 0x0)

15:46:42 executing program 3:
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r1, 0x0, r1)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = accept4(r3, &(0x7f00000000c0)=@ax25={{0x3, @null}, [@null, @default, @null, @default, @netrom, @bcast, @remote, @bcast]}, &(0x7f0000000040)=0x80, 0x0)
r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00')
sendmsg$IPVS_CMD_DEL_SERVICE(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="8c0000002bba3d5d36050d4267456a0ebbda31ae013e0683df09c6828dad442b9e0c7670987edbcfb9071f59a2d66fbdaf7db16e1965c1e7fea6b0179db38794a6c362ff4d048480bb87b13d0575f6a8429af34bb57e850a17af583734a5be81c6b08725fd90dc8d941e1a6cef23581cb6928ee12fd7949533c388264ee7435eb5f8b80abfb046521b1bcc292fed97d4", @ANYRES16=r5, @ANYBLOB="000425bd7000ffdbdf250300000008000600d30000001c000380060007004e200000060007004e230000060004000700000008000600060000004c00028014000100ac14143600000000000000000000000008000500e60000001400010000000000000000000000000000000000060002004e210000080003000300000006000f0031250000"], 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x0)
r6 = socket$nl_route(0x10, 0x3, 0x0)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000300), 0x4)
r7 = syz_open_dev$loop(&(0x7f0000000700)='/dev/loop#\x00', 0x2, 0x40000)
ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000740)={0x0, r3, 0x8000, 0x6, 0x751, 0x4})
r8 = dup(r6)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = socket$unix(0x1, 0x2, 0x0)
r10 = fcntl$dupfd(r9, 0x0, r9)
ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200)
ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f00000006c0)={0xb4, 0x0, &(0x7f0000000540)=[@decrefs={0x40046307, 0x3}, @enter_looper, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f00000001c0)={@fd, @fd={0x66642a85, 0x0, r6}, @flat=@weak_binder={0x77622a85, 0x100, 0x1}}, &(0x7f0000000240)={0x0, 0x18, 0x30}}}, @acquire_done={0x40106309, 0x3}, @enter_looper, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000480)={@flat=@binder={0x73622a85, 0x0, 0x2}, @fda={0x66646185, 0xa, 0x0, 0x2}, @fd={0x66642a85, 0x0, r8}}, &(0x7f0000000500)={0x0, 0x18, 0x38}}}, @release={0x40046306, 0x3}], 0xbd, 0x0, &(0x7f0000000600)="9265bace4b80c7395ee620458cc03977847b9818688eca3167cdcd67842bd510eca2e2413179d7d00e698cd611b737bf91721d6cdcba707d61da9f5ebdff3b88b28b453f8e044f939b14c94635457686e6bb7646877a8f6b0330e93aa5622b917e66858b3dca84a53ba94141794c7c85740527bcc0ac8642b79eb1747688646f969ac5170f22f992b0cd51b95e36e943a5f4fe9357ce748b0dca0dbc00703351e5bc752791f78820e8295049449653dd13bddca47f62db403caf6cb6ca"})
getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2e, &(0x7f0000000080), 0x20a15ab6)

15:46:42 executing program 1:
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  115.152454][ T7361] overlayfs: unrecognized mount option "obj_user=keyring" or missing value
[  115.158909][ T7357] selinux_nlmsg_perm: 52 callbacks suppressed
[  115.159755][ T7357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7357 comm=syz-executor.4
[  115.162875][ T7365] SELinux:  duplicate or incompatible mount options
15:46:42 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:42 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6}]})
socket$unix(0x1, 0x2, 0x0)

15:46:42 executing program 3:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x38}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x40000000000}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$9p(0xffffffffffffffff, &(0x7f0000001400), 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x5, 0x8000, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xa]}, 0x3c)
unshare(0x40000000)
getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000200), &(0x7f0000000240)=0x4)
r0 = socket$packet(0x11, 0x2, 0x300)
r1 = dup(0xffffffffffffffff)
recvmsg$can_raw(r1, &(0x7f0000002780)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)=""/225, 0xe1}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/34, 0x22}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000000500)=""/98, 0x62}], 0x6, &(0x7f0000000600)=""/246, 0xf6}, 0x20000001)
fdatasync(r2)
dup3(r0, 0xffffffffffffffff, 0xc0000)
mount(&(0x7f00000027c0)=ANY=[@ANYBLOB="804115e091490002ecaacd3abcbb0ff2e438dc170ce7b7914cf6eb6d85539973144ff5ffa830832b919045967ede240df0556dbf9155394c031f265e9981c14a7474d88c8a534dc509c9769f5b86088e3c11cf4bacbd0420d0509437e0b311e3ddbac5a1ff5ccefc89cc514097c36b9c97661de0fd98f9a5ad0a9629c9a87db1d98fad1f"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x1000, 0x0)
clock_gettime(0x0, &(0x7f0000000080))
clock_gettime(0x0, &(0x7f0000000140))
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)

[  115.241499][ T7376] SELinux: ebitmap: truncated map
[  115.248134][ T7376] SELinux: ebitmap: truncated map
[  115.256958][ T7376] SELinux: ebitmap: truncated map
15:46:42 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))
creat(&(0x7f0000000140)='./bus\x00', 0x0)

15:46:42 executing program 1:
open(0x0, 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:42 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  115.377314][ T7405] SELinux: ebitmap: truncated map
[  115.385874][ T7405] SELinux: ebitmap: truncated map
[  115.396775][ T7405] SELinux: ebitmap: truncated map
15:46:42 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
r11 = socket(0x1e, 0x800, 0x1)
ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300))

[  115.511409][ T7417] SELinux: ebitmap: truncated map
[  115.519883][ T7417] SELinux: ebitmap: truncated map
[  115.527548][ T7417] SELinux: ebitmap: truncated map
[  115.762412][ T7427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7427 comm=syz-executor.4
15:46:43 executing program 5:
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:43 executing program 1:
open(0x0, 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:43 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)
socket(0x1e, 0x800, 0x1)

15:46:43 executing program 4:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
ioctl$TIOCEXCL(r0, 0x540c)
r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
pipe(0x0)
writev(0xffffffffffffffff, &(0x7f0000000000), 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x2, 0x0)
socket(0x10, 0x0, 0x0)
r3 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r3, 0x406, r3)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r4=>0x0}, &(0x7f0000cab000)=0xc)
sendmsg$netlink(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x20}, 0x0)
r5 = socket(0x10, 0x2, 0x0)
r6 = gettid()
r7 = socket(0x0, 0x0, 0x0)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r8=>0x0}, 0x0)
sendmsg$netlink(r5, &(0x7f0000000300)={0x0, 0xffffffffffffff6d, &(0x7f0000000140)=[{&(0x7f00000006c0)={0x10}, 0x10}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r8}}}], 0x20}, 0x0)
r9 = socket(0x10, 0x2, 0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r10=>0x0}, &(0x7f0000cab000)=0xc)
r11 = getpid()
sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
sendmsg$netlink(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r11, 0x0, r10}}}], 0x20}, 0x0)
r12 = socket(0x10, 0xa, 0x0)
gettid()
r13 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r13, 0x1, 0x11, 0x0, 0x0)
sendmsg$netlink(r12, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000006c0)={0x10}, 0x10}], 0x1, &(0x7f00000001c0)}, 0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0)
socket(0x0, 0x2, 0x0)
gettid()
lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280))
lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0))
getgroups(0x0, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240))
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0', [{0x20, ')'}, {0x20, 'cgroupsystem]vboxnet0\xb1procselinuxsystem)wlan1em0'}, {0x20, 'sit\x00'}, {0x20, ':&,'}, {0x20, 'sit\x00'}], 0xa, "224940f52d2ce92d7934dde2b9e6695d5d9a10593d24a720bd72b990a65296c1d1524bc0e820b6164c03fd6267c7713f4940a8115c9948f9"}, 0x84)
write$9p(r0, &(0x7f0000001400)="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", 0x600)
sendfile(r0, r1, 0x0, 0x1c500)

15:46:43 executing program 3:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:43 executing program 1:
open(0x0, 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  115.849521][ T7357] syz-executor.4 (7357) used greatest stack depth: 19288 bytes left
[  115.868973][ T7436] SELinux: ebitmap: truncated map
[  115.879759][ T7436] SELinux: ebitmap: truncated map
[  115.890480][ T7436] SELinux: ebitmap: truncated map
[  115.918274][ T7446] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7446 comm=syz-executor.4
15:46:43 executing program 5:
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:43 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)
socket$key(0xf, 0x3, 0x2)

15:46:43 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6}]})
socket$unix(0x1, 0x2, 0x0)

15:46:43 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:43 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0)
r0 = creat(0x0, 0x10)
setresuid(0x0, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0)
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0)
r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0)
fallocate(r1, 0x0, 0x0, 0x2000402)
socket$inet6(0xa, 0x400000000803, 0x0)
close(0xffffffffffffffff)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfff}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0), 0x0, 0x2, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x6e5008989ef5ad49}, 0x4000)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x58, 0x2, 0x2, 0x3, 0x0, 0x0, {0x5, 0x0, 0x7}, [@CTA_EXPECT_MASK={0x44, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000)
write$9p(0xffffffffffffffff, 0x0, 0x0)
unshare(0x40000000)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000ec0)="ce030f00001300000000000000005c22020000000000004e99b512ec6c6dbd024000009e975050d8fc03240c3b12de1b838b33dd925d5f917c28d7e1", 0x3c, 0x0, 0x0, 0x0)

[  116.198304][ T7470] SELinux: ebitmap: truncated map
[  116.210727][ T7470] SELinux: ebitmap: truncated map
[  116.220752][   T22] kauditd_printk_skb: 57 callbacks suppressed
15:46:43 executing program 5:
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  116.220760][   T22] audit: type=1326 audit(1580485603.706:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7472 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x0
[  116.256653][ T7470] SELinux: ebitmap: truncated map
15:46:43 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0)

15:46:43 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:43 executing program 5:
open(0x0, 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  116.404291][ T7497] SELinux: ebitmap: truncated map
[  116.422521][ T7497] SELinux: ebitmap: truncated map
[  116.438904][ T7497] SELinux: ebitmap: truncated map
15:46:43 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:43 executing program 4:
r0 = socket$inet6(0xa, 0x3, 0x100000400000003a)
setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="0605000000000000071800000002049007000700000000000000ff03000000000000e200c20400000fff0502000104c806c67a0000002000"], 0x38)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c)
write(r0, &(0x7f00000000c0)="f70b9378", 0x554)
socket$inet6(0xa, 0x5, 0x5)

15:46:43 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)
open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)

[  116.471667][ T7446] syz-executor.4 (7446) used greatest stack depth: 18968 bytes left
15:46:44 executing program 4:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80400, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xb}}, {@mode={'mode', 0x3d, 0x40}}], [{@smackfsdef={'smackfsdef', 0x3d, 'devpts\x00'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', 0xee01}}, {@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, '@&}[^'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@subj_user={'subj_user', 0x3d, ')\xeacpuset'}}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x80, 0x0)
mmap$usbfs(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x50, r0, 0xae)
mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0)
mount(&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0)
mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='devpts\x00', 0x0, 0x0)
umount2(&(0x7f0000000180)='./file0\x00', 0x0)

[  116.614292][ T7533] SELinux: ebitmap: truncated map
[  116.620450][ T7533] SELinux: ebitmap: truncated map
[  116.627924][ T7533] SELinux: ebitmap: truncated map
15:46:44 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:44 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)
fcntl$setstatus(r0, 0x4, 0x44000)

15:46:44 executing program 5:
open(0x0, 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:44 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x0, 0x0)

15:46:44 executing program 4:
r0 = eventfd(0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
poll(&(0x7f0000000040)=[{r2}, {r0, 0x4}], 0x2, 0x3f)
writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="ac01c5c096dd4787d9", 0x9}], 0x1)

15:46:44 executing program 3:
r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0)
write(r0, &(0x7f0000000040)="0600", 0x2)
write$FUSE_NOTIFY_STORE(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000f2030057088107dd14a6c3b9984688c17e940000000000000000fa9555a7b1f89f03da4de4eeadca9d78ca020fc8c4dc87e7750205bcef33b65818d108d02252bcddf3de19741c743ec57225f3fb0f4a7f4014d9f41a0ac8a37e925ab33e48291b91ef1f4aa76f52afcf8e0df19918b217a1a5c41bd0a79c5fdbdb19a9311cf38e3b50e8e350b8b30005a529d7126afd1e57adb99ccc29f077bc00ff0309f530dbf3152b9501905b074583e6c216e5eac7b85e935727c90f8696a4560b77eb2a3f68b0bab6f0ad2caccbfff8296fd153d2c40caa"], 0x2c)
sendfile(r0, r0, &(0x7f0000001000), 0xffff)
mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1, &(0x7f0000000000)=[{}]}, 0x10)

15:46:44 executing program 4:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1291, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
ioctl$KDDELIO(r0, 0x4b35, 0x8)
r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
writev(r3, &(0x7f0000000600), 0x0)
writev(r3, &(0x7f0000000440)=[{&(0x7f0000000140)='=', 0x1}], 0x1)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x1, 0xff, 0x1ff}, &(0x7f0000000180)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001000010029bd7000000d000000000000", @ANYRES32=0x0, @ANYBLOB="9308040029920000"], 0x20}}, 0x4008001)
fsetxattr$security_ima(r3, &(0x7f0000000280)='security.ima\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="03000d0000000200d6185e083ff4f5cc60df1bc3b1545df62cdffcd94e8dc835e61dde295ad328aa5d41655661b1fdc77345a5942e12f33e1759093ade79f9f0e969edbd765982ce00cf6b2b8c7f7d360c16438f7ad995fee6ddd93310ab9b1aaf67318bdda43d938daeb870195fee80b1cb7a65c6a9de77f1afb790a6c02513e207e1d927500eb8f0feff09f11970c5d17c10553ce55a4038bd9177c3032caec26005717ca8f7635301cac756dbc3d6b33d8de1a3dd8f629fbf6c855f57a5633aa38021631575aea72b263b2e542fd3a0e5d5f4d1c279cbfad931c8c0aa42"], 0xdf, 0x1)
inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x80000000)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendmsg$NLBL_UNLABEL_C_LIST(r5, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x64, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bond\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_team\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team_slave_1\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x44}, 0x0)
r6 = inotify_init()
inotify_add_watch(r6, &(0x7f00000000c0)='./file0\x00', 0x80000000)
write$9p(r0, &(0x7f0000001400)="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", 0x600)
sendfile(r0, r1, 0x0, 0x1c500)
ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000400)='syz1\x00')
creat(&(0x7f0000000240)='./file0\x00', 0x28)

[  117.036967][ T7544] SELinux: ebitmap: truncated map
[  117.045896][ T7544] SELinux: ebitmap: truncated map
[  117.058713][   T22] audit: type=1326 audit(1580485604.536:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:46:44 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4cdf8f6a155d0fced9f782c08710500000000000061105200000000000500f200000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48)
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0)
recvfrom$unix(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x2102, &(0x7f00000010c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e)

15:46:44 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x0, 0x0)

[  117.093888][   T22] audit: type=1326 audit(1580485604.576:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  117.103503][ T7544] SELinux: ebitmap: truncated map
15:46:44 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r2 = dup3(r1, r0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x406, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8)

[  117.119911][   T22] audit: type=1326 audit(1580485604.576:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  117.150096][   T22] audit: type=1326 audit(1580485604.576:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
15:46:44 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:44 executing program 5:
open(0x0, 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  117.175527][   T22] audit: type=1326 audit(1580485604.576:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  117.201053][   T22] audit: type=1326 audit(1580485604.576:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
15:46:44 executing program 3:
syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a6ffffff00090000ff07000080ffffffbfffffff0000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}])
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000040))

[  117.281282][   T22] audit: type=1326 audit(1580485604.766:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7569 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  117.295988][ T7576] SELinux: ebitmap: truncated map
15:46:44 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x0, 0x0)

15:46:44 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x406, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  117.318517][   T22] audit: type=1326 audit(1580485604.796:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7569 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  117.335773][ T7576] SELinux: ebitmap: truncated map
[  117.346145][   T22] audit: type=1326 audit(1580485604.796:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7569 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  117.359702][ T7576] SELinux: ebitmap: truncated map
15:46:44 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:44 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:44 executing program 2 (fault-call:4 fault-nth:0):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  117.425225][ T7591] SELinux: ebitmap: truncated map
[  117.431627][ T7591] SELinux: ebitmap: truncated map
[  117.470621][ T7591] SELinux: ebitmap: truncated map
[  117.494013][ T7592]  loop3: p1 p2 p3
[  117.509469][ T7592] loop3: p1 start 2304 is beyond EOD, truncated
[  117.516489][ T7592] loop3: p2 start 16777216 is beyond EOD, truncated
[  117.519652][ T7608] FAULT_INJECTION: forcing a failure.
[  117.519652][ T7608] name failslab, interval 1, probability 0, space 0, times 1
[  117.524164][ T7592] loop3: p3 start 128 is beyond EOD, truncated
15:46:45 executing program 4:
ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608)
clone(0x30aa2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

15:46:45 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x406, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)

[  117.539392][ T7608] CPU: 0 PID: 7608 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  117.552001][ T7608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  117.562106][ T7608] Call Trace:
[  117.565424][ T7608]  dump_stack+0x1b0/0x228
[  117.569744][ T7608]  ? devkmsg_release+0x127/0x127
[  117.574682][ T7608]  ? show_regs_print_info+0x18/0x18
[  117.579888][ T7608]  ? audit_log_end+0x1c6/0x230
[  117.584629][ T7608]  ? __kasan_slab_free+0x1e2/0x220
[  117.589720][ T7608]  ? __kasan_slab_free+0x168/0x220
[  117.594871][ T7608]  should_fail+0x6fb/0x860
[  117.599275][ T7608]  ? setup_fault_attr+0x2b0/0x2b0
[  117.604278][ T7608]  ? audit_filter+0xeb9/0xf20
[  117.608946][ T7608]  __should_failslab+0x11a/0x160
[  117.613936][ T7608]  ? audit_log_start+0x475/0x9a0
[  117.618859][ T7608]  should_failslab+0x9/0x20
[  117.623348][ T7608]  kmem_cache_alloc+0x37/0x2b0
[  117.628099][ T7608]  audit_log_start+0x475/0x9a0
[  117.632851][ T7608]  ? audit_serial+0x30/0x30
[  117.637338][ T7608]  ? kstrtoull+0x3c4/0x4e0
[  117.641734][ T7608]  ? kstrtouint_from_user+0x1cb/0x230
[  117.647095][ T7608]  ? kstrtol_from_user+0x180/0x180
[  117.652199][ T7608]  ? __rcu_read_lock+0x50/0x50
[  117.656943][ T7608]  audit_seccomp+0x62/0x180
[  117.661430][ T7608]  __seccomp_filter+0xd15/0x1890
[  117.666470][ T7608]  ? proc_fail_nth_read+0x1c0/0x1c0
[  117.671651][ T7608]  ? __secure_computing+0x240/0x240
[  117.676831][ T7608]  ? expand_files+0xd1/0x970
[  117.681399][ T7608]  ? memset+0x31/0x40
[  117.685362][ T7608]  ? fsnotify+0x1390/0x1450
[  117.689854][ T7608]  ? __kernel_write+0x350/0x350
[  117.694728][ T7608]  ? avc_policy_seqno+0x1b/0x70
[  117.699571][ T7608]  ? __fsnotify_parent+0x300/0x300
[  117.704672][ T7608]  ? security_file_permission+0x157/0x350
[  117.710382][ T7608]  ? rw_verify_area+0x1c2/0x360
[  117.715213][ T7608]  __secure_computing+0x1c6/0x240
[  117.720222][ T7608]  syscall_trace_enter+0x596/0xa90
[  117.725541][ T7608]  ? switch_fpu_return+0x10/0x10
[  117.730478][ T7608]  ? do_syscall_64+0x100/0x100
[  117.735661][ T7608]  ? syscall_return_slowpath+0x6f/0x500
[  117.741544][ T7608]  do_syscall_64+0x6b/0x100
[  117.746041][ T7608]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  117.752264][ T7608] RIP: 0033:0x45b349
[  117.756331][ T7608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  117.776543][ T7608] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  117.784948][ T7608] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
15:46:45 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:45 executing program 2 (fault-call:4 fault-nth:1):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  117.793254][ T7608] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  117.801906][ T7608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  117.809952][ T7608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  117.818317][ T7608] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000000
15:46:45 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x406, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)

15:46:45 executing program 4:
socket$unix(0x1, 0x2, 0x0)
socket$unix(0x1, 0x1, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = socket(0x10, 0x803, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
getsockopt$inet6_tcp_buf(r4, 0x6, 0x1a, 0x0, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c)
getpid()
ptrace(0xffffffffffffffff, 0x0)
sendto$inet(r4, &(0x7f00000000c0)="c51548ad6cb9305f14520f2b9b9ef8df697f1bba059fcc86edd26bd37b5c7d07d8ecbf3408e8d2466d56edc515e172", 0x2f, 0x1, &(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x1}, 0x10)
ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x4)
getpgid(0x0)
ptrace$getregset(0x4204, 0x0, 0x0, 0x0)
sendmsg$key(0xffffffffffffffff, 0x0, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
sendto$inet6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0)
waitid(0x0, 0x0, 0x0, 0x0, 0x0)
socket(0x0, 0x0, 0x0)
sendto$inet6(r1, &(0x7f00000002c0)='#', 0x1, 0x40001, &(0x7f0000000240)={0xa, 0x4e22, 0x6, @loopback, 0x3}, 0x1c)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xef)
close(r1)

[  117.874660][ T7618] SELinux: ebitmap: truncated map
[  117.881535][ T7618] SELinux: ebitmap: truncated map
[  117.881990][ T7621] FAULT_INJECTION: forcing a failure.
[  117.881990][ T7621] name failslab, interval 1, probability 0, space 0, times 0
[  117.899641][ T7621] CPU: 1 PID: 7621 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  117.909884][ T7621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  117.920552][ T7621] Call Trace:
[  117.923858][ T7621]  dump_stack+0x1b0/0x228
[  117.928183][ T7621]  ? devkmsg_release+0x127/0x127
[  117.933108][ T7621]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  117.939161][ T7621]  ? show_regs_print_info+0x18/0x18
[  117.944339][ T7621]  ? syscall_trace_enter+0x596/0xa90
[  117.949638][ T7621]  should_fail+0x6fb/0x860
[  117.954054][ T7621]  ? setup_fault_attr+0x2b0/0x2b0
[  117.959071][ T7621]  ? __seccomp_filter+0xd15/0x1890
[  117.964173][ T7621]  ? __secure_computing+0x1c6/0x240
[  117.969409][ T7621]  ? syscall_trace_enter+0x596/0xa90
[  117.974678][ T7621]  ? should_fail+0x182/0x860
[  117.979250][ T7621]  ? ptr_to_hashval+0x90/0x90
[  117.983908][ T7621]  __should_failslab+0x11a/0x160
[  117.988829][ T7621]  ? __alloc_skb+0xbc/0x540
[  117.993373][ T7621]  should_failslab+0x9/0x20
[  117.997862][ T7621]  kmem_cache_alloc+0x37/0x2b0
[  118.002617][ T7621]  __alloc_skb+0xbc/0x540
[  118.007034][ T7621]  ? kmem_cache_alloc+0x120/0x2b0
[  118.012059][ T7621]  audit_log_start+0x4a1/0x9a0
[  118.016811][ T7621]  ? audit_serial+0x30/0x30
[  118.021304][ T7621]  ? kstrtoull+0x3c4/0x4e0
[  118.025717][ T7621]  ? kstrtouint_from_user+0x1cb/0x230
[  118.031080][ T7621]  ? kstrtol_from_user+0x180/0x180
[  118.036173][ T7621]  ? __rcu_read_lock+0x50/0x50
[  118.041110][ T7621]  audit_seccomp+0x62/0x180
[  118.045634][ T7621]  __seccomp_filter+0xd15/0x1890
[  118.050573][ T7621]  ? proc_fail_nth_read+0x1c0/0x1c0
[  118.056026][ T7621]  ? __secure_computing+0x240/0x240
[  118.061467][ T7621]  ? expand_files+0xd1/0x970
[  118.066036][ T7621]  ? memset+0x31/0x40
[  118.070005][ T7621]  ? fsnotify+0x1390/0x1450
[  118.074656][ T7621]  ? __kernel_write+0x350/0x350
[  118.079490][ T7621]  ? avc_policy_seqno+0x1b/0x70
[  118.084325][ T7621]  ? __fsnotify_parent+0x300/0x300
[  118.089833][ T7621]  ? security_file_permission+0x157/0x350
[  118.095603][ T7621]  ? rw_verify_area+0x1c2/0x360
[  118.100556][ T7621]  __secure_computing+0x1c6/0x240
[  118.105593][ T7621]  syscall_trace_enter+0x596/0xa90
[  118.110740][ T7621]  ? do_syscall_64+0x100/0x100
[  118.115502][ T7621]  ? syscall_return_slowpath+0x6f/0x500
[  118.121176][ T7621]  do_syscall_64+0x6b/0x100
[  118.125676][ T7621]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  118.131923][ T7621] RIP: 0033:0x45b349
[  118.135818][ T7621] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  118.156001][ T7621] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  118.164492][ T7621] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  118.172647][ T7621] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  118.180704][ T7621] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  118.188660][ T7621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  118.196640][ T7621] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000001
15:46:45 executing program 3:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b73", 0x1c8)
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=<r5=>0x0)
fcntl$setown(r4, 0x8, r5)
sendfile(r1, r2, 0x0, 0x1c500)

15:46:45 executing program 2 (fault-call:4 fault-nth:2):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:45 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:45 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:45 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x406, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r6, 0x0, r6)

[  118.316807][ T7638] SELinux: ebitmap: truncated map
[  118.322420][ T7638] sel_write_load: 38 callbacks suppressed
[  118.322423][ T7638] SELinux: failed to load policy
[  118.333538][ T7638] SELinux: ebitmap: truncated map
[  118.338892][ T7638] SELinux: failed to load policy
[  118.396757][ T7659] SELinux: ebitmap: truncated map
[  118.401566][ T7651] FAULT_INJECTION: forcing a failure.
[  118.401566][ T7651] name failslab, interval 1, probability 0, space 0, times 0
[  118.403206][ T7659] SELinux: failed to load policy
15:46:45 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  118.442953][ T7655] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17)
[  118.451548][ T7665] SELinux: ebitmap: truncated map
[  118.452624][ T7651] CPU: 1 PID: 7651 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  118.457014][ T7655] FAT-fs (loop3): Filesystem has been set read-only
[  118.466923][ T7651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  118.466927][ T7651] Call Trace:
[  118.466947][ T7651]  dump_stack+0x1b0/0x228
15:46:45 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x406, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r6, 0x0, r6)

[  118.466958][ T7651]  ? devkmsg_release+0x127/0x127
[  118.466966][ T7651]  ? __seccomp_filter+0xd15/0x1890
[  118.466974][ T7651]  ? show_regs_print_info+0x18/0x18
[  118.466985][ T7651]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  118.466993][ T7651]  ? syscall_trace_enter+0x596/0xa90
[  118.467001][ T7651]  should_fail+0x6fb/0x860
[  118.467016][ T7651]  ? setup_fault_attr+0x2b0/0x2b0
[  118.474085][ T7665] SELinux: failed to load policy
[  118.483959][ T7651]  ? kasan_slab_free+0xe/0x10
[  118.483973][ T7651]  ? setup_fault_attr+0x2b0/0x2b0
[  118.483982][ T7651]  ? __seccomp_filter+0xd15/0x1890
[  118.483992][ T7651]  ? _raw_spin_unlock+0x9/0x20
[  118.484001][ T7651]  __should_failslab+0x11a/0x160
[  118.484009][ T7651]  ? audit_log_start+0x4a1/0x9a0
[  118.484022][ T7651]  should_failslab+0x9/0x20
[  118.571395][ T7651]  __kmalloc_track_caller+0x5f/0x320
[  118.576729][ T7651]  ? kmem_cache_alloc+0x120/0x2b0
[  118.581828][ T7651]  ? audit_log_start+0x4a1/0x9a0
[  118.586936][ T7651]  __alloc_skb+0x109/0x540
[  118.591341][ T7651]  audit_log_start+0x4a1/0x9a0
[  118.596405][ T7651]  ? audit_serial+0x30/0x30
[  118.601011][ T7651]  ? kstrtoull+0x3c4/0x4e0
[  118.605451][ T7651]  ? kstrtouint_from_user+0x1cb/0x230
[  118.610806][ T7651]  ? kstrtol_from_user+0x180/0x180
[  118.615997][ T7651]  ? __rcu_read_lock+0x50/0x50
[  118.620741][ T7651]  audit_seccomp+0x62/0x180
[  118.625226][ T7651]  __seccomp_filter+0xd15/0x1890
[  118.630145][ T7651]  ? proc_fail_nth_read+0x1c0/0x1c0
[  118.635375][ T7651]  ? __secure_computing+0x240/0x240
[  118.640561][ T7651]  ? expand_files+0xd1/0x970
[  118.645203][ T7651]  ? memset+0x31/0x40
[  118.649167][ T7651]  ? fsnotify+0x1390/0x1450
[  118.653651][ T7651]  ? __kernel_write+0x350/0x350
[  118.658483][ T7651]  ? avc_policy_seqno+0x1b/0x70
[  118.663363][ T7651]  ? __fsnotify_parent+0x300/0x300
[  118.668517][ T7651]  ? security_file_permission+0x157/0x350
[  118.674220][ T7651]  ? rw_verify_area+0x1c2/0x360
[  118.679075][ T7651]  __secure_computing+0x1c6/0x240
[  118.684088][ T7651]  syscall_trace_enter+0x596/0xa90
[  118.689177][ T7651]  ? do_syscall_64+0x100/0x100
[  118.693920][ T7651]  ? syscall_return_slowpath+0x6f/0x500
[  118.699446][ T7651]  do_syscall_64+0x6b/0x100
[  118.703930][ T7651]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  118.709799][ T7651] RIP: 0033:0x45b349
[  118.713722][ T7651] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  118.733321][ T7651] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
15:46:46 executing program 3:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b73", 0x1c8)
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=<r5=>0x0)
fcntl$setown(r4, 0x8, r5)
sendfile(r1, r2, 0x0, 0x1c500)

15:46:46 executing program 2 (fault-call:4 fault-nth:3):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  118.741762][ T7651] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  118.749714][ T7651] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  118.758005][ T7651] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  118.766047][ T7651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  118.774018][ T7651] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000002
15:46:46 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:46 executing program 4:
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
setsockopt$inet_udp_int(r3, 0x11, 0xb, &(0x7f0000000180)=0xa33, 0x4)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
write$binfmt_misc(r1, &(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYRESDEC=r5, @ANYRESOCT, @ANYRES16=r4, @ANYRESOCT=0x0, @ANYRES16, @ANYBLOB="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"], 0x26b)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
setsockopt$packet_buf(r7, 0x107, 0x5, &(0x7f00000001c0)="23ddd6f5805b6bd8da8fd2f5a671be74eb61076128e088f56ee83098c6789bdacffb9633962914d199bda0113d652392566c047b3908e87ad56682523d84fa6d5b1711c3fce376c77b2909ca1fa6096bc84f796d9e7e86f0dc82b603ff47be77163684109065e1b8cff6a311f5220263b82b177b8da90be171dfa38f686a0bd2bb68a771e30d9d90013b242a151cdc3200ac811ce2619d84610858bf5c75d12fd7948ceb150299491912c7ae6381c266474130a310c2fc63660ca71a270de1bd7465773346dffcdf5abc5ae1b986a1cb", 0xd0)
splice(r0, 0x0, r2, 0x0, 0x30005, 0x0)

[  118.863932][ T7686] SELinux: ebitmap: truncated map
[  118.869412][ T7686] SELinux: failed to load policy
[  118.875296][ T7688] SELinux: ebitmap: truncated map
[  118.881840][ T7687] FAULT_INJECTION: forcing a failure.
[  118.881840][ T7687] name failslab, interval 1, probability 0, space 0, times 0
[  118.894507][ T7687] CPU: 1 PID: 7687 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  118.904582][ T7687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  118.911869][ T7688] SELinux: failed to load policy
[  118.914625][ T7687] Call Trace:
[  118.914643][ T7687]  dump_stack+0x1b0/0x228
[  118.914659][ T7687]  ? devkmsg_release+0x127/0x127
[  118.920062][ T7686] SELinux: ebitmap: truncated map
[  118.922852][ T7687]  ? number+0xeac/0x1170
[  118.922863][ T7687]  ? show_regs_print_info+0x18/0x18
[  118.922878][ T7687]  ? put_dec_trunc8+0x1c4/0x2d0
[  118.927587][ T7686] SELinux: failed to load policy
[  118.932118][ T7687]  should_fail+0x6fb/0x860
15:46:46 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:46 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x406, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
socket$unix(0x1, 0x2, 0x0)

[  118.932128][ T7687]  ? setup_fault_attr+0x2b0/0x2b0
[  118.932137][ T7687]  ? find_next_bit+0xd8/0x120
[  118.932147][ T7687]  __should_failslab+0x11a/0x160
[  118.932157][ T7687]  ? context_struct_to_string+0x3b5/0x7f0
[  118.932171][ T7687]  should_failslab+0x9/0x20
[  118.938728][ T7688] SELinux: ebitmap: truncated map
[  118.941432][ T7687]  __kmalloc+0x64/0x310
[  118.941445][ T7687]  context_struct_to_string+0x3b5/0x7f0
[  118.941458][ T7687]  ? security_bounded_transition+0x520/0x520
[  118.941466][ T7687]  ? sidtab_search+0x194/0x3a0
15:46:46 executing program 2 (fault-call:4 fault-nth:4):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  118.941475][ T7687]  security_sid_to_context_core+0x259/0x380
[  118.941488][ T7687]  security_sid_to_context+0x33/0x40
[  118.949411][ T7688] SELinux: failed to load policy
[  118.951547][ T7687]  selinux_secid_to_secctx+0x2a/0x40
[  118.951558][ T7687]  security_secid_to_secctx+0x66/0xd0
[  118.951574][ T7687]  audit_log_task_context+0xf0/0x2d0
[  118.957166][ T7692] SELinux:  policydb magic number 0x2 does not match expected magic number 0xf97cff8c
[  118.961015][ T7687]  ? audit_log_key+0x140/0x140
[  118.961023][ T7687]  ? audit_serial+0x30/0x30
[  118.961032][ T7687]  audit_log_task+0x17d/0x2e0
[  118.961040][ T7687]  ? audit_core_dumps+0x100/0x100
[  118.961048][ T7687]  ? kstrtol_from_user+0x180/0x180
[  118.961069][ T7687]  ? __rcu_read_lock+0x50/0x50
[  118.961076][ T7687]  audit_seccomp+0x83/0x180
[  118.961083][ T7687]  __seccomp_filter+0xd15/0x1890
[  118.961092][ T7687]  ? proc_fail_nth_read+0x1c0/0x1c0
[  118.961098][ T7687]  ? __secure_computing+0x240/0x240
[  118.961105][ T7687]  ? expand_files+0xd1/0x970
15:46:46 executing program 4:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x7e, 0xff, 0x0, 0x3, 0x0, 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4)
r0 = dup(0xffffffffffffffff)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6)
r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
writev(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
fchdir(r3)
inotify_init()
r4 = inotify_init()
inotify_add_watch(r4, &(0x7f00000000c0)='./file0\x00', 0x80000000)
write$9p(r1, &(0x7f0000001400)="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", 0x600)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
r5 = socket(0x0, 0x80002, 0x0)
open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
connect$netlink(r5, &(0x7f00000014c0)=@proc, 0xc)
getpeername$packet(r5, 0x0, 0x0)
sendfile(r1, r2, 0x0, 0x1c500)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f0000000140)=""/240)

[  118.961112][ T7687]  ? memset+0x31/0x40
[  118.961119][ T7687]  ? fsnotify+0x1390/0x1450
[  118.961127][ T7687]  ? __kernel_write+0x350/0x350
[  118.961134][ T7687]  ? avc_policy_seqno+0x1b/0x70
[  118.961143][ T7687]  ? __fsnotify_parent+0x300/0x300
[  118.961151][ T7687]  ? security_file_permission+0x157/0x350
[  118.961164][ T7687]  ? rw_verify_area+0x1c2/0x360
[  118.977264][ T7692] SELinux: failed to load policy
[  118.981515][ T7687]  __secure_computing+0x1c6/0x240
[  118.981527][ T7687]  syscall_trace_enter+0x596/0xa90
[  118.981538][ T7687]  ? switch_fpu_return+0x10/0x10
[  118.981546][ T7687]  ? do_syscall_64+0x100/0x100
[  118.981553][ T7687]  ? syscall_return_slowpath+0x6f/0x500
[  118.981564][ T7687]  do_syscall_64+0x6b/0x100
[  118.981584][ T7687]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  118.991762][ T7686] SELinux:  policydb magic number 0x2 does not match expected magic number 0xf97cff8c
[  118.995312][ T7687] RIP: 0033:0x45b349
[  118.995321][ T7687] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  118.995326][ T7687] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  118.995334][ T7687] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  118.995338][ T7687] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  118.995342][ T7687] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  118.995352][ T7687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  119.003625][ T7686] SELinux: failed to load policy
[  119.007857][ T7687] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000003
[  119.118223][ T7705] FAULT_INJECTION: forcing a failure.
[  119.118223][ T7705] name failslab, interval 1, probability 0, space 0, times 0
[  119.286439][ T7705] CPU: 0 PID: 7705 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  119.296502][ T7705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  119.306553][ T7705] Call Trace:
[  119.309835][ T7705]  dump_stack+0x1b0/0x228
[  119.314144][ T7705]  ? devkmsg_release+0x127/0x127
[  119.319060][ T7705]  ? show_regs_print_info+0x18/0x18
[  119.324365][ T7705]  ? audit_log_format+0x110/0x110
[  119.329385][ T7705]  should_fail+0x6fb/0x860
[  119.333841][ T7705]  ? setup_fault_attr+0x2b0/0x2b0
[  119.338845][ T7705]  ? audit_log_format+0xc8/0x110
[  119.343798][ T7705]  ? __rcu_read_lock+0x50/0x50
[  119.348558][ T7705]  __should_failslab+0x11a/0x160
[  119.353488][ T7705]  ? audit_log_d_path+0xc2/0x260
[  119.358419][ T7705]  should_failslab+0x9/0x20
[  119.362918][ T7705]  kmem_cache_alloc_trace+0x3a/0x2f0
[  119.368230][ T7705]  audit_log_d_path+0xc2/0x260
[  119.372993][ T7705]  audit_log_d_path_exe+0x42/0x70
[  119.378005][ T7705]  audit_log_task+0x201/0x2e0
[  119.382674][ T7705]  ? audit_core_dumps+0x100/0x100
[  119.387687][ T7705]  ? kstrtol_from_user+0x180/0x180
[  119.392823][ T7705]  ? __rcu_read_lock+0x50/0x50
[  119.397708][ T7705]  audit_seccomp+0x83/0x180
[  119.402212][ T7705]  __seccomp_filter+0xd15/0x1890
[  119.407145][ T7705]  ? proc_fail_nth_read+0x1c0/0x1c0
[  119.412325][ T7705]  ? __secure_computing+0x240/0x240
[  119.417514][ T7705]  ? expand_files+0xd1/0x970
[  119.422099][ T7705]  ? memset+0x31/0x40
[  119.426070][ T7705]  ? fsnotify+0x1390/0x1450
[  119.430569][ T7705]  ? __kernel_write+0x350/0x350
[  119.435412][ T7705]  ? avc_policy_seqno+0x1b/0x70
[  119.440253][ T7705]  ? __fsnotify_parent+0x300/0x300
[  119.445359][ T7705]  ? security_file_permission+0x157/0x350
[  119.451070][ T7705]  ? rw_verify_area+0x1c2/0x360
[  119.455916][ T7705]  __secure_computing+0x1c6/0x240
[  119.460948][ T7705]  syscall_trace_enter+0x596/0xa90
[  119.466058][ T7705]  ? switch_fpu_return+0x10/0x10
[  119.470984][ T7705]  ? do_syscall_64+0x100/0x100
[  119.475746][ T7705]  ? syscall_return_slowpath+0x6f/0x500
[  119.481277][ T7705]  do_syscall_64+0x6b/0x100
[  119.485789][ T7705]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  119.491788][ T7705] RIP: 0033:0x45b349
[  119.495673][ T7705] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  119.515394][ T7705] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  119.523916][ T7705] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  119.531886][ T7705] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  119.539858][ T7705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  119.547827][ T7705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  119.555787][ T7705] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000004
15:46:47 executing program 2 (fault-call:4 fault-nth:5):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:47 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x406, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)

[  119.568594][ T7711] SELinux: ebitmap: truncated map
[  119.578412][ T7711] SELinux: ebitmap: truncated map
15:46:47 executing program 3:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
write$9p(r1, &(0x7f0000001400)="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", 0x1c8)
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=<r5=>0x0)
fcntl$setown(r4, 0x8, r5)
sendfile(r1, r2, 0x0, 0x1c500)

15:46:47 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:47 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  119.721677][ T7724] SELinux: ebitmap: truncated map
[  119.729325][ T7723] FAULT_INJECTION: forcing a failure.
[  119.729325][ T7723] name failslab, interval 1, probability 0, space 0, times 0
[  119.741971][ T7723] CPU: 0 PID: 7723 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  119.748843][ T7724] SELinux: ebitmap: truncated map
[  119.752021][ T7723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  119.752024][ T7723] Call Trace:
15:46:47 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r4, 0x406, r4)

[  119.752041][ T7723]  dump_stack+0x1b0/0x228
[  119.752052][ T7723]  ? devkmsg_release+0x127/0x127
[  119.752060][ T7723]  ? stack_trace_save+0x111/0x1e0
[  119.752069][ T7723]  ? show_regs_print_info+0x18/0x18
[  119.752077][ T7723]  ? stack_trace_snprint+0x150/0x150
[  119.752088][ T7723]  should_fail+0x6fb/0x860
[  119.752097][ T7723]  ? setup_fault_attr+0x2b0/0x2b0
[  119.752104][ T7723]  ? __kasan_slab_free+0x1e2/0x220
[  119.752111][ T7723]  ? __kasan_slab_free+0x168/0x220
[  119.752117][ T7723]  ? kasan_slab_free+0xe/0x10
[  119.752126][ T7723]  ? audit_log_end+0x1c6/0x230
[  119.752133][ T7723]  ? audit_seccomp+0x143/0x180
[  119.752145][ T7723]  ? __seccomp_filter+0xd15/0x1890
[  119.834336][ T7723]  __should_failslab+0x11a/0x160
[  119.839263][ T7723]  ? ebitmap_cpy+0x81/0x2f0
[  119.843758][ T7723]  should_failslab+0x9/0x20
[  119.848288][ T7723]  kmem_cache_alloc+0x37/0x2b0
[  119.853051][ T7723]  ebitmap_cpy+0x81/0x2f0
[  119.857370][ T7723]  mls_compute_sid+0x4c2/0x1310
[  119.862208][ T7723]  ? mls_convert_context+0x7e0/0x7e0
[  119.867487][ T7723]  ? avtab_search_node+0x4e2/0x5e0
[  119.872576][ T7723]  security_compute_sid+0xe80/0x1be0
[  119.877850][ T7723]  ? security_transition_sid+0x90/0x90
[  119.883307][ T7723]  ? audit_log_end+0x1c6/0x230
[  119.888049][ T7723]  ? audit_seccomp+0x143/0x180
[  119.892928][ T7723]  ? __seccomp_filter+0xd15/0x1890
[  119.898018][ T7723]  ? memset+0x31/0x40
[  119.901996][ T7723]  security_transition_sid+0x7d/0x90
[  119.907445][ T7723]  selinux_socket_create+0x1e1/0x2f0
[  119.912711][ T7723]  ? selinux_socket_unix_may_send+0x2d0/0x2d0
[  119.918876][ T7723]  security_socket_create+0x69/0xd0
[  119.924054][ T7723]  __sock_create+0xd6/0x7b0
[  119.928544][ T7723]  ? __kasan_check_read+0x11/0x20
[  119.933548][ T7723]  ? syscall_trace_enter+0x683/0xa90
[  119.938827][ T7723]  __sys_socket+0x115/0x350
[  119.943311][ T7723]  ? sock_create_kern+0x50/0x50
[  119.948151][ T7723]  __x64_sys_socket+0x7a/0x90
[  119.952809][ T7723]  do_syscall_64+0xc0/0x100
[  119.957293][ T7723]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  119.963170][ T7723] RIP: 0033:0x45b349
[  119.967053][ T7723] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  119.986752][ T7723] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  119.995932][ T7723] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  120.003902][ T7723] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  120.011863][ T7723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
15:46:47 executing program 2 (fault-call:4 fault-nth:6):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  120.019841][ T7723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  120.027853][ T7723] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000005
15:46:47 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
socket$unix(0x1, 0x2, 0x0)

15:46:47 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  120.104408][ T7747] SELinux: ebitmap: truncated map
[  120.110356][ T7747] SELinux: ebitmap: truncated map
15:46:47 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  120.182872][ T7754] FAULT_INJECTION: forcing a failure.
[  120.182872][ T7754] name failslab, interval 1, probability 0, space 0, times 0
[  120.192087][ T7760] SELinux: ebitmap: truncated map
[  120.195533][ T7754] CPU: 0 PID: 7754 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  120.195539][ T7754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  120.195548][ T7754] Call Trace:
[  120.202858][ T7760] SELinux: ebitmap: truncated map
15:46:47 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc}]}]}]}, 0x3c}}, 0x0)

[  120.210740][ T7754]  dump_stack+0x1b0/0x228
[  120.210752][ T7754]  ? devkmsg_release+0x127/0x127
[  120.210759][ T7754]  ? stack_trace_save+0x111/0x1e0
[  120.210768][ T7754]  ? show_regs_print_info+0x18/0x18
[  120.210775][ T7754]  ? stack_trace_snprint+0x150/0x150
[  120.210792][ T7754]  should_fail+0x6fb/0x860
[  120.210802][ T7754]  ? setup_fault_attr+0x2b0/0x2b0
[  120.210811][ T7754]  ? __kasan_slab_free+0x1e2/0x220
[  120.210817][ T7754]  ? __kasan_slab_free+0x168/0x220
[  120.210823][ T7754]  ? kasan_slab_free+0xe/0x10
[  120.210838][ T7754]  ? audit_log_end+0x1c6/0x230
[  120.283214][ T7754]  ? audit_seccomp+0x143/0x180
[  120.287971][ T7754]  ? __seccomp_filter+0xd15/0x1890
[  120.293082][ T7754]  __should_failslab+0x11a/0x160
[  120.298016][ T7754]  ? ebitmap_cpy+0x81/0x2f0
[  120.302514][ T7754]  should_failslab+0x9/0x20
[  120.307007][ T7754]  kmem_cache_alloc+0x37/0x2b0
[  120.311774][ T7754]  ebitmap_cpy+0x81/0x2f0
[  120.316237][ T7754]  mls_compute_sid+0x4c2/0x1310
[  120.321077][ T7754]  ? mls_convert_context+0x7e0/0x7e0
[  120.326557][ T7754]  ? avtab_search_node+0x4e2/0x5e0
[  120.331670][ T7754]  security_compute_sid+0xe80/0x1be0
[  120.336946][ T7754]  ? security_transition_sid+0x90/0x90
[  120.342384][ T7754]  ? audit_log_end+0x1c6/0x230
[  120.347135][ T7754]  ? audit_seccomp+0x143/0x180
[  120.351913][ T7754]  ? __seccomp_filter+0xd15/0x1890
[  120.357017][ T7754]  ? memset+0x31/0x40
[  120.360988][ T7754]  security_transition_sid+0x7d/0x90
[  120.366260][ T7754]  selinux_socket_create+0x1e1/0x2f0
[  120.371534][ T7754]  ? selinux_socket_unix_may_send+0x2d0/0x2d0
[  120.377591][ T7754]  security_socket_create+0x69/0xd0
[  120.382780][ T7754]  __sock_create+0xd6/0x7b0
[  120.387277][ T7754]  ? __kasan_check_read+0x11/0x20
[  120.392297][ T7754]  ? syscall_trace_enter+0x683/0xa90
[  120.397632][ T7754]  __sys_socket+0x115/0x350
[  120.402125][ T7754]  ? sock_create_kern+0x50/0x50
[  120.406966][ T7754]  __x64_sys_socket+0x7a/0x90
[  120.411636][ T7754]  do_syscall_64+0xc0/0x100
[  120.416133][ T7754]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  120.422115][ T7754] RIP: 0033:0x45b349
[  120.425994][ T7754] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  120.445592][ T7754] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  120.454001][ T7754] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  120.461967][ T7754] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  120.469930][ T7754] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  120.477881][ T7754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  120.485832][ T7754] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000006
15:46:48 executing program 4:
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r0, @ANYRESHEX, @ANYBLOB="dc4a0be47e736c65dd41d4bbd20a98bf88729f9212c609509b188ebb00efc599e43cc047c7164b7459d952195fa33e5a49c150040891", @ANYRESDEC=r1], 0x5}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103c56c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

15:46:48 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:48 executing program 2 (fault-call:4 fault-nth:7):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:48 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  120.559223][ T7727] syz-executor.4 (7727) used greatest stack depth: 18712 bytes left
[  120.586675][ T7778] SELinux: ebitmap: truncated map
[  120.587767][ T7777] FAULT_INJECTION: forcing a failure.
[  120.587767][ T7777] name failslab, interval 1, probability 0, space 0, times 0
[  120.593006][ T7778] SELinux: ebitmap: truncated map
15:46:48 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)

[  120.604437][ T7777] CPU: 1 PID: 7777 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  120.619481][ T7777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  120.629522][ T7777] Call Trace:
[  120.632798][ T7777]  dump_stack+0x1b0/0x228
[  120.637115][ T7777]  ? devkmsg_release+0x127/0x127
[  120.642031][ T7777]  ? stack_trace_save+0x111/0x1e0
[  120.647185][ T7777]  ? show_regs_print_info+0x18/0x18
[  120.652382][ T7777]  ? stack_trace_snprint+0x150/0x150
[  120.657667][ T7777]  should_fail+0x6fb/0x860
[  120.662065][ T7777]  ? setup_fault_attr+0x2b0/0x2b0
[  120.667097][ T7777]  ? __kasan_slab_free+0x1e2/0x220
[  120.672188][ T7777]  ? __kasan_slab_free+0x168/0x220
[  120.677272][ T7777]  ? kasan_slab_free+0xe/0x10
[  120.681927][ T7777]  ? audit_log_end+0x1c6/0x230
[  120.686670][ T7777]  ? audit_seccomp+0x143/0x180
[  120.691408][ T7777]  ? __seccomp_filter+0xd15/0x1890
[  120.696523][ T7777]  __should_failslab+0x11a/0x160
[  120.701448][ T7777]  ? ebitmap_cpy+0x81/0x2f0
[  120.705933][ T7777]  should_failslab+0x9/0x20
[  120.710421][ T7777]  kmem_cache_alloc+0x37/0x2b0
[  120.715168][ T7777]  ebitmap_cpy+0x81/0x2f0
[  120.719599][ T7777]  mls_compute_sid+0x4c2/0x1310
[  120.724443][ T7777]  ? mls_convert_context+0x7e0/0x7e0
[  120.729719][ T7777]  ? avtab_search_node+0x4e2/0x5e0
[  120.734879][ T7777]  security_compute_sid+0xe80/0x1be0
[  120.740151][ T7777]  ? security_transition_sid+0x90/0x90
[  120.745595][ T7777]  ? audit_log_end+0x1c6/0x230
[  120.750481][ T7777]  ? audit_seccomp+0x143/0x180
[  120.755229][ T7777]  ? __seccomp_filter+0xd15/0x1890
[  120.760328][ T7777]  ? memset+0x31/0x40
[  120.764298][ T7777]  security_transition_sid+0x7d/0x90
[  120.769577][ T7777]  selinux_socket_create+0x1e1/0x2f0
[  120.774841][ T7777]  ? selinux_socket_unix_may_send+0x2d0/0x2d0
[  120.780893][ T7777]  security_socket_create+0x69/0xd0
[  120.786199][ T7777]  __sock_create+0xd6/0x7b0
[  120.790692][ T7777]  ? __kasan_check_read+0x11/0x20
[  120.795758][ T7777]  ? syscall_trace_enter+0x683/0xa90
[  120.801101][ T7777]  __sys_socket+0x115/0x350
[  120.805590][ T7777]  ? sock_create_kern+0x50/0x50
[  120.810421][ T7777]  __x64_sys_socket+0x7a/0x90
[  120.815189][ T7777]  do_syscall_64+0xc0/0x100
[  120.819684][ T7777]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  120.825555][ T7777] RIP: 0033:0x45b349
[  120.829428][ T7777] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  120.849122][ T7777] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
15:46:48 executing program 2 (fault-call:4 fault-nth:8):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:48 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  120.857517][ T7777] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  120.865469][ T7777] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  120.873466][ T7777] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  120.881420][ T7777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  120.889414][ T7777] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000007
15:46:48 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:48 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  120.950430][ T7791] SELinux: ebitmap: truncated map
[  120.951197][ T7792] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check.
[  120.994979][ T7793] FAULT_INJECTION: forcing a failure.
[  120.994979][ T7793] name failslab, interval 1, probability 0, space 0, times 0
[  120.999642][ T7800] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check.
[  121.008533][ T7793] CPU: 1 PID: 7793 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  121.033724][ T7793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  121.043882][ T7793] Call Trace:
[  121.047205][ T7793]  dump_stack+0x1b0/0x228
[  121.051536][ T7793]  ? devkmsg_release+0x127/0x127
[  121.056506][ T7793]  ? show_regs_print_info+0x18/0x18
[  121.061775][ T7793]  ? ebitmap_cpy+0x81/0x2f0
[  121.066266][ T7793]  ? security_compute_sid+0xe80/0x1be0
[  121.071709][ T7793]  ? security_transition_sid+0x7d/0x90
[  121.077162][ T7793]  ? selinux_socket_create+0x1e1/0x2f0
[  121.082650][ T7793]  ? __sock_create+0xd6/0x7b0
[  121.087299][ T7793]  ? __sys_socket+0x115/0x350
[  121.091964][ T7793]  should_fail+0x6fb/0x860
[  121.096366][ T7793]  ? setup_fault_attr+0x2b0/0x2b0
[  121.101370][ T7793]  ? stack_trace_snprint+0x150/0x150
[  121.106680][ T7793]  ? find_next_bit+0xd8/0x120
[  121.111342][ T7793]  __should_failslab+0x11a/0x160
[  121.116270][ T7793]  ? context_struct_to_string+0x3b5/0x7f0
[  121.121964][ T7793]  should_failslab+0x9/0x20
[  121.126453][ T7793]  __kmalloc+0x64/0x310
[  121.130615][ T7793]  context_struct_to_string+0x3b5/0x7f0
[  121.136147][ T7793]  ? security_bounded_transition+0x520/0x520
[  121.142102][ T7793]  ? mls_range_isvalid+0x3a8/0x4c0
[  121.147195][ T7793]  ? ebitmap_contains+0x71e/0x790
[  121.152196][ T7793]  context_add_hash+0xf5/0x200
[  121.156939][ T7793]  ? security_sid_to_context_inval+0x50/0x50
[  121.162896][ T7793]  ? mls_context_isvalid+0x27e/0x390
[  121.168162][ T7793]  ? policydb_context_isvalid+0x1d5/0x430
[  121.173862][ T7793]  security_compute_sid+0x1147/0x1be0
[  121.179216][ T7793]  ? security_transition_sid+0x90/0x90
[  121.184648][ T7793]  ? audit_log_end+0x1c6/0x230
[  121.189391][ T7793]  ? audit_seccomp+0x143/0x180
[  121.194180][ T7793]  ? __seccomp_filter+0xd15/0x1890
[  121.199271][ T7793]  ? memset+0x31/0x40
[  121.203240][ T7793]  security_transition_sid+0x7d/0x90
[  121.208514][ T7793]  selinux_socket_create+0x1e1/0x2f0
[  121.213773][ T7793]  ? selinux_socket_unix_may_send+0x2d0/0x2d0
[  121.219815][ T7793]  security_socket_create+0x69/0xd0
[  121.224994][ T7793]  __sock_create+0xd6/0x7b0
[  121.229477][ T7793]  ? __kasan_check_read+0x11/0x20
[  121.234479][ T7793]  ? syscall_trace_enter+0x683/0xa90
[  121.239742][ T7793]  __sys_socket+0x115/0x350
[  121.244224][ T7793]  ? sock_create_kern+0x50/0x50
[  121.249058][ T7793]  __x64_sys_socket+0x7a/0x90
[  121.253710][ T7793]  do_syscall_64+0xc0/0x100
[  121.258247][ T7793]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  121.264154][ T7793] RIP: 0033:0x45b349
[  121.268026][ T7793] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  121.287609][ T7793] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
15:46:48 executing program 3:
r0 = socket$unix(0x1, 0x2, 0x0)
ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000180))
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socket$unix(0x1, 0x2, 0x0)
r2 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r2, 0x0, r2)
r3 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r3, 0x0, r3)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
fcntl$dupfd(r1, 0x0, r4)
openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x40000, 0x0)
lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, <r6=>0x0}, 0x2400)
sendmsg$netlink(0xffffffffffffffff, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000004400)={0x2134, 0x26, 0x100, 0x70bd25, 0x25dfdbff, "", [@generic="8dfa2ec41458cda0b6c803a34706e240a371e15c66bd022427bf6d7a4aa9dbc8754d23ab27b7aacdb18d306f971be23b1158bbbebe39f56e0ceb32b84069d2e5e3a8361f174d93785a2095c800", @nested={0xc, 0x38, 0x0, 0x1, [@typed={0x8, 0x3f, 0x0, 0x0, @pid}]}, @nested={0x20a2, 0x94, 0x0, 0x1, [@generic="b19c80e06a826a83e8394dcb72bcdf493dee62ceeb2cc03d92ef9b417380b15b40e24959b6c0c486d9ff3afb7e6c31241c8e9f349a2b7c410335e31d0516d9bc3c7545723b90a3cf5f50655cf161858ea391", @generic="c854ed1e8379946544ed6575f7624919b5bc2429c845f6b00a6c8e651bbbfcd81c68d210563dc6c2ee95", @generic="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", @generic="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", @typed={0x16, 0x2d, 0x0, 0x0, @str='+vmnet1/ppp1wlan1\x00'}, @generic="fe9ac70565f44cc94ceb"]}, @typed={0x8, 0x5d, 0x0, 0x0, @uid=r5}, @typed={0x8, 0x38, 0x0, 0x0, @uid=r6}, @typed={0x14, 0x9, 0x0, 0x0, @ipv6=@empty}]}, 0x2134}], 0x1, 0x0, 0x0, 0x400c0}, 0x800)
bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x19, 0x4, 0x5, 0x234, 0x0, 0xffffffffffffffff, 0xffffffff, [0x305f, 0x2e, 0x5f, 0x182e, 0x600005f, 0x80ffff, 0x5f, 0x5f, 0x52, 0x67, 0x2], 0x0, r1}, 0x3c)

[  121.296004][ T7793] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  121.303960][ T7793] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  121.311908][ T7793] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  121.319863][ T7793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  121.327941][ T7793] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000008
[  121.358373][   T22] kauditd_printk_skb: 117 callbacks suppressed
[  121.358381][   T22] audit: type=1326 audit(1580485608.816:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=0 compat=0 ip=0x414e81 code=0x7ffc0000
[  121.373409][ T7811] SELinux: ebitmap: truncated map
15:46:48 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:48 executing program 2 (fault-call:4 fault-nth:9):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  121.392247][   T22] audit: type=1326 audit(1580485608.856:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414e21 code=0x7ffc0000
[  121.421174][   T22] audit: type=1326 audit(1580485608.856:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=3 compat=0 ip=0x414ee1 code=0x7ffc0000
[  121.446742][   T22] audit: type=1326 audit(1580485608.856:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  121.472606][   T22] audit: type=1326 audit(1580485608.856:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  121.497998][   T22] audit: type=1326 audit(1580485608.856:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  121.563034][   T22] audit: type=1326 audit(1580485609.046:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7822 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  121.564693][ T7826] FAULT_INJECTION: forcing a failure.
[  121.564693][ T7826] name failslab, interval 1, probability 0, space 0, times 0
[  121.589455][ T7823] SELinux: ebitmap: truncated map
[  121.600998][ T7826] CPU: 1 PID: 7826 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  121.601008][ T7826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  121.606057][   T22] audit: type=1326 audit(1580485609.046:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7822 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  121.616057][ T7826] Call Trace:
[  121.616074][ T7826]  dump_stack+0x1b0/0x228
[  121.616083][ T7826]  ? devkmsg_release+0x127/0x127
[  121.616090][ T7826]  ? show_regs_print_info+0x18/0x18
[  121.616098][ T7826]  ? ebitmap_cpy+0x81/0x2f0
[  121.616104][ T7826]  ? security_compute_sid+0xe80/0x1be0
[  121.616118][ T7826]  ? security_transition_sid+0x7d/0x90
[  121.635600][   T22] audit: type=1326 audit(1580485609.046:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7822 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  121.651418][ T7826]  ? selinux_socket_create+0x1e1/0x2f0
[  121.651430][ T7826]  ? __sock_create+0xd6/0x7b0
[  121.651437][ T7826]  ? __sys_socket+0x115/0x350
[  121.651447][ T7826]  should_fail+0x6fb/0x860
[  121.651454][ T7826]  ? setup_fault_attr+0x2b0/0x2b0
[  121.651461][ T7826]  ? stack_trace_snprint+0x150/0x150
[  121.651468][ T7826]  ? find_next_bit+0xd8/0x120
[  121.651476][ T7826]  __should_failslab+0x11a/0x160
[  121.651491][ T7826]  ? context_struct_to_string+0x3b5/0x7f0
[  121.654997][   T22] audit: type=1326 audit(1580485609.046:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7822 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=2 compat=0 ip=0x4150e1 code=0x7ffc0000
[  121.659079][ T7826]  should_failslab+0x9/0x20
[  121.659088][ T7826]  __kmalloc+0x64/0x310
[  121.659097][ T7826]  context_struct_to_string+0x3b5/0x7f0
[  121.659107][ T7826]  ? security_bounded_transition+0x520/0x520
[  121.659118][ T7826]  ? mls_range_isvalid+0x3a8/0x4c0
[  121.805481][ T7826]  ? ebitmap_contains+0x71e/0x790
[  121.810498][ T7826]  context_add_hash+0xf5/0x200
[  121.815259][ T7826]  ? security_sid_to_context_inval+0x50/0x50
[  121.821225][ T7826]  ? mls_context_isvalid+0x27e/0x390
[  121.826497][ T7826]  ? policydb_context_isvalid+0x1d5/0x430
[  121.832291][ T7826]  security_compute_sid+0x1147/0x1be0
[  121.837753][ T7826]  ? security_transition_sid+0x90/0x90
[  121.843200][ T7826]  ? audit_log_end+0x1c6/0x230
[  121.847948][ T7826]  ? audit_seccomp+0x143/0x180
[  121.852699][ T7826]  ? __seccomp_filter+0xd15/0x1890
[  121.857798][ T7826]  ? memset+0x31/0x40
[  121.861767][ T7826]  security_transition_sid+0x7d/0x90
[  121.867053][ T7826]  selinux_socket_create+0x1e1/0x2f0
[  121.872333][ T7826]  ? selinux_socket_unix_may_send+0x2d0/0x2d0
[  121.878386][ T7826]  security_socket_create+0x69/0xd0
[  121.883660][ T7826]  __sock_create+0xd6/0x7b0
[  121.888148][ T7826]  ? __kasan_check_read+0x11/0x20
[  121.893164][ T7826]  ? syscall_trace_enter+0x683/0xa90
[  121.898435][ T7826]  __sys_socket+0x115/0x350
[  121.902923][ T7826]  ? sock_create_kern+0x50/0x50
[  121.907770][ T7826]  __x64_sys_socket+0x7a/0x90
[  121.912430][ T7826]  do_syscall_64+0xc0/0x100
[  121.917030][ T7826]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  121.922904][ T7826] RIP: 0033:0x45b349
[  121.926781][ T7826] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  121.946373][ T7826] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  121.954788][ T7826] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  121.962771][ T7826] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  121.970732][ T7826] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  121.978692][ T7826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  121.986659][ T7826] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000009
[  122.003610][ T7789] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  122.024684][ T7789] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  122.041809][ T7789] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock
15:46:49 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:49 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:49 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:49 executing program 3:
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./bus\x00', 0xa0, 0x9, &(0x7f00000004c0)=[{&(0x7f0000000a00)="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", 0x1000, 0x6}, {&(0x7f0000000080), 0x0, 0x100000001}, {&(0x7f0000000140)="3e9181bc9cb46e79dac04d2a414d953800dd4ea6cf9b94db58520de9d8f8c4688798d39c4ada92558a600558c2b08da704c301b48f99146d25481ab8bf814e3dc0c653748c93f58755be823418bd5b11c5af56c640a88f1873d73aa01fafd92c5da7e7bed067c30fd04781d94227fab36724c3e82b5cdcbb23eb4f125494c417a83ff217c52d715f76d28509416fff8994764aa6f59428eb63333d69c3dae68b8e54a5ef8b30dbd3a4c579a2de98834f4c3f57cce4967d0a4b7dc109bf4e5295c1b87bb01fcf75ec4586f1b26534fcbf11a1ebb1ec48060d63389d459d75a8c97cf561d4d167cad7b3", 0xe9, 0x7ff}, {&(0x7f00000000c0)="f57ddffeede3e60e81e894190eba448b006330c56f5e7affd1de862615eb351c86", 0x21, 0x40000000000000}, {&(0x7f0000000300)="17b482409dbcda4a5c3e10310b96a7d29bb109caa74ad44c28e8b4ed2e63aeac8eb4fd24ee94ed3d2b7e79523e2a976d6a2b7bb038fa3e83bbeb2a897ce4474fa6495533d089c2d63174544266c4024ae15b399d2c5b598f642ab7a70785ac072e88609edc74d071389aee4c41b9177c8a102ccda8db40caff1145471684ac6f1211e8e8ad471d6a481e800a255608e372cf58f57d70a6056abea03a866213ac19110287d65aba892cf98e6466e43e1116ac495fb03f53bfaf865b", 0xbb, 0x10001}, {&(0x7f0000000240)="fde570d62e62ad349d73", 0xa, 0x4}, {&(0x7f00000003c0)="7d90dfef07d0fd0fe46cd100b32b0e84d3c97b5d901a207427a0aaa43b051e0d739ddc9ce5daf6c021d3ade545df28ce1531a8fef7709b7831b1749b2821196cc7faf42d40f7210b4006b1a86fff8b7867b11c55971f16471f46f948bf8b33e0f3fc0c4a69d60ec3d93e3c4c6515b942b9b7da38", 0x74, 0x3c}, {&(0x7f0000001a00)="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", 0x1000, 0x6}, {&(0x7f0000000440)="7b50d4eb2f6e843824cff0bf0ed3e79e5b2ecc7c503b280fac14daa1068ec2c465113a442d755d8ac00a24bdd5003da1925788311cdce0a441c0d2dfbd9038df55fa5251c69b5fbd01a5ba9857fa55daabc6faa481f8e125d357abc2fa1e322fa09cbd34e1755c5cad27eae9ba19f5f53f68fa", 0x73, 0x33}], 0x2020002, &(0x7f00000005c0)=ANY=[@ANYBLOB="7365636c6162656c2c736d61736b6673666c6f6f723d6367726f75702c00ac48c7c3c1f3b4753f3fcd63f2616091c26782d1e8541c0ebeab3fff454de2f6fafadb60f9dd3cdf057a67caec18294afe93360b30eb06aa46c62847"])
ftruncate(r1, 0x8200)
recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0)
fallocate(r2, 0x20, 0x0, 0xfffffeff000)

15:46:49 executing program 2 (fault-call:4 fault-nth:10):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:49 executing program 4:
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140)={0x87, @empty, 0x0, 0x0, 'wrr\x00', 0x0, 0x5, 0x40}, 0x2c)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000340)=""/224, &(0x7f0000000040)=0xe0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

[  122.069782][ T7789] EXT4-fs (loop4): orphan cleanup on readonly fs
[  122.076141][ T7789] EXT4-fs error (device loop4): ext4_orphan_get:1247: comm syz-executor.4: bad orphan inode 808464432
[  122.087398][ T7789] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue
15:46:49 executing program 0:
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r1, r0, 0x0)
write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  122.121033][ T7848] FAULT_INJECTION: forcing a failure.
[  122.121033][ T7848] name failslab, interval 1, probability 0, space 0, times 0
[  122.133916][ T7848] CPU: 0 PID: 7848 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  122.143977][ T7848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  122.154026][ T7848] Call Trace:
[  122.157332][ T7848]  dump_stack+0x1b0/0x228
[  122.161665][ T7848]  ? devkmsg_release+0x127/0x127
[  122.167312][ T7848]  ? show_regs_print_info+0x18/0x18
[  122.172489][ T7848]  ? ebitmap_cpy+0x81/0x2f0
[  122.176982][ T7848]  ? security_compute_sid+0xe80/0x1be0
[  122.182519][ T7848]  ? security_transition_sid+0x7d/0x90
[  122.187974][ T7848]  ? selinux_socket_create+0x1e1/0x2f0
[  122.193420][ T7848]  ? __sock_create+0xd6/0x7b0
[  122.198089][ T7848]  ? __sys_socket+0x115/0x350
[  122.202777][ T7848]  should_fail+0x6fb/0x860
[  122.207297][ T7848]  ? setup_fault_attr+0x2b0/0x2b0
[  122.212308][ T7848]  ? stack_trace_snprint+0x150/0x150
[  122.217579][ T7848]  ? find_next_bit+0xd8/0x120
[  122.222545][ T7848]  __should_failslab+0x11a/0x160
[  122.227495][ T7848]  ? context_struct_to_string+0x3b5/0x7f0
[  122.233927][ T7848]  should_failslab+0x9/0x20
[  122.238532][ T7848]  __kmalloc+0x64/0x310
[  122.242678][ T7848]  context_struct_to_string+0x3b5/0x7f0
[  122.250763][ T7848]  ? security_bounded_transition+0x520/0x520
[  122.256732][ T7848]  ? mls_range_isvalid+0x3a8/0x4c0
[  122.261836][ T7848]  ? ebitmap_contains+0x71e/0x790
[  122.266970][ T7848]  context_add_hash+0xf5/0x200
[  122.271735][ T7848]  ? security_sid_to_context_inval+0x50/0x50
[  122.277762][ T7848]  ? mls_context_isvalid+0x27e/0x390
[  122.283033][ T7848]  ? policydb_context_isvalid+0x1d5/0x430
[  122.288732][ T7848]  security_compute_sid+0x1147/0x1be0
[  122.294158][ T7848]  ? security_transition_sid+0x90/0x90
[  122.299609][ T7848]  ? audit_log_end+0x1c6/0x230
[  122.304373][ T7848]  ? audit_seccomp+0x143/0x180
[  122.309132][ T7848]  ? __seccomp_filter+0xd15/0x1890
[  122.314238][ T7848]  ? memset+0x31/0x40
[  122.318230][ T7848]  security_transition_sid+0x7d/0x90
[  122.323508][ T7848]  selinux_socket_create+0x1e1/0x2f0
[  122.328794][ T7848]  ? selinux_socket_unix_may_send+0x2d0/0x2d0
[  122.334863][ T7848]  security_socket_create+0x69/0xd0
[  122.340052][ T7848]  __sock_create+0xd6/0x7b0
[  122.345406][ T7848]  ? __kasan_check_read+0x11/0x20
[  122.350413][ T7848]  ? syscall_trace_enter+0x683/0xa90
[  122.355688][ T7848]  __sys_socket+0x115/0x350
[  122.360245][ T7848]  ? sock_create_kern+0x50/0x50
[  122.365096][ T7848]  __x64_sys_socket+0x7a/0x90
[  122.369786][ T7848]  do_syscall_64+0xc0/0x100
[  122.374288][ T7848]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  122.380836][ T7848] RIP: 0033:0x45b349
[  122.386587][ T7848] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  122.407057][ T7848] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
15:46:49 executing program 2 (fault-call:4 fault-nth:11):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:49 executing program 0:
creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  122.415700][ T7848] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  122.424180][ T7848] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  122.432141][ T7848] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  122.440112][ T7848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  122.448077][ T7848] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000a
15:46:50 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:50 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  122.670476][ T7873] FAULT_INJECTION: forcing a failure.
[  122.670476][ T7873] name failslab, interval 1, probability 0, space 0, times 0
[  122.680184][ T7875] SELinux: ebitmap: truncated map
[  122.687884][ T7873] CPU: 0 PID: 7873 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  122.698474][ T7873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  122.708649][ T7873] Call Trace:
[  122.711941][ T7873]  dump_stack+0x1b0/0x228
[  122.716278][ T7873]  ? devkmsg_release+0x127/0x127
[  122.718913][ T7878] SELinux: ebitmap: truncated map
[  122.721219][ T7873]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  122.721231][ T7873]  ? show_regs_print_info+0x18/0x18
[  122.721248][ T7873]  ? __seccomp_filter+0xd15/0x1890
[  122.742719][ T7873]  should_fail+0x6fb/0x860
[  122.747142][ T7873]  ? setup_fault_attr+0x2b0/0x2b0
[  122.752180][ T7873]  ? should_fail+0x182/0x860
[  122.756806][ T7873]  ? avc_has_perm_noaudit+0x3f0/0x3f0
[  122.762185][ T7873]  __should_failslab+0x11a/0x160
15:46:50 executing program 0:
creat(&(0x7f00000002c0)='./bus\x00', 0x0)
umount2(&(0x7f0000000000)='./bus\x00', 0x1)
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:50 executing program 0:
creat(&(0x7f00000002c0)='./bus\x00', 0x0)
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:50 executing program 3:
r0 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000040)={0x7, 'vlan0\x00', {0xa247}, 0x3ff})
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x7, 0x3, 0x3}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xf, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffc}, 0x48)

15:46:50 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  122.767141][ T7873]  ? security_inode_alloc+0x36/0x1f0
[  122.772435][ T7873]  should_failslab+0x9/0x20
[  122.774200][ T7880] SELinux: ebitmap: truncated map
[  122.776942][ T7873]  kmem_cache_alloc+0x37/0x2b0
[  122.776954][ T7873]  ? from_kuid_munged+0x3b0/0x3b0
[  122.776964][ T7873]  security_inode_alloc+0x36/0x1f0
[  122.776974][ T7873]  inode_init_always+0x39b/0x840
[  122.776983][ T7873]  ? sockfs_init_fs_context+0xb0/0xb0
[  122.776991][ T7873]  new_inode_pseudo+0x7f/0x240
[  122.777008][ T7873]  __sock_create+0x136/0x7b0
[  122.817311][ T7873]  ? __kasan_check_read+0x11/0x20
[  122.822358][ T7873]  __sys_socket+0x115/0x350
[  122.826875][ T7873]  ? sock_create_kern+0x50/0x50
[  122.831730][ T7873]  __x64_sys_socket+0x7a/0x90
[  122.836406][ T7873]  do_syscall_64+0xc0/0x100
[  122.840916][ T7873]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  122.846802][ T7873] RIP: 0033:0x45b349
[  122.852015][ T7873] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  122.873479][ T7873] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  122.882617][ T7873] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  122.891143][ T7873] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  122.899825][ T7873] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  122.908325][ T7873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
15:46:50 executing program 2 (fault-call:4 fault-nth:12):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:50 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000))
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x2, 0x3, 0x258, 0x0, 0x108, 0x0, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@ip={@remote, @dev, 0x0, 0x0, '\x00', 'ip_vti0\x00', {}, {}, 0x88}, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@inet=@udplite={{0x30, 'udplite\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2b8)

[  122.917423][ T7873] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000b
[  122.927035][ T7873] socket: no more sockets
[  122.958237][ T7900] SELinux: ebitmap: truncated map
[  122.980179][ T7883] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  123.022481][ T7883] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue
[  123.038175][ T7909] xt_CT: No such helper "netbios-ns"
[  123.048390][ T7910] FAULT_INJECTION: forcing a failure.
[  123.048390][ T7910] name failslab, interval 1, probability 0, space 0, times 0
[  123.066296][ T7910] CPU: 1 PID: 7910 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  123.076379][ T7910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  123.086435][ T7910] Call Trace:
[  123.089734][ T7910]  dump_stack+0x1b0/0x228
[  123.094067][ T7910]  ? devkmsg_release+0x127/0x127
[  123.099002][ T7910]  ? do_syscall_64+0xc0/0x100
[  123.103666][ T7910]  ? show_regs_print_info+0x18/0x18
[  123.108862][ T7910]  ? kasan_slab_alloc+0xe/0x10
[  123.113656][ T7910]  ? sock_alloc_inode+0x1b/0xc0
[  123.118677][ T7910]  ? new_inode_pseudo+0x68/0x240
[  123.123610][ T7910]  ? __sock_create+0x136/0x7b0
[  123.128463][ T7910]  ? __x64_sys_socket+0x7a/0x90
[  123.133291][ T7910]  ? do_syscall_64+0xc0/0x100
[  123.138071][ T7910]  should_fail+0x6fb/0x860
[  123.142480][ T7910]  ? setup_fault_attr+0x2b0/0x2b0
[  123.147494][ T7910]  ? should_fail+0x182/0x860
[  123.152079][ T7910]  ? avc_has_perm+0x15f/0x260
[  123.156751][ T7910]  __should_failslab+0x11a/0x160
[  123.162197][ T7910]  ? sk_prot_alloc+0x63/0x2f0
[  123.166862][ T7910]  should_failslab+0x9/0x20
[  123.171357][ T7910]  kmem_cache_alloc+0x37/0x2b0
[  123.176284][ T7910]  sk_prot_alloc+0x63/0x2f0
[  123.180777][ T7910]  sk_alloc+0x35/0x300
[  123.184843][ T7910]  unix_create1+0x91/0x530
[  123.189399][ T7910]  ? __rcu_read_lock+0x50/0x50
[  123.194460][ T7910]  unix_create+0x136/0x1c0
[  123.198889][ T7910]  __sock_create+0x3c6/0x7b0
[  123.203468][ T7910]  __sys_socket+0x115/0x350
[  123.208074][ T7910]  ? sock_create_kern+0x50/0x50
[  123.212914][ T7910]  __x64_sys_socket+0x7a/0x90
[  123.217696][ T7910]  do_syscall_64+0xc0/0x100
[  123.222186][ T7910]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  123.228093][ T7910] RIP: 0033:0x45b349
[  123.231969][ T7910] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  123.251681][ T7910] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  123.260225][ T7910] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
15:46:50 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:50 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:50 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00')
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r3, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @loopback}}}}]}]}, 0xff23}}, 0x0)

15:46:50 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r2, 0x0, r2)
ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f0000000000)={0x7, 'macsec0\x00', {0x1}, 0x2195})
socket$packet(0x11, 0x3, 0x300)
mremap(&(0x7f000029a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000016b000/0x3000)=nil)
mlockall(0x1)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)

15:46:50 executing program 2 (fault-call:4 fault-nth:13):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  123.268298][ T7910] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  123.276283][ T7910] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  123.284352][ T7910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  123.292319][ T7910] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000c
15:46:50 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:50 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r1, 0x800)
lseek(r1, 0x0, 0x2)
r2 = open(&(0x7f0000001840)='./bus\x00', 0x84442, 0x0)
sendfile(r1, r2, 0x0, 0x8400fffffffa)
r3 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0)
fcntl$getflags(r0, 0x401)
ftruncate(r3, 0x200006)

[  123.332251][ T7928] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'.
[  123.341615][ T7928] tipc: Invalid UDP bearer configuration
[  123.341639][ T7928] tipc: Enabling of bearer <udp:syz1> rejected, failed to enable media
15:46:50 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  123.401929][ T7943] FAULT_INJECTION: forcing a failure.
[  123.401929][ T7943] name failslab, interval 1, probability 0, space 0, times 0
[  123.414930][ T7943] CPU: 1 PID: 7943 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  123.425023][ T7943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  123.435082][ T7943] Call Trace:
[  123.438372][ T7943]  dump_stack+0x1b0/0x228
[  123.442696][ T7943]  ? devkmsg_release+0x127/0x127
[  123.447733][ T7943]  ? __sock_create+0x3c6/0x7b0
[  123.452487][ T7943]  ? show_regs_print_info+0x18/0x18
[  123.457679][ T7943]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  123.463782][ T7943]  ? __kasan_kmalloc+0x117/0x1b0
[  123.468756][ T7943]  ? kasan_slab_alloc+0xe/0x10
[  123.473512][ T7943]  ? security_inode_alloc+0x36/0x1f0
[  123.478773][ T7943]  ? inode_init_always+0x39b/0x840
[  123.483871][ T7943]  should_fail+0x6fb/0x860
[  123.488272][ T7943]  ? setup_fault_attr+0x2b0/0x2b0
[  123.493284][ T7943]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  123.499441][ T7943]  ? should_fail+0x182/0x860
[  123.504012][ T7943]  __should_failslab+0x11a/0x160
[  123.509033][ T7943]  ? selinux_sk_alloc_security+0x7b/0x1a0
[  123.514862][ T7943]  should_failslab+0x9/0x20
[  123.519353][ T7943]  kmem_cache_alloc_trace+0x3a/0x2f0
[  123.524625][ T7943]  selinux_sk_alloc_security+0x7b/0x1a0
[  123.530228][ T7943]  security_sk_alloc+0x65/0xc0
[  123.535031][ T7943]  sk_prot_alloc+0x143/0x2f0
[  123.539604][ T7943]  sk_alloc+0x35/0x300
[  123.543657][ T7943]  unix_create1+0x91/0x530
[  123.548066][ T7943]  ? __rcu_read_lock+0x50/0x50
[  123.552810][ T7943]  unix_create+0x136/0x1c0
[  123.557210][ T7943]  __sock_create+0x3c6/0x7b0
[  123.561824][ T7943]  __sys_socket+0x115/0x350
[  123.566329][ T7943]  ? sock_create_kern+0x50/0x50
[  123.571176][ T7943]  __x64_sys_socket+0x7a/0x90
[  123.575837][ T7943]  do_syscall_64+0xc0/0x100
[  123.580409][ T7943]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  123.586295][ T7943] RIP: 0033:0x45b349
[  123.590178][ T7943] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  123.609861][ T7943] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  123.618430][ T7943] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  123.626436][ T7943] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  123.634408][ T7943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  123.642377][ T7943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
15:46:51 executing program 2 (fault-call:4 fault-nth:14):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  123.650336][ T7943] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000d
15:46:51 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:51 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  123.747814][ T7965] FAULT_INJECTION: forcing a failure.
[  123.747814][ T7965] name failslab, interval 1, probability 0, space 0, times 0
[  123.760656][ T7965] CPU: 0 PID: 7965 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  123.771099][ T7965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  123.781159][ T7965] Call Trace:
[  123.784574][ T7965]  dump_stack+0x1b0/0x228
[  123.789096][ T7965]  ? devkmsg_release+0x127/0x127
[  123.794042][ T7965]  ? show_regs_print_info+0x18/0x18
[  123.799266][ T7965]  should_fail+0x6fb/0x860
[  123.803698][ T7965]  ? setup_fault_attr+0x2b0/0x2b0
[  123.808724][ T7965]  ? arch_stack_walk+0x98/0xe0
[  123.813491][ T7965]  __should_failslab+0x11a/0x160
[  123.818442][ T7965]  ? ebitmap_cpy+0x81/0x2f0
[  123.822951][ T7965]  should_failslab+0x9/0x20
[  123.827551][ T7965]  kmem_cache_alloc+0x37/0x2b0
[  123.832325][ T7965]  ebitmap_cpy+0x81/0x2f0
[  123.836783][ T7965]  mls_compute_sid+0x4c2/0x1310
[  123.841648][ T7965]  ? mls_convert_context+0x7e0/0x7e0
[  123.847122][ T7965]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  123.852599][ T7965]  ? selinux_sk_alloc_security+0x7b/0x1a0
[  123.858330][ T7965]  ? avtab_search_node+0x4e2/0x5e0
[  123.863458][ T7965]  security_compute_sid+0xe80/0x1be0
[  123.868758][ T7965]  ? security_transition_sid+0x90/0x90
[  123.874217][ T7965]  ? new_inode_pseudo+0x7f/0x240
[  123.879166][ T7965]  ? __sock_create+0x136/0x7b0
[  123.883932][ T7965]  ? __sys_socket+0x115/0x350
[  123.888613][ T7965]  ? __x64_sys_socket+0x7a/0x90
[  123.893458][ T7965]  ? do_syscall_64+0xc0/0x100
[  123.898239][ T7965]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  123.904417][ T7965]  ? should_fail+0x182/0x860
[  123.909011][ T7965]  ? sock_alloc_inode+0x1b/0xc0
[  123.913974][ T7965]  ? new_inode_pseudo+0x68/0x240
[  123.919176][ T7965]  ? __sock_create+0x136/0x7b0
[  123.923947][ T7965]  ? setup_fault_attr+0x2b0/0x2b0
[  123.928973][ T7965]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  123.935049][ T7965]  ? should_fail+0x182/0x860
[  123.939640][ T7965]  ? kasan_kmalloc+0x9/0x10
[  123.944148][ T7965]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  123.949711][ T7965]  ? cgroup_tryget+0x102/0x2b0
[  123.954488][ T7965]  ? __rcu_read_lock+0x50/0x50
[  123.959255][ T7965]  security_transition_sid+0x7d/0x90
[  123.964546][ T7965]  selinux_socket_post_create+0x375/0x500
[  123.970275][ T7965]  ? selinux_socket_create+0x2f0/0x2f0
[  123.975733][ T7965]  ? local_bh_enable+0x1f/0x30
[  123.980499][ T7965]  ? unix_create1+0x483/0x530
[  123.985182][ T7965]  ? __module_put_and_exit+0x20/0x20
[  123.990619][ T7965]  security_socket_post_create+0x7c/0xe0
[  123.996253][ T7965]  __sock_create+0x47c/0x7b0
[  124.000854][ T7965]  __sys_socket+0x115/0x350
[  124.005355][ T7965]  ? sock_create_kern+0x50/0x50
[  124.010211][ T7965]  __x64_sys_socket+0x7a/0x90
[  124.014891][ T7965]  do_syscall_64+0xc0/0x100
[  124.019453][ T7965]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  124.025345][ T7965] RIP: 0033:0x45b349
[  124.029236][ T7965] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
15:46:51 executing program 4:
r0 = io_uring_setup(0x816, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/24, 0x18}], 0x1)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x5, 0xc6, 0x80}}, 0x28)
io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0)
openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x10000, 0x0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
fsetxattr(r2, &(0x7f00000001c0)=@random={'user.', 'cpuacct.stat\x00'}, &(0x7f0000000180)='cu\x1d\xc9d\x00', 0x6, 0x5)
sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x7, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5b9}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x179a4000}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x2}, @IPSET_ATTR_FLAGS={0x8}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x40000)

15:46:51 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:51 executing program 0:
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  124.048960][ T7965] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  124.057366][ T7965] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  124.065432][ T7965] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  124.073518][ T7965] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  124.081611][ T7965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  124.089579][ T7965] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000e
15:46:51 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:51 executing program 2 (fault-call:4 fault-nth:15):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:51 executing program 0:
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  124.233702][ T7995] FAULT_INJECTION: forcing a failure.
[  124.233702][ T7995] name failslab, interval 1, probability 0, space 0, times 0
[  124.246388][ T7995] CPU: 1 PID: 7995 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  124.256538][ T7995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  124.266574][ T7995] Call Trace:
[  124.269851][ T7995]  dump_stack+0x1b0/0x228
[  124.274163][ T7995]  ? devkmsg_release+0x127/0x127
[  124.279083][ T7995]  ? show_regs_print_info+0x18/0x18
[  124.284264][ T7995]  should_fail+0x6fb/0x860
[  124.288696][ T7995]  ? setup_fault_attr+0x2b0/0x2b0
[  124.293700][ T7995]  ? arch_stack_walk+0x98/0xe0
[  124.298450][ T7995]  __should_failslab+0x11a/0x160
[  124.303373][ T7995]  ? ebitmap_cpy+0x81/0x2f0
[  124.307858][ T7995]  should_failslab+0x9/0x20
[  124.312336][ T7995]  kmem_cache_alloc+0x37/0x2b0
[  124.317078][ T7995]  ebitmap_cpy+0x81/0x2f0
[  124.321392][ T7995]  mls_compute_sid+0x4c2/0x1310
[  124.326276][ T7995]  ? mls_convert_context+0x7e0/0x7e0
[  124.331748][ T7995]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  124.337196][ T7995]  ? selinux_sk_alloc_security+0x7b/0x1a0
[  124.342896][ T7995]  ? avtab_search_node+0x4e2/0x5e0
[  124.347982][ T7995]  security_compute_sid+0xe80/0x1be0
[  124.353258][ T7995]  ? security_transition_sid+0x90/0x90
[  124.358694][ T7995]  ? new_inode_pseudo+0x7f/0x240
[  124.363606][ T7995]  ? __sock_create+0x136/0x7b0
[  124.368399][ T7995]  ? __sys_socket+0x115/0x350
[  124.373057][ T7995]  ? __x64_sys_socket+0x7a/0x90
[  124.378412][ T7995]  ? do_syscall_64+0xc0/0x100
[  124.383078][ T7995]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  124.389121][ T7995]  ? should_fail+0x182/0x860
[  124.393690][ T7995]  ? sock_alloc_inode+0x1b/0xc0
[  124.398515][ T7995]  ? new_inode_pseudo+0x68/0x240
[  124.403436][ T7995]  ? __sock_create+0x136/0x7b0
[  124.408187][ T7995]  ? setup_fault_attr+0x2b0/0x2b0
[  124.413195][ T7995]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  124.419243][ T7995]  ? should_fail+0x182/0x860
[  124.423810][ T7995]  ? kasan_kmalloc+0x9/0x10
[  124.428307][ T7995]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  124.433756][ T7995]  ? cgroup_tryget+0x102/0x2b0
[  124.438497][ T7995]  ? __rcu_read_lock+0x50/0x50
[  124.443245][ T7995]  security_transition_sid+0x7d/0x90
[  124.448515][ T7995]  selinux_socket_post_create+0x375/0x500
[  124.454209][ T7995]  ? selinux_socket_create+0x2f0/0x2f0
[  124.459650][ T7995]  ? local_bh_enable+0x1f/0x30
[  124.464392][ T7995]  ? unix_create1+0x483/0x530
[  124.469060][ T7995]  ? __module_put_and_exit+0x20/0x20
[  124.474326][ T7995]  security_socket_post_create+0x7c/0xe0
[  124.479939][ T7995]  __sock_create+0x47c/0x7b0
[  124.484509][ T7995]  __sys_socket+0x115/0x350
[  124.488993][ T7995]  ? sock_create_kern+0x50/0x50
[  124.493834][ T7995]  __x64_sys_socket+0x7a/0x90
[  124.498513][ T7995]  do_syscall_64+0xc0/0x100
[  124.502992][ T7995]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  124.508861][ T7995] RIP: 0033:0x45b349
[  124.512741][ T7995] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
15:46:52 executing program 2 (fault-call:4 fault-nth:16):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  124.532444][ T7995] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  124.540838][ T7995] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  124.548789][ T7995] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  124.556737][ T7995] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  124.564695][ T7995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  124.572657][ T7995] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000f
15:46:52 executing program 3:
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0)
r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sync()

15:46:52 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:52 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:52 executing program 0:
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:46:52 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, 0x0, 0x0)

[  124.664791][ T8007] FAULT_INJECTION: forcing a failure.
[  124.664791][ T8007] name failslab, interval 1, probability 0, space 0, times 0
[  124.677450][ T8007] CPU: 0 PID: 8007 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  124.687494][ T8007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  124.697539][ T8007] Call Trace:
[  124.700863][ T8007]  dump_stack+0x1b0/0x228
[  124.705622][ T8007]  ? devkmsg_release+0x127/0x127
[  124.710563][ T8007]  ? show_regs_print_info+0x18/0x18
[  124.715745][ T8007]  ? ebitmap_cpy+0x81/0x2f0
[  124.720239][ T8007]  ? security_compute_sid+0xe80/0x1be0
[  124.725697][ T8007]  ? security_transition_sid+0x7d/0x90
[  124.731150][ T8007]  ? selinux_socket_post_create+0x375/0x500
[  124.737025][ T8007]  ? __sock_create+0x47c/0x7b0
[  124.741769][ T8007]  ? __sys_socket+0x115/0x350
[  124.746431][ T8007]  should_fail+0x6fb/0x860
[  124.750826][ T8007]  ? setup_fault_attr+0x2b0/0x2b0
[  124.755825][ T8007]  ? find_next_bit+0xd8/0x120
[  124.760487][ T8007]  __should_failslab+0x11a/0x160
[  124.765414][ T8007]  ? context_struct_to_string+0x3b5/0x7f0
[  124.771121][ T8007]  should_failslab+0x9/0x20
[  124.775612][ T8007]  __kmalloc+0x64/0x310
[  124.779748][ T8007]  context_struct_to_string+0x3b5/0x7f0
[  124.785279][ T8007]  ? security_bounded_transition+0x520/0x520
[  124.791241][ T8007]  ? mls_range_isvalid+0x3a8/0x4c0
[  124.796341][ T8007]  ? ebitmap_contains+0x71e/0x790
[  124.801361][ T8007]  context_add_hash+0xf5/0x200
[  124.806223][ T8007]  ? security_sid_to_context_inval+0x50/0x50
[  124.812185][ T8007]  ? mls_context_isvalid+0x27e/0x390
[  124.817556][ T8007]  ? policydb_context_isvalid+0x1d5/0x430
[  124.823253][ T8007]  security_compute_sid+0x1147/0x1be0
[  124.828605][ T8007]  ? security_transition_sid+0x90/0x90
[  124.834052][ T8007]  ? new_inode_pseudo+0x7f/0x240
[  124.838975][ T8007]  ? __sock_create+0x136/0x7b0
[  124.843721][ T8007]  ? __sys_socket+0x115/0x350
[  124.848377][ T8007]  ? __x64_sys_socket+0x7a/0x90
[  124.853221][ T8007]  ? do_syscall_64+0xc0/0x100
[  124.857893][ T8007]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  124.864075][ T8007]  ? should_fail+0x182/0x860
[  124.868655][ T8007]  ? sock_alloc_inode+0x1b/0xc0
[  124.873487][ T8007]  ? new_inode_pseudo+0x68/0x240
[  124.878408][ T8007]  ? __sock_create+0x136/0x7b0
[  124.883171][ T8007]  ? setup_fault_attr+0x2b0/0x2b0
[  124.888196][ T8007]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  124.894259][ T8007]  ? ___slab_alloc+0xab/0x450
[  124.898918][ T8007]  ? kasan_kmalloc+0x9/0x10
[  124.903419][ T8007]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  124.908866][ T8007]  ? cgroup_tryget+0x102/0x2b0
[  124.913608][ T8007]  ? __rcu_read_lock+0x50/0x50
[  124.918352][ T8007]  security_transition_sid+0x7d/0x90
[  124.923627][ T8007]  selinux_socket_post_create+0x375/0x500
[  124.929336][ T8007]  ? selinux_socket_create+0x2f0/0x2f0
[  124.934775][ T8007]  ? local_bh_enable+0x1f/0x30
[  124.939519][ T8007]  ? unix_create1+0x483/0x530
[  124.944189][ T8007]  ? __module_put_and_exit+0x20/0x20
[  124.949468][ T8007]  security_socket_post_create+0x7c/0xe0
[  124.955125][ T8007]  __sock_create+0x47c/0x7b0
[  124.959699][ T8007]  __sys_socket+0x115/0x350
[  124.964199][ T8007]  ? sock_create_kern+0x50/0x50
[  124.969068][ T8007]  __x64_sys_socket+0x7a/0x90
[  124.973739][ T8007]  do_syscall_64+0xc0/0x100
[  124.978277][ T8007]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  124.984154][ T8007] RIP: 0033:0x45b349
[  124.988036][ T8007] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  125.007631][ T8007] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
15:46:52 executing program 2 (fault-call:4 fault-nth:17):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  125.016132][ T8007] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  125.028138][ T8007] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  125.036280][ T8007] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  125.044241][ T8007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  125.052223][ T8007] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000010
15:46:52 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:52 executing program 4:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendmsg$tipc(r3, &(0x7f0000000200)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x2, {0x4e22, 0x2}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000140)="aabf9295c64388158c24e83ae276fa4c45f913987a3442014677c00cc1d1911956028a20348deb4f44ae34607b3de83e65e6f4bbd257672d03efc52fb531b8eb", 0x40}], 0x1, &(0x7f00000001c0)="2ee94a912d714d1386c0da96e09d052c31d8dbdfbab4736a9ae4", 0x1a, 0x20048894}, 0x0)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x13)
ioctl$ASHMEM_GET_PIN_STATUS(r5, 0x7709, 0x0)
dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r6 = socket$inet_tcp(0x2, 0x1, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0)
syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x5724, 0x400)
ioctl$USBDEVFS_RELEASE_PORT(r7, 0x80045519, &(0x7f0000000040)=0x5)
r8 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r8, 0x0, r8)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f0000000480)=ANY=[@ANYRESHEX=r8], 0x1)

[  125.105630][ T8025] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0
[  125.118322][ T8025] CPU: 0 PID: 8025 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  125.128608][ T8025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  125.138659][ T8025] Call Trace:
[  125.141931][ T8025]  dump_stack+0x1b0/0x228
[  125.146249][ T8025]  ? devkmsg_release+0x127/0x127
[  125.151175][ T8025]  ? show_regs_print_info+0x18/0x18
[  125.156360][ T8025]  warn_alloc+0x1ee/0x340
[  125.160680][ T8025]  ? __vmalloc_node_range+0x43/0x760
[  125.165957][ T8025]  ? zone_watermark_ok_safe+0x420/0x420
[  125.171494][ T8025]  ? futex_exit_release+0xd0/0xd0
[  125.176608][ T8025]  ? putname+0xe5/0x140
[  125.180743][ T8025]  ? avc_has_perm+0x15f/0x260
[  125.185432][ T8025]  ? do_sys_open+0x60f/0x7a0
[  125.190046][ T8025]  __vmalloc_node_range+0x294/0x760
[  125.195232][ T8025]  ? mutex_lock+0xa6/0x110
[  125.199695][ T8025]  vmalloc+0x73/0x80
[  125.203589][ T8025]  ? sel_write_load+0x1c5/0x410
[  125.208534][ T8025]  sel_write_load+0x1c5/0x410
[  125.213216][ T8025]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  125.218888][ T8025]  __vfs_write+0xff/0x700
[  125.223206][ T8025]  ? __kernel_write+0x350/0x350
[  125.228053][ T8025]  ? avc_policy_seqno+0x1b/0x70
[  125.232946][ T8025]  ? selinux_file_permission+0x2ba/0x560
[  125.238568][ T8025]  ? security_file_permission+0x157/0x350
[  125.244298][ T8025]  ? rw_verify_area+0x1c2/0x360
[  125.249216][ T8025]  vfs_write+0x203/0x4e0
[  125.253452][ T8025]  ksys_write+0x168/0x2a0
[  125.257765][ T8025]  ? __ia32_sys_read+0x90/0x90
[  125.262522][ T8025]  ? __kasan_check_read+0x11/0x20
[  125.267536][ T8025]  ? __ia32_sys_clock_settime+0x230/0x230
[  125.273241][ T8025]  __x64_sys_write+0x7b/0x90
[  125.277817][ T8025]  do_syscall_64+0xc0/0x100
[  125.282470][ T8025]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  125.288346][ T8025] RIP: 0033:0x45b349
[  125.292314][ T8025] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  125.311904][ T8025] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  125.320306][ T8025] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  125.328381][ T8025] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
[  125.336353][ T8025] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  125.344359][ T8025] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
15:46:52 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
getsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000000))

15:46:52 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  125.352319][ T8025] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000075bf2c
[  125.361108][ T8025] Mem-Info:
[  125.364529][ T8025] active_anon:99324 inactive_anon:9149 isolated_anon:0
[  125.364529][ T8025]  active_file:9074 inactive_file:12837 isolated_file:0
[  125.364529][ T8025]  unevictable:0 dirty:4 writeback:0 unstable:0
[  125.364529][ T8025]  slab_reclaimable:4698 slab_unreclaimable:61548
[  125.364529][ T8025]  mapped:60400 shmem:65 pagetables:1137 bounce:0
[  125.364529][ T8025]  free:1386861 free_pcp:923 free_cma:0
[  125.436048][ T8025] Node 0 active_anon:397296kB inactive_anon:36596kB active_file:36296kB inactive_file:51348kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241500kB dirty:16kB writeback:0kB shmem:260kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no
[  125.440326][ T8039] FAULT_INJECTION: forcing a failure.
[  125.440326][ T8039] name failslab, interval 1, probability 0, space 0, times 0
[  125.473979][ T8039] CPU: 0 PID: 8039 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  125.476817][ T8025] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB
[  125.484056][ T8039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  125.484060][ T8039] Call Trace:
[  125.484077][ T8039]  dump_stack+0x1b0/0x228
[  125.484087][ T8039]  ? devkmsg_release+0x127/0x127
15:46:53 executing program 4:
r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)=0x1)
read(r0, &(0x7f0000ec6000)=""/50, 0x32)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}})
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
truncate(&(0x7f0000000100)='./file0\x00', 0x81)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x1, 0xffff}]})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x1, 0x0, 0x0, 0xf})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)

15:46:53 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x535840, 0x0)
ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2, 0x4, 0x7e, 0x8}, {0x4, 0x0, 0x3f, 0x1}]})
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001})
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00')
r2 = open(&(0x7f0000002000)='./bus\x00', 0x161042, 0x0)
sendfile(r2, r1, 0x0, 0x3e)

15:46:53 executing program 2 (fault-call:4 fault-nth:18):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  125.484095][ T8039]  ? show_regs_print_info+0x18/0x18
[  125.484103][ T8039]  ? new_inode_pseudo+0x7f/0x240
[  125.484111][ T8039]  ? __sys_socket+0x115/0x350
[  125.484117][ T8039]  ? __x64_sys_socket+0x7a/0x90
[  125.484124][ T8039]  ? do_syscall_64+0xc0/0x100
[  125.484134][ T8039]  should_fail+0x6fb/0x860
[  125.484142][ T8039]  ? setup_fault_attr+0x2b0/0x2b0
[  125.484151][ T8039]  ? ___slab_alloc+0xab/0x450
[  125.484160][ T8039]  __should_failslab+0x11a/0x160
[  125.484170][ T8039]  ? __d_alloc+0x2d/0x6d0
[  125.484178][ T8039]  should_failslab+0x9/0x20
[  125.484186][ T8039]  kmem_cache_alloc+0x37/0x2b0
[  125.484194][ T8039]  ? expand_files+0xd1/0x970
[  125.484202][ T8039]  __d_alloc+0x2d/0x6d0
[  125.484217][ T8039]  d_alloc_pseudo+0x1d/0x70
[  125.520088][ T8025] lowmem_reserve[]: 0 2926 6432 6432
[  125.520229][ T8039]  alloc_file_pseudo+0x128/0x310
[  125.520240][ T8039]  ? alloc_empty_file_noaccount+0x80/0x80
[  125.520248][ T8039]  ? __alloc_fd+0x4e6/0x590
[  125.520264][ T8039]  sock_alloc_file+0xbb/0x250
[  125.524028][ T8025] DMA32 free:2996688kB min:4660kB low:7656kB high:10652kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1396kB local_pcp:0kB free_cma:0kB
[  125.528026][ T8039]  __sys_socket+0x17c/0x350
[  125.528034][ T8039]  ? sock_create_kern+0x50/0x50
[  125.528043][ T8039]  __x64_sys_socket+0x7a/0x90
[  125.528051][ T8039]  do_syscall_64+0xc0/0x100
[  125.528061][ T8039]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  125.528070][ T8039] RIP: 0033:0x45b349
[  125.528078][ T8039] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  125.528088][ T8039] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  125.533449][ T8025] lowmem_reserve[]: 0 0 3506 3506
[  125.538210][ T8039] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  125.538215][ T8039] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  125.538218][ T8039] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  125.538222][ T8039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  125.538226][ T8039] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000011
15:46:53 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  125.757939][ T8025] Normal free:2534316kB min:5588kB low:9176kB high:12764kB active_anon:397796kB inactive_anon:36596kB active_file:36296kB inactive_file:51348kB unevictable:0kB writepending:224kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:3840kB pagetables:4696kB bounce:0kB free_pcp:2464kB local_pcp:1268kB free_cma:0kB
[  125.791641][ T8025] lowmem_reserve[]: 0 0 0 0
[  125.796804][ T8025] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB
[  125.816189][ T8025] DMA32: 4*4kB (M) 2*8kB (M) 5*16kB (M) 3*32kB (M) 2*64kB (M) 3*128kB (M) 3*256kB (M) 2*512kB (M) 2*1024kB (M) 1*2048kB (M) 730*4096kB (M) = 2996688kB
15:46:53 executing program 3:
r0 = creat(0x0, 0x0)
unshare(0x40000000)
fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0x100000001}, 0x16, 0x3)
r1 = pkey_alloc(0x0, 0x0)
pkey_mprotect(&(0x7f00002d5000/0x1000)=nil, 0x1000, 0x0, r1)
r2 = socket(0x10, 0x80002, 0x0)
connect$netlink(r2, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc)
sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000380)=@newtaction={0x2c, 0x32, 0x81fdfaa6b79c4819, 0x0, 0x0, {}, [{0x18}]}, 0x2c}}, 0x0)
getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4)
socket$can_raw(0x1d, 0x3, 0x1)
ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000100)={0x6, 'erspan0\x00', {}, 0x80})
pkey_free(r1)

[  125.833714][ T8025] Normal: 59*4kB (UME) 84*8kB (UE) 249*16kB (UME) 38*32kB (UE) 203*64kB (UME) 153*128kB (UE) 128*256kB (UME) 52*512kB (UE) 34*1024kB (U) 2*2048kB (UE) 585*4096kB (M) = 2533148kB
[  125.857794][ T8025] 21972 total pagecache pages
[  125.862695][ T8058] FAULT_INJECTION: forcing a failure.
[  125.862695][ T8058] name failslab, interval 1, probability 0, space 0, times 0
[  125.867961][ T8025] 0 pages in swap cache
15:46:53 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  125.897358][ T8025] Swap cache stats: add 0, delete 0, find 0/0
[  125.903775][ T8025] Free swap  = 0kB
[  125.912091][ T8025] Total swap = 0kB
[  125.918499][ T8025] 1965979 pages RAM
[  125.923477][ T8025] 0 pages HighMem/MovableOnly
[  125.923989][ T8058] CPU: 1 PID: 8058 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
15:46:53 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, 0x0, 0x0)

15:46:53 executing program 4:
mknod(&(0x7f0000000040)='./bus\x00', 0x2000000000001000, 0x0)
open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0)
open(&(0x7f0000000280)='./bus\x00', 0x80040, 0x8)
io_setup(0x3, &(0x7f0000000200)=<r1=>0x0)
fcntl$setstatus(r0, 0x4, 0x4800)
r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0)
r3 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r3, 0x0, r3)
ftruncate(r3, 0x0)
write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14)
r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = socket$nl_xfrm(0x10, 0x3, 0x6)
r7 = open(&(0x7f00000003c0)='./file1\x00', 0x212182, 0x194)
getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000000c0)={<r8=>0x0, @multicast1, @local}, &(0x7f0000000140)=0xc)
r9 = socket(0x1, 0x5, 0x0)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x5)
setreuid(0x0, r10)
sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="3c020000100013070000000000000000fe880000000000000000000000000001ac1e00010000000000000000000000004e2200ff00000000020000000000000060b5f8d6ddea0626866d59c6fb12acc0607b0f06a315496ba897ae62d773ac8ecb4536fbd21560fcc806b9539e1215091262012704a0a2fb2b8dc08935bdbc8e6829dbae3e447861e9a8d8a6b8433612cc9c86a64c71de2a31a4363c336e5a148b5696ae03dda1963ff0cb67d6aa76d6f792d77cff50bce5207680db49eb95370366897b2456e7785aa457c0daebbd5cd516e372d75dc0a9218ec51a06d0fc0ae9a4425f6853b96aa9264353c3cc1a", @ANYRES32=0x0, @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r8, @ANYRES32, @ANYBLOB], 0x7}}, 0x0)
lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x5, 0x4}, {0x0, 0x5}], r10}, 0x18, 0x6)
io_submit(r1, 0x3, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3002}])

[  125.938217][ T8058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  125.945764][ T8025] 314802 pages reserved
[  125.948264][ T8058] Call Trace:
[  125.948281][ T8058]  dump_stack+0x1b0/0x228
[  125.948296][ T8058]  ? devkmsg_release+0x127/0x127
[  125.953968][ T8025] 0 pages cma reserved
[  125.955833][ T8058]  ? show_regs_print_info+0x18/0x18
[  125.955848][ T8058]  ? new_inode_pseudo+0x7f/0x240
[  125.979423][ T8058]  ? __sys_socket+0x115/0x350
[  125.984081][ T8058]  ? __x64_sys_socket+0x7a/0x90
[  125.988912][ T8058]  ? do_syscall_64+0xc0/0x100
[  125.993582][ T8058]  should_fail+0x6fb/0x860
[  125.997975][ T8058]  ? setup_fault_attr+0x2b0/0x2b0
[  126.003069][ T8058]  ? should_fail+0x182/0x860
[  126.007740][ T8058]  __should_failslab+0x11a/0x160
[  126.012656][ T8058]  ? __d_alloc+0x2d/0x6d0
[  126.017022][ T8058]  should_failslab+0x9/0x20
[  126.021502][ T8058]  kmem_cache_alloc+0x37/0x2b0
[  126.026250][ T8058]  ? expand_files+0xd1/0x970
[  126.030816][ T8058]  __d_alloc+0x2d/0x6d0
[  126.034950][ T8058]  d_alloc_pseudo+0x1d/0x70
[  126.039490][ T8058]  alloc_file_pseudo+0x128/0x310
[  126.044406][ T8058]  ? alloc_empty_file_noaccount+0x80/0x80
[  126.050104][ T8058]  ? __alloc_fd+0x4e6/0x590
[  126.054584][ T8058]  sock_alloc_file+0xbb/0x250
[  126.059246][ T8058]  __sys_socket+0x17c/0x350
[  126.063728][ T8058]  ? sock_create_kern+0x50/0x50
[  126.068554][ T8058]  __x64_sys_socket+0x7a/0x90
[  126.073203][ T8058]  do_syscall_64+0xc0/0x100
[  126.077690][ T8058]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  126.083555][ T8058] RIP: 0033:0x45b349
[  126.087432][ T8058] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  126.107038][ T8058] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[  126.115439][ T8058] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  126.123419][ T8058] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  126.131365][ T8058] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  126.139464][ T8058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
15:46:53 executing program 2 (fault-call:4 fault-nth:19):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  126.147437][ T8058] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000012
15:46:53 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, 0x0, 0x0)

15:46:53 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  126.192488][ T8069] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'.
15:46:53 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0)

[  126.252501][ T8094] FAULT_INJECTION: forcing a failure.
[  126.252501][ T8094] name failslab, interval 1, probability 0, space 0, times 0
[  126.266405][ T8094] CPU: 0 PID: 8094 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  126.276483][ T8094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  126.286531][ T8094] Call Trace:
[  126.289815][ T8094]  dump_stack+0x1b0/0x228
[  126.294144][ T8094]  ? devkmsg_release+0x127/0x127
15:46:53 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0)

[  126.299083][ T8094]  ? show_regs_print_info+0x18/0x18
[  126.304300][ T8094]  ? security_transition_sid+0x90/0x90
[  126.309781][ T8094]  should_fail+0x6fb/0x860
[  126.314202][ T8094]  ? setup_fault_attr+0x2b0/0x2b0
[  126.319225][ T8094]  ? should_fail+0x182/0x860
[  126.323804][ T8094]  ? inode_doinit_with_dentry+0x117/0x10e0
[  126.329591][ T8094]  __should_failslab+0x11a/0x160
[  126.334566][ T8094]  ? __alloc_file+0x29/0x3b0
[  126.339251][ T8094]  should_failslab+0x9/0x20
[  126.343790][ T8094]  kmem_cache_alloc+0x37/0x2b0
[  126.348560][ T8094]  ? _raw_spin_trylock_bh+0x190/0x190
[  126.353949][ T8094]  __alloc_file+0x29/0x3b0
[  126.358347][ T8094]  ? alloc_empty_file+0x4c/0x1b0
[  126.363450][ T8094]  alloc_empty_file+0xac/0x1b0
[  126.368199][ T8094]  alloc_file+0x5b/0x4b0
[  126.372530][ T8094]  ? _raw_spin_unlock+0x9/0x20
[  126.377281][ T8094]  alloc_file_pseudo+0x25b/0x310
[  126.382200][ T8094]  ? alloc_empty_file_noaccount+0x80/0x80
[  126.387959][ T8094]  ? __alloc_fd+0x4e6/0x590
[  126.392521][ T8094]  sock_alloc_file+0xbb/0x250
[  126.397186][ T8094]  __sys_socket+0x17c/0x350
[  126.401726][ T8094]  ? sock_create_kern+0x50/0x50
[  126.406561][ T8094]  __x64_sys_socket+0x7a/0x90
[  126.411223][ T8094]  do_syscall_64+0xc0/0x100
[  126.415714][ T8094]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  126.421580][ T8094] RIP: 0033:0x45b349
[  126.425450][ T8094] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  126.445051][ T8094] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
15:46:53 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  126.453446][ T8094] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349
[  126.461401][ T8094] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
[  126.469361][ T8094] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  126.477316][ T8094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  126.485278][ T8094] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000013
[  126.494515][   T22] kauditd_printk_skb: 124 callbacks suppressed
15:46:54 executing program 2 (fault-call:4 fault-nth:20):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  126.494522][   T22] audit: type=1326 audit(1580485613.976:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=0 compat=0 ip=0x414e81 code=0x7ffc0000
[  126.526039][   T22] audit: type=1326 audit(1580485613.976:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414e21 code=0x7ffc0000
15:46:54 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  126.551203][   T22] audit: type=1326 audit(1580485613.976:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=3 compat=0 ip=0x414ee1 code=0x7ffc0000
[  126.576545][   T22] audit: type=1326 audit(1580485613.976:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  126.609560][   T22] audit: type=1326 audit(1580485613.986:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  126.637100][   T22] audit: type=1326 audit(1580485613.986:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  126.675469][   T22] audit: type=1326 audit(1580485614.156:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8109 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  126.676976][ T8116] FAULT_INJECTION: forcing a failure.
[  126.676976][ T8116] name failslab, interval 1, probability 0, space 0, times 0
[  126.701543][   T22] audit: type=1326 audit(1580485614.156:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8109 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  126.714350][ T8116] CPU: 0 PID: 8116 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  126.749247][ T8116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  126.759289][ T8116] Call Trace:
[  126.762569][ T8116]  dump_stack+0x1b0/0x228
[  126.767036][ T8116]  ? devkmsg_release+0x127/0x127
[  126.771969][ T8116]  ? arch_stack_walk+0x98/0xe0
[  126.776734][ T8116]  ? show_regs_print_info+0x18/0x18
[  126.781920][ T8116]  should_fail+0x6fb/0x860
[  126.786313][ T8116]  ? setup_fault_attr+0x2b0/0x2b0
[  126.791331][ T8116]  ? audit_filter+0xeb9/0xf20
[  126.796003][ T8116]  ? stack_trace_snprint+0x150/0x150
[  126.801274][ T8116]  __should_failslab+0x11a/0x160
[  126.806194][ T8116]  ? audit_log_start+0x475/0x9a0
[  126.811216][ T8116]  should_failslab+0x9/0x20
[  126.815726][ T8116]  kmem_cache_alloc+0x37/0x2b0
[  126.820474][ T8116]  ? kasan_slab_alloc+0xe/0x10
[  126.825231][ T8116]  ? kmem_cache_alloc+0x120/0x2b0
[  126.830237][ T8116]  ? security_file_alloc+0x36/0x210
[  126.835428][ T8116]  audit_log_start+0x475/0x9a0
[  126.840179][ T8116]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  126.846238][ T8116]  ? audit_serial+0x30/0x30
[  126.850736][ T8116]  ? alloc_file_pseudo+0x128/0x310
[  126.855838][ T8116]  ? sock_alloc_file+0xbb/0x250
[  126.860679][ T8116]  ? __sys_socket+0x17c/0x350
[  126.865344][ T8116]  ? __x64_sys_socket+0x7a/0x90
[  126.870180][ T8116]  ? do_syscall_64+0xc0/0x100
[  126.874851][ T8116]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  126.880908][ T8116]  ? should_fail+0x182/0x860
[  126.885475][ T8116]  ? __sys_socket+0x115/0x350
[  126.890137][ T8116]  ? __x64_sys_socket+0x7a/0x90
[  126.894980][ T8116]  ? setup_fault_attr+0x2b0/0x2b0
[  126.899993][ T8116]  audit_seccomp+0x62/0x180
[  126.904479][ T8116]  __seccomp_filter+0xd15/0x1890
[  126.909404][ T8116]  ? __secure_computing+0x240/0x240
[  126.914584][ T8116]  ? __kasan_check_write+0x14/0x20
[  126.919698][ T8116]  ? __mutex_init+0xa1/0xf0
[  126.924194][ T8116]  ? percpu_counter_add_batch+0x136/0x160
[  126.929901][ T8116]  ? alloc_file+0x84/0x4b0
[  126.934304][ T8116]  ? memcpy+0x49/0x60
[  126.938529][ T8116]  ? errseq_sample+0x43/0x70
[  126.943228][ T8116]  ? alloc_file+0x3d3/0x4b0
[  126.947720][ T8116]  ? alloc_file_pseudo+0x282/0x310
[  126.952833][ T8116]  ? alloc_empty_file_noaccount+0x80/0x80
[  126.961052][ T8116]  ? __alloc_fd+0x4e6/0x590
[  126.965551][ T8116]  __secure_computing+0x1c6/0x240
[  126.970568][ T8116]  syscall_trace_enter+0x596/0xa90
[  126.975666][ T8116]  ? switch_fpu_return+0x10/0x10
[  126.980586][ T8116]  ? do_syscall_64+0x100/0x100
[  126.985334][ T8116]  ? syscall_return_slowpath+0x6f/0x500
[  126.991000][ T8116]  do_syscall_64+0x6b/0x100
[  126.995512][ T8116]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  127.008267][ T8116] RIP: 0033:0x414e81
[  127.012272][ T8116] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  127.031893][ T8116] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000
[  127.040466][ T8116] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81
[  127.048446][ T8116] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005
[  127.056423][ T8116] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  127.064503][ T8116] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005
[  127.072469][ T8116] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000014
[  127.080633][   T22] audit: type=1326 audit(1580485614.156:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8109 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  127.092120][ T8116] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64
15:46:55 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f00000010c0)={{0x2, 0x2, 0xfffff31c, 0x1, 0x7}, 0x2, 0xb34, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0xe4e, 0x4, 0x7})
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, r0, 0x0)
r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0)
write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f)
sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe)
readv(r0, &(0x7f0000002440)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1)

15:46:55 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0)

15:46:55 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:55 executing program 2 (fault-call:4 fault-nth:21):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:55 executing program 3:
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
lseek(r0, 0x0, 0x0)
write$selinux_access(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0de2a219d3f0fe00abe86fc09a0ea4c6541184edb0b165036cefd106bd"], 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
r3 = syz_genetlink_get_family_id$ipvs(0x0)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
lseek(r4, 0x6, 0x0)
ioctl$TCSETSW(r4, 0x5403, &(0x7f0000000140)={0x87, 0x400009, 0x7f, 0x7fe, 0x9, "e687fd8d2669dc414f3b4df033e7734607e544"})
r5 = dup(0xffffffffffffffff)
ioctl$EVIOCGBITKEY(r5, 0x80404521, &(0x7f0000000280)=""/65)
sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r3, 0x400, 0x0, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0xc1}, 0x0)
open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800)
inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x80000000)
sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0)
flock(0xffffffffffffffff, 0x0)
write$9p(r1, &(0x7f0000001400)="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", 0x600)
sendfile(r1, r2, 0x0, 0x1c5f2)

15:46:55 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:55 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0)

[  127.589193][ T8137] FAULT_INJECTION: forcing a failure.
[  127.589193][ T8137] name failslab, interval 1, probability 0, space 0, times 0
[  127.602684][ T8137] CPU: 0 PID: 8137 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  127.612767][ T8137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  127.622815][ T8137] Call Trace:
[  127.626107][ T8137]  dump_stack+0x1b0/0x228
[  127.630422][ T8137]  ? devkmsg_release+0x127/0x127
[  127.635466][ T8137]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  127.641529][ T8137]  ? show_regs_print_info+0x18/0x18
[  127.646782][ T8137]  ? unwind_get_return_address+0x4c/0x90
[  127.652403][ T8137]  should_fail+0x6fb/0x860
[  127.656940][ T8137]  ? setup_fault_attr+0x2b0/0x2b0
[  127.661976][ T8137]  ? should_fail+0x182/0x860
[  127.666558][ T8137]  __should_failslab+0x11a/0x160
[  127.671481][ T8137]  ? __alloc_skb+0xbc/0x540
[  127.676114][ T8137]  should_failslab+0x9/0x20
[  127.680611][ T8137]  kmem_cache_alloc+0x37/0x2b0
[  127.685369][ T8137]  __alloc_skb+0xbc/0x540
[  127.689684][ T8137]  ? kmem_cache_alloc+0x120/0x2b0
[  127.694702][ T8137]  ? security_file_alloc+0x36/0x210
[  127.700008][ T8137]  audit_log_start+0x4a1/0x9a0
[  127.704770][ T8137]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  127.710840][ T8137]  ? audit_serial+0x30/0x30
[  127.715332][ T8137]  ? alloc_file_pseudo+0x128/0x310
[  127.720543][ T8137]  ? sock_alloc_file+0xbb/0x250
[  127.725389][ T8137]  ? __sys_socket+0x17c/0x350
[  127.730878][ T8137]  ? __x64_sys_socket+0x7a/0x90
[  127.735723][ T8137]  ? do_syscall_64+0xc0/0x100
[  127.740830][ T8137]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  127.746894][ T8137]  ? should_fail+0x182/0x860
[  127.751494][ T8137]  ? __sys_socket+0x115/0x350
[  127.756163][ T8137]  ? __x64_sys_socket+0x7a/0x90
[  127.761019][ T8137]  ? do_syscall_64+0xc0/0x100
[  127.765688][ T8137]  ? setup_fault_attr+0x2b0/0x2b0
[  127.770694][ T8137]  audit_seccomp+0x62/0x180
[  127.775460][ T8137]  __seccomp_filter+0xd15/0x1890
[  127.780468][ T8137]  ? __secure_computing+0x240/0x240
[  127.785770][ T8137]  ? __kasan_check_write+0x14/0x20
[  127.790870][ T8137]  ? __mutex_init+0xa1/0xf0
[  127.795375][ T8137]  ? percpu_counter_add_batch+0x136/0x160
[  127.801360][ T8137]  ? alloc_file+0x84/0x4b0
[  127.805882][ T8137]  ? memcpy+0x49/0x60
[  127.809847][ T8137]  ? errseq_sample+0x43/0x70
[  127.814434][ T8137]  ? alloc_file+0x3d3/0x4b0
[  127.818936][ T8137]  ? alloc_file_pseudo+0x282/0x310
[  127.824043][ T8137]  ? alloc_empty_file_noaccount+0x80/0x80
[  127.829742][ T8137]  ? __alloc_fd+0x4e6/0x590
[  127.834248][ T8137]  __secure_computing+0x1c6/0x240
[  127.839322][ T8137]  syscall_trace_enter+0x596/0xa90
[  127.844441][ T8137]  ? switch_fpu_return+0x10/0x10
[  127.849458][ T8137]  ? do_syscall_64+0x100/0x100
[  127.854360][ T8137]  ? syscall_return_slowpath+0x6f/0x500
[  127.859890][ T8137]  do_syscall_64+0x6b/0x100
[  127.864390][ T8137]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  127.870269][ T8137] RIP: 0033:0x414e81
[  127.874167][ T8137] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  127.893758][ T8137] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000
[  127.902257][ T8137] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81
[  127.910218][ T8137] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005
[  127.918182][ T8137] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  127.926145][ T8137] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005
15:46:55 executing program 2 (fault-call:4 fault-nth:22):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:55 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0)

[  127.934104][ T8137] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000015
15:46:55 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:55 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:55 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0)

[  128.039517][ T8155] FAULT_INJECTION: forcing a failure.
[  128.039517][ T8155] name failslab, interval 1, probability 0, space 0, times 0
[  128.059798][ T8155] CPU: 0 PID: 8155 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  128.069902][ T8155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  128.079956][ T8155] Call Trace:
[  128.083267][ T8155]  dump_stack+0x1b0/0x228
[  128.087593][ T8155]  ? devkmsg_release+0x127/0x127
[  128.092545][ T8155]  ? __seccomp_filter+0xd15/0x1890
[  128.097666][ T8155]  ? show_regs_print_info+0x18/0x18
[  128.102869][ T8155]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  128.108946][ T8155]  ? __kernel_text_address+0x9a/0x110
[  128.114335][ T8155]  ? unwind_get_return_address+0x4c/0x90
[  128.119965][ T8155]  should_fail+0x6fb/0x860
[  128.124380][ T8155]  ? setup_fault_attr+0x2b0/0x2b0
[  128.129402][ T8155]  ? setup_fault_attr+0x2b0/0x2b0
[  128.134434][ T8155]  ? should_fail+0x182/0x860
[  128.139033][ T8155]  __should_failslab+0x11a/0x160
[  128.143978][ T8155]  ? audit_log_start+0x4a1/0x9a0
[  128.148923][ T8155]  should_failslab+0x9/0x20
[  128.153535][ T8155]  __kmalloc_track_caller+0x5f/0x320
[  128.158826][ T8155]  ? kmem_cache_alloc+0x120/0x2b0
[  128.163900][ T8155]  ? audit_log_start+0x4a1/0x9a0
[  128.169001][ T8155]  __alloc_skb+0x109/0x540
[  128.173425][ T8155]  audit_log_start+0x4a1/0x9a0
[  128.178287][ T8155]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  128.184368][ T8155]  ? audit_serial+0x30/0x30
[  128.188889][ T8155]  ? alloc_file_pseudo+0x128/0x310
[  128.194011][ T8155]  ? sock_alloc_file+0xbb/0x250
[  128.198876][ T8155]  ? __sys_socket+0x17c/0x350
[  128.203558][ T8155]  ? __x64_sys_socket+0x7a/0x90
[  128.208422][ T8155]  ? do_syscall_64+0xc0/0x100
[  128.213163][ T8155]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  128.219369][ T8155]  ? should_fail+0x182/0x860
[  128.223992][ T8155]  ? __sys_socket+0x115/0x350
[  128.229690][ T8155]  ? __x64_sys_socket+0x7a/0x90
[  128.234550][ T8155]  ? do_syscall_64+0xc0/0x100
[  128.239239][ T8155]  ? setup_fault_attr+0x2b0/0x2b0
[  128.244274][ T8155]  audit_seccomp+0x62/0x180
[  128.248781][ T8155]  __seccomp_filter+0xd15/0x1890
[  128.253720][ T8155]  ? __secure_computing+0x240/0x240
[  128.258931][ T8155]  ? __kasan_check_write+0x14/0x20
[  128.264060][ T8155]  ? __mutex_init+0xa1/0xf0
[  128.268573][ T8155]  ? percpu_counter_add_batch+0x136/0x160
[  128.274301][ T8155]  ? alloc_file+0x84/0x4b0
[  128.278722][ T8155]  ? memcpy+0x49/0x60
[  128.282750][ T8155]  ? errseq_sample+0x43/0x70
[  128.287341][ T8155]  ? alloc_file+0x3d3/0x4b0
[  128.291851][ T8155]  ? alloc_file_pseudo+0x282/0x310
[  128.296966][ T8155]  ? alloc_empty_file_noaccount+0x80/0x80
[  128.302709][ T8155]  ? __alloc_fd+0x4e6/0x590
[  128.307216][ T8155]  __secure_computing+0x1c6/0x240
[  128.312253][ T8155]  syscall_trace_enter+0x596/0xa90
[  128.317417][ T8155]  ? fd_install+0x51/0x60
[  128.321747][ T8155]  ? do_syscall_64+0x100/0x100
[  128.326569][ T8155]  ? syscall_return_slowpath+0x6f/0x500
[  128.332787][ T8155]  do_syscall_64+0x6b/0x100
[  128.337331][ T8155]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  128.343665][ T8155] RIP: 0033:0x414e81
[  128.347573][ T8155] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  128.367372][ T8155] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000
[  128.375785][ T8155] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81
[  128.383764][ T8155] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005
[  128.391740][ T8155] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  128.399804][ T8155] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005
[  128.407877][ T8155] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000016
15:46:55 executing program 3:
unshare(0x400)
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, <r1=>0x0})
syz_open_procfs(r1, &(0x7f00000000c0)='net/ip6_mr_vif\x00')
r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0)
fremovexattr(r2, &(0x7f0000000000)=@known='security.apparmor\x00')
syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00')
prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040))

15:46:55 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
write$P9_RLERRORu(r2, &(0x7f0000000000)={0x11, 0x7, 0x2, {{0x4, 'sit\x00'}, 0x8}}, 0x11)
r3 = socket$netlink(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000000000050700007fc40000000000000057", @ANYRES32=r5, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r6], 0x38}}, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000700)=ANY=[@ANYBLOB="400000001000472d390400800000000000000000", @ANYRES32=r6, @ANYBLOB="000000000000000020001280080001007369740014000280080005000000000005000a0000000000"], 0x40}}, 0x0)

15:46:55 executing program 2 (fault-call:4 fault-nth:23):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:55 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:55 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab00"], 0x1c)

[  128.491039][ T8176] FAULT_INJECTION: forcing a failure.
[  128.491039][ T8176] name failslab, interval 1, probability 0, space 0, times 0
[  128.503978][ T8176] CPU: 0 PID: 8176 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  128.514037][ T8176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  128.524080][ T8176] Call Trace:
[  128.527385][ T8176]  dump_stack+0x1b0/0x228
[  128.531705][ T8176]  ? devkmsg_release+0x127/0x127
[  128.536620][ T8176]  ? number+0xeac/0x1170
[  128.540850][ T8176]  ? show_regs_print_info+0x18/0x18
[  128.546037][ T8176]  ? put_dec_trunc8+0x1c4/0x2d0
[  128.550874][ T8176]  should_fail+0x6fb/0x860
[  128.555276][ T8176]  ? setup_fault_attr+0x2b0/0x2b0
[  128.560284][ T8176]  ? find_next_bit+0xd8/0x120
[  128.564938][ T8176]  __should_failslab+0x11a/0x160
[  128.569960][ T8176]  ? context_struct_to_string+0x3b5/0x7f0
[  128.575672][ T8176]  should_failslab+0x9/0x20
[  128.580236][ T8176]  __kmalloc+0x64/0x310
[  128.584381][ T8176]  context_struct_to_string+0x3b5/0x7f0
[  128.589940][ T8176]  ? security_bounded_transition+0x520/0x520
[  128.595909][ T8176]  ? sidtab_search+0x194/0x3a0
[  128.600656][ T8176]  security_sid_to_context_core+0x259/0x380
[  128.606538][ T8176]  security_sid_to_context+0x33/0x40
[  128.611828][ T8176]  selinux_secid_to_secctx+0x2a/0x40
[  128.617154][ T8176]  security_secid_to_secctx+0x66/0xd0
[  128.622627][ T8176]  audit_log_task_context+0xf0/0x2d0
[  128.627915][ T8176]  ? audit_log_key+0x140/0x140
[  128.632669][ T8176]  ? audit_serial+0x30/0x30
[  128.637160][ T8176]  ? alloc_file_pseudo+0x128/0x310
[  128.642254][ T8176]  audit_log_task+0x17d/0x2e0
[  128.646958][ T8176]  ? audit_core_dumps+0x100/0x100
[  128.651967][ T8176]  ? should_fail+0x182/0x860
[  128.656537][ T8176]  ? __sys_socket+0x115/0x350
[  128.661193][ T8176]  ? __x64_sys_socket+0x7a/0x90
[  128.666034][ T8176]  ? do_syscall_64+0xc0/0x100
[  128.670766][ T8176]  ? setup_fault_attr+0x2b0/0x2b0
[  128.675776][ T8176]  audit_seccomp+0x83/0x180
[  128.680277][ T8176]  __seccomp_filter+0xd15/0x1890
[  128.685202][ T8176]  ? __secure_computing+0x240/0x240
[  128.690387][ T8176]  ? __kasan_check_write+0x14/0x20
[  128.695487][ T8176]  ? __mutex_init+0xa1/0xf0
[  128.699989][ T8176]  ? percpu_counter_add_batch+0x136/0x160
[  128.705687][ T8176]  ? alloc_file+0x84/0x4b0
[  128.710221][ T8176]  ? memcpy+0x49/0x60
[  128.714184][ T8176]  ? errseq_sample+0x43/0x70
[  128.718750][ T8176]  ? alloc_file+0x3d3/0x4b0
[  128.723242][ T8176]  ? alloc_file_pseudo+0x282/0x310
[  128.728339][ T8176]  ? alloc_empty_file_noaccount+0x80/0x80
[  128.734035][ T8176]  ? __alloc_fd+0x4e6/0x590
[  128.738520][ T8176]  __secure_computing+0x1c6/0x240
[  128.743526][ T8176]  syscall_trace_enter+0x596/0xa90
[  128.748614][ T8176]  ? switch_fpu_return+0x10/0x10
[  128.753584][ T8176]  ? do_syscall_64+0x100/0x100
[  128.758377][ T8176]  ? syscall_return_slowpath+0x6f/0x500
[  128.763949][ T8176]  do_syscall_64+0x6b/0x100
[  128.768439][ T8176]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  128.774311][ T8176] RIP: 0033:0x414e81
[  128.778183][ T8176] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  128.797882][ T8176] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000
[  128.806274][ T8176] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81
[  128.814446][ T8176] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005
[  128.822403][ T8176] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  128.830361][ T8176] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005
15:46:56 executing program 2 (fault-call:4 fault-nth:24):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  128.838329][ T8176] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000017
15:46:56 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  128.900966][ T8189] SELinux: ebitmap: truncated map
[  128.908840][ T8189] sel_write_load: 17 callbacks suppressed
[  128.908843][ T8189] SELinux: failed to load policy
[  128.921281][ T8184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8184 comm=syz-executor.4
[  128.923570][ T8191] SELinux: failed to load policy
15:46:56 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab00"], 0x1c)

[  128.947335][ T8190] FAULT_INJECTION: forcing a failure.
[  128.947335][ T8190] name failslab, interval 1, probability 0, space 0, times 0
[  128.954452][ T8184] netlink: 'syz-executor.4': attribute type 5 has an invalid length.
[  128.972128][ T8190] CPU: 0 PID: 8190 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  128.975618][ T8199] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8199 comm=syz-executor.4
15:46:56 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  128.982214][ T8190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  128.982217][ T8190] Call Trace:
[  128.982237][ T8190]  dump_stack+0x1b0/0x228
[  128.982247][ T8190]  ? devkmsg_release+0x127/0x127
[  128.982256][ T8190]  ? show_regs_print_info+0x18/0x18
[  128.982265][ T8190]  ? audit_log_format+0x110/0x110
[  128.982276][ T8190]  should_fail+0x6fb/0x860
[  128.982284][ T8190]  ? setup_fault_attr+0x2b0/0x2b0
[  128.982292][ T8190]  ? audit_log_format+0xc8/0x110
[  128.982301][ T8190]  ? __rcu_read_lock+0x50/0x50
15:46:56 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab00"], 0x1c)

[  128.982311][ T8190]  __should_failslab+0x11a/0x160
[  128.982318][ T8190]  ? audit_log_d_path+0xc2/0x260
[  128.982327][ T8190]  should_failslab+0x9/0x20
[  128.982336][ T8190]  kmem_cache_alloc_trace+0x3a/0x2f0
[  128.982344][ T8190]  audit_log_d_path+0xc2/0x260
[  128.982358][ T8190]  audit_log_d_path_exe+0x42/0x70
[  129.052281][ T8207] SELinux: failed to load policy
[  129.056900][ T8190]  audit_log_task+0x201/0x2e0
[  129.056909][ T8190]  ? audit_core_dumps+0x100/0x100
[  129.056919][ T8190]  ? should_fail+0x182/0x860
[  129.056929][ T8190]  ? __sys_socket+0x115/0x350
[  129.056936][ T8190]  ? __x64_sys_socket+0x7a/0x90
[  129.056948][ T8190]  ? do_syscall_64+0xc0/0x100
[  129.109958][ T8190]  ? setup_fault_attr+0x2b0/0x2b0
[  129.114964][ T8190]  audit_seccomp+0x83/0x180
[  129.119497][ T8190]  __seccomp_filter+0xd15/0x1890
[  129.124413][ T8190]  ? __secure_computing+0x240/0x240
[  129.129594][ T8190]  ? __kasan_check_write+0x14/0x20
[  129.134694][ T8190]  ? __mutex_init+0xa1/0xf0
[  129.139177][ T8190]  ? percpu_counter_add_batch+0x136/0x160
[  129.144922][ T8190]  ? alloc_file+0x84/0x4b0
[  129.149330][ T8190]  ? memcpy+0x49/0x60
[  129.153332][ T8190]  ? errseq_sample+0x43/0x70
[  129.157906][ T8190]  ? alloc_file+0x3d3/0x4b0
[  129.162385][ T8190]  ? alloc_file_pseudo+0x282/0x310
[  129.167480][ T8190]  ? alloc_empty_file_noaccount+0x80/0x80
[  129.173187][ T8190]  ? __alloc_fd+0x4e6/0x590
[  129.177682][ T8190]  __secure_computing+0x1c6/0x240
[  129.182685][ T8190]  syscall_trace_enter+0x596/0xa90
[  129.187771][ T8190]  ? switch_fpu_return+0x10/0x10
[  129.192694][ T8190]  ? do_syscall_64+0x100/0x100
[  129.197547][ T8190]  ? syscall_return_slowpath+0x6f/0x500
[  129.203097][ T8190]  do_syscall_64+0x6b/0x100
[  129.207587][ T8190]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  129.213470][ T8190] RIP: 0033:0x414e81
[  129.217354][ T8190] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  129.237040][ T8190] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000
15:46:56 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00')
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$TIOCGLCKTRMIOS(r5, 0x5456, &(0x7f0000000040)={0x3, 0x9, 0x7, 0xffffffff, 0x6, "44d97f15a71a065601c14570a6bda66c80f15d"})
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r6 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x24)
fchdir(r6)
r7 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r7, 0x800)
socket$inet6_tcp(0xa, 0x1, 0x0)
lseek(r7, 0x0, 0x2)
r8 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0)
sendfile(r7, r8, 0x0, 0x280900)

15:46:56 executing program 4:
pipe(&(0x7f0000000180)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe0700000000000700ff3f03000000450001070000001419001a0004", 0x25}], 0x1)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa)
pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="12c66ff5d1735482a50440f485a839297c4ef37f3c837638e627af4fbee2b5ec041c1fd2ef3106271657a63cc9ab9161f6357052024ca016f0eff531e355d31cfdc080228d30301586d17579d3c015b3367d1d4a292c9b40011f403c1de43146ff0dcca5e829c61bd20384b9db70fd70334a40826550da1b52fe7d122e0980b4c46639aa9f48db2948c45e972ede64468f747aea240fb54e4b2ac572ee62f51ff5245162f64710e50e3cc91ee15226b54e68939dc7bb22bceab694b6e927964d1832ddd98c7b3f8f36007c32b2a5373fe6d9083f2eeec50cc4e5a0ed7e3179c4562ceeb07f1a57c3d9233f1772311e533cddbd4008461930c420160e41e9f06ac8034051d32e273fc2e4bc6d008d4b40ca5200266cb38b447dae12581f77e89b0c7cfb9a5e538494befe1e3fa7e9f99ade5a14cf88562be4851656da8561a2e5a765d47805b325521fd593ce013a6b5b6c094645b4aa66a261c4d6b89b83fcfeaddf95934ca5a1da03f853ef95443e03d09137b6cc4c798d3134990a65c585727564d3ddf7021c83b96f53decc2228f95951dfdd2443eb93a920be1a5b447b2823e7f132d313f9782307f64b4881472836b5c9aff249d43d2bd799f6d4ac1ac9a524d225296f30a603564356ab76eb6db415389341b661f77549782332fe652e1fc87d473073d687597c0116dc52471bfc23e523f3d0081b583df260d88bb573f472457a5f250ca45467d12b682ff75889e058f356c2a3e1fdfbfee90e28e978b2e8507c4809e94145b195c68a2512875b5c884bb06dd7bc6cf222b600506bc4bb25172a7d3af8e92bb255ec47b4991f0b86d9498515d7ae361eefab7dc4557e22dcff17b8092d0ba6a1b95c60d4ad784da15ed216c3de8702b24711d24b304220ef6327e7d27390e5d77062b6f6277ba8e6b7d52a97190c73afa13734a03f26b9d9746c0d555872641f9992db71f8b1a641321b5e6e53fb986444132f79c84736035bb2d9b864a741af907467d11d4d14e5a63776038b82a58168715f2b2aafd4edbfd7dc1ddfa9bbd4e0a6019644f5a39ab2a156e5c222b21eeef079d2713d3f4d85db6b04b61758225cd3b3ff4004db87100d3682e1f75be91eba53fe7d108b66bae56f9652dae17a2eb08e4567d052bb277e6b0e16ae27e69e13f703ea68b3490d07650730b1dfab0a94e71fa4a8a179661f70976bbd0a42c096d6381e62224bd7ad78ac549992f38cf038c9041fd022036bca434eaab9b9fad9d34970baf5483bbc269b579c8520f1eefacce60f9d35beeb7d12b7f8a63cb2f5c458dccfe07c5fbd894fea38e2067da271a0fbac2fff1f281774f7b9363bd73415d76fa6903bd57ec0ff4856f3eb53da576d7d98d96db927fe534696dbdabaf63aed4493b2e7c39d3a928744f2f860359487248401b3cbe41ac7b089c979ef3ceb7cbf68dd95cc86b54f5ee62aa8693771c1faa8f209fd77253f41e1eef1193080cdc8e628aeac397c6728e54e9e3fc9313e6c3225c3f9fb9cd18dc7245a9e60aff4748798d00258f24195702a28fc7b653f1ee68b986d00d86e2289eed20ce2209d92981ae7f3c6447d3bc025db6d28c6ce90a7427b3f2e6f1c8e529490dd9a182242b708219f4c75b485935b4e7f84fee5d0cb167d93eb2afe57c38ea8d6f23f6590a135b55f3c2676fce2aafc28f9aa5d77e755bac5e4d260fd2157d2b1fb67c71e1d882f17d731447f9e5bef973809c350bd47ef0eeb419e874a093afc252588b09d883c94a0fa71e32b6e4c3d71ed6168ec7969bded35539ffaf4933094d5d3adde5e7520d93a723915a9630ccaade42e65aa10b02af4094bf64a6ebc99b1390931ab4dbbd63089e682917f6580029d1bddcccfe6223d07e9cd66b70f9ff55bed401fe59bd6187c7a489c04009ff7f3ea17214b72583db564488e1919754ed77c5e341174d9048e857bab4ba6c0e161a26e1f2af42a48267596a94396c02743de1c0efd60afc4c2f670cdc2416bdf80f2957330a00a5a8c63ad79fa627787e94e84152384f9f35baf376f993dbe11e30e321a9bd4d0d3923407246a92ff32c8bf9a332c673d9127f99015e3c2eac46be7ef408c9be11b7fef395755c96a81797d450583ac3486993b0d6bfb29f6f10b974ed2462812b3b16a8a67204201c9c9304868d926463d208c81007136a234d07fdddd7d9e374d312c7050809722a21d8abfa17f8e712a3d603fe19e4814072fd2e29f6475ba297620c25d4c759f6d4631cdc48f6d21b4c44cdcc6c6eca3261ae0eff3ebc9b59dc90544c28b41ec1cb65cc8acedd127a89b9b8ef0f8518a37487f6e6831899a194670746cc47b268daa47ca1dcb647091710bc335e90dc7ff937503df08f8fd80518a1bca6b23f06054078b657688934bf0fc8dd67576c8b6a6d0da1d82245c6816e49e0a7c7b5d5ba47b28190e61194e0e5259e2929358cdc3700216735ad7591f7a8e20f27edb0c0723ef11dfd81096a1134b87d6dac750524593c2996fd632de5dcab541ed695c82adcd0432834f89b0931586901aec5f41b185022dbef8a73b42e453b26d9d6953ee080cf455d07ccdcf875fe8b9a1e5f2dbd2afaf6bd00fb1886979dec36e9cb8cd5a1e34056f2c0ca18e0e9abd6201d632ab36817da27454bf406ff75ac177d4f83f6413c40428d6deaea7ce55eed14b1c07d85c17c631f491e6fcad9203c4407a2bbb2408b923ffc901f3d1457ec4a987139a04eea1787b3f717a44880223edd495e87ade1179fb9a261fcb0b1ae44a6b28d6d7cfc548b0388ba7efebc4a0320505eb925b28ebee918fe9b03c5dbefd139b530e38aa40c3a5fc9d7853bb9cacdf7fff77221e99508f4751625d5d5bff9c971fb1e9339df94f8c45ea4d62b19ed65ab747936231e116cc63f3ffff4c6ab4c768d80356e1bdb7b87f198f4cb41fdce4b26a6b4f20a0cb57c7169d320950432e94a8d671506b0626dd28533a1b6237e1565be4f1694bbef365a3d4b57a3407a0a14746b920969609ae509c872c311e9b845dc8bbc301d5c0b2a6998f92f6b1d6bc034b123555462f2f3ff0f70c5b0bbd8666cd42039133738445c19a329622199030de312f43c2264d6971b3c4f5764ba20725a366c557063766e8af1d03dcc780b2307bda7e405cb261b727d140121715a8ff7761e43e2984f87a220d1fa06e36742c746f5b62fd5465d7ca0806c83067b77fca1b4b86dae5aa40534f12afbf87f874a36f246b5ab37452beb2638a010da74435239a872502bcb304088178f4dcdba3fb79157f2049df515ba3c893ced5c9f2516434169a4b13725d0f2522f2570c41c56f9a2fec4945f1a9392d3f540e6db86c1263b78efdb7f0a38d60f6fa7ac53116d0c7157434520c313727010bd22497cf69b4ab1c99c93cfcc8ddb721c942566ff606e529721f4302e380ffbeca11d3c7df05dca617e8e1d6eae72eba6df237ddf48cfbad5148b45e52fff1414d95a00b3dd1d2d0c10bcc7289f7a0adcd20aa99f72505c7fd92285f83154241db45b65952b92de82b08508873ed48ea742d6e306cf3ca3bd617fb3e62884b5c933f2e5074385d56cf99e39b738f1963345559f7455bbd001f6ead634023a7983a660aed9f0a4a8b25be8f36081d8b60d9dc6d8de55c262e14ed8053360e86648638048fe90aa569d0853d1059b664e6dc0e7332150a30b4139fce0e09efa422697a2adb16ffe2814ea7a34da8d6c45f06f7a0566661f0fd794b19a24264baae410e2863f7e69378683451599becef6ae4d57a788d216d2b352915f11ca5c2698b34927610c25dad3f0f514c5226af9366a1832333e62cbacf6a23fc3921c8841551e4a128b37f605026fd2e935a9f9289944ec0a1d3da80215e92f8a4a892250a95db6e9bcde5b86d9621ba5635ecff442657ecae99e95c281cff5ce47eabcf51427072c19f664f8197b12ed585a1db8d72705d94375faabf404ca791e9dbbb6a59f8bfbc9d61f567081dcb671dea274a6ae2e56bdf66fcecdde660771b35a109d854ce712485aa268f108e73d77cbdd9b3ad74ea4c08f9cea84f451622e7cb9d5bd98f7e9be5155e53f21e20b9ae2c1add1d9aff815995f6a16555b132d7d1074b2dc4f0ed87f2b92c4f2223bb589789e509a1787707dd58b990f5222fbbc534d627dfada3bbb83ea88725163e981a76cdfa01113faea7f231b98b79927bbe001f0d9586eb742a72c00eb05c301b434a4768b4683e27b4b25d573556956572b72064b8754cf074495e5b5bd65bca5b676104d17481f658d8b198043b55f4b71117ee37f18b40014509f2ea44133819c1891f64febc4cb79735f6042dc7c6ef712d7dad2f660821b58cb3d69f3297a8dc15f3efe4c2655e878f68a1e1a95ec66d01c3359e99c892053c665a4ebf06a9cf7708c0c13c605cc222cd7316be330ffc070322ac47a2d792b143c3d42f851b20f6531fea3c9c05840cb63341c851e89225cbbda44a0d7e5485d76e733d93b1ad74d81320171b9be03a7f8531aa1fdfd08e74f3ac1ee0d86295cae9ab861598d3a8093ceadd57ce580db69015bb600194a1a81000f3c0fd4f967f62613ef281b5a17674f776e8ed758c62501416de5d5172ab609bfcb690e904b6f32246ff49483299f1d9e278269e5f4f770098c55590fad81593d12e35682afeeb2bebe95b58943a221e1e450f6c69062b0b0d984e6aa52a48177e1d9dde9564895ecd594f84c0ee1e810ae729804884577e3257a23eb7838fbcc97bd3f4a94abed7cda9a3ecc5ee71ce88f6f1ae04994ad8f98e57ec40eaca5f288be1f47350a3f8b89ac1816c6597590cf26218df59d4adb0ebf07519b610bc4b31040da1d71d502cf09c53750a379d0b47fa5b3ae64f89a8df9c8902434a37a6c1422af1c9f25dad68f9927d025f40b417ae80b2dae00b9252b3f4ac3788d8cff3b6224a2cd74ac3e87bdfb23ba8925988b79eb4eb3095390ff9cce36567617e69a11ac5af860b6dad68425b1323d7a2d90f4a79f9d922de0b33206f114695949bb7ce268566b598b23b238afbe9544279216722b5787ea6a9ea7b662ac10d9348b8d07a19625b2751e296d35a93863f32d0fa35cabb1ec43f1170e978646b717f3188dba35bb3488ebf034388f810b22253848dae8614cb84babadbfcdffd0e893bfaa1efde5e11134fe00ba4e987acdf2216ea787e6abfa80beffe1a95fe622ea8efcbb6f8074458c70669089ad222aab9947543b9c7aef25d9e16aaa9d0659e4c36c295340e8f52ae1492c2058697028464f864dfb190bd640095a0afa6e28caa5fc375af1091ae73aa47cb22c474d477c3d97d6d9f9bac7aa0ab6fe0f29fd8dd3c76235e6d29eabd6ea5f6867e7c1a49dc994be0312b4c7ef6b74fc042b87a3ca41462a5603876dedc2aabfb24ed63f4c585b79a22159a47dccc9bfbdc1540c8b7e68416b670285f8bf1da2138f580be4433ca2e793a85a3544133f58f3dcf1cd4b129ed011d0e874309da5147e3981e90d752a3f3799e1eb9db581cca3fe88a7d8279da71fd27dc4ef5fd1bfe421ef5a401cdfbebf6607ef50b54bc67a449beb77b73d74bc40f2cccdd1d9c9fe58baef07322342a5ee6977e89f8c5644df59f63de341a867151de228c887831c6564d51d00d6d2e9de73eefff5c222d1179f6f7b59c5d974b523fd1662dfabc9845a489b998235ffc81238c6057886ef678e2199bf7ce999038fff0aae20cec3999341823c5ac074cc674bfb1ef2e2d40be453aa58ba88d9924defbf8168f745967fbef7ef56e37b2eb6a", 0x1000, 0x1)

15:46:56 executing program 2 (fault-call:4 fault-nth:25):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

15:46:56 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  129.245519][ T8190] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81
[  129.253481][ T8190] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005
[  129.261440][ T8190] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  129.269408][ T8190] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005
[  129.277360][ T8190] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000018
15:46:56 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02"], 0x2a)

[  129.367371][ T8221] SELinux: failed to load policy
[  129.383022][ T8224] FAULT_INJECTION: forcing a failure.
[  129.383022][ T8224] name failslab, interval 1, probability 0, space 0, times 0
[  129.395825][ T8224] CPU: 1 PID: 8224 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  129.405919][ T8224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  129.415958][ T8224] Call Trace:
[  129.419231][ T8224]  dump_stack+0x1b0/0x228
[  129.423557][ T8224]  ? devkmsg_release+0x127/0x127
[  129.424625][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4
[  129.428495][ T8224]  ? show_regs_print_info+0x18/0x18
[  129.428506][ T8224]  ? audit_log_format+0x110/0x110
[  129.428517][ T8224]  should_fail+0x6fb/0x860
[  129.428526][ T8224]  ? setup_fault_attr+0x2b0/0x2b0
[  129.428539][ T8224]  ? audit_log_format+0xc8/0x110
[  129.441552][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4
[  129.446439][ T8224]  ? __rcu_read_lock+0x50/0x50
[  129.446448][ T8224]  __should_failslab+0x11a/0x160
[  129.446458][ T8224]  ? audit_log_d_path+0xc2/0x260
[  129.446467][ T8224]  should_failslab+0x9/0x20
[  129.446475][ T8224]  kmem_cache_alloc_trace+0x3a/0x2f0
[  129.446489][ T8224]  audit_log_d_path+0xc2/0x260
15:46:57 executing program 2 (fault-call:4 fault-nth:26):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  129.451717][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4
[  129.455903][ T8224]  audit_log_d_path_exe+0x42/0x70
[  129.455912][ T8224]  audit_log_task+0x201/0x2e0
[  129.455921][ T8224]  ? audit_core_dumps+0x100/0x100
[  129.455931][ T8224]  ? should_fail+0x182/0x860
[  129.455940][ T8224]  ? __sys_socket+0x115/0x350
[  129.455954][ T8224]  ? __x64_sys_socket+0x7a/0x90
[  129.461184][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4
[  129.465893][ T8224]  ? do_syscall_64+0xc0/0x100
[  129.465905][ T8224]  ? setup_fault_attr+0x2b0/0x2b0
[  129.465914][ T8224]  audit_seccomp+0x83/0x180
[  129.465923][ T8224]  __seccomp_filter+0xd15/0x1890
[  129.465930][ T8224]  ? __secure_computing+0x240/0x240
[  129.465944][ T8224]  ? __kasan_check_write+0x14/0x20
[  129.478861][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4
[  129.483358][ T8224]  ? __mutex_init+0xa1/0xf0
[  129.483369][ T8224]  ? percpu_counter_add_batch+0x136/0x160
[  129.483376][ T8224]  ? alloc_file+0x84/0x4b0
[  129.483383][ T8224]  ? memcpy+0x49/0x60
[  129.483391][ T8224]  ? errseq_sample+0x43/0x70
[  129.483398][ T8224]  ? alloc_file+0x3d3/0x4b0
[  129.483406][ T8224]  ? alloc_file_pseudo+0x282/0x310
[  129.483413][ T8224]  ? alloc_empty_file_noaccount+0x80/0x80
[  129.483427][ T8224]  ? __alloc_fd+0x4e6/0x590
[  129.488575][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4
[  129.493286][ T8224]  __secure_computing+0x1c6/0x240
[  129.493347][ T8224]  syscall_trace_enter+0x596/0xa90
[  129.493360][ T8224]  ? switch_fpu_return+0x10/0x10
[  129.493368][ T8224]  ? do_syscall_64+0x100/0x100
[  129.493377][ T8224]  ? syscall_return_slowpath+0x6f/0x500
[  129.493384][ T8224]  do_syscall_64+0x6b/0x100
[  129.493393][ T8224]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  129.493405][ T8224] RIP: 0033:0x414e81
[  129.498196][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4
[  129.503263][ T8224] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  129.503267][ T8224] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000
[  129.503274][ T8224] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81
[  129.503278][ T8224] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005
[  129.503282][ T8224] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
15:46:57 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  129.503286][ T8224] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005
[  129.503291][ T8224] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000019
[  129.781497][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4
15:46:57 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:57 executing program 4:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000000)={0x28, 0x135, 0x6}, 0x10)
r3 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_procfs(0x0, &(0x7f0000000240)='net/raw\x00')
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000080)=""/149, 0x95}, {&(0x7f0000000140)=""/131, 0x83}, {}], 0x3, 0x5)

15:46:57 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:57 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02"], 0x2a)

[  129.881395][ T8253] SELinux: failed to load policy
[  129.897357][ T8252] FAULT_INJECTION: forcing a failure.
[  129.897357][ T8252] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[  129.919740][ T8252] CPU: 0 PID: 8252 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  129.929894][ T8252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  129.940045][ T8252] Call Trace:
[  129.943339][ T8252]  dump_stack+0x1b0/0x228
[  129.947658][ T8252]  ? devkmsg_release+0x127/0x127
[  129.952588][ T8252]  ? show_regs_print_info+0x18/0x18
[  129.957816][ T8252]  should_fail+0x6fb/0x860
[  129.962255][ T8252]  ? setup_fault_attr+0x2b0/0x2b0
[  129.967281][ T8252]  ? arch_stack_walk+0x98/0xe0
[  129.972042][ T8252]  should_fail_alloc_page+0x4f/0x60
[  129.977272][ T8252]  __alloc_pages_nodemask+0x274/0x3010
[  129.982729][ T8252]  ? put_dec_trunc8+0x1c4/0x2d0
[  129.987585][ T8252]  ? format_decode+0xc5c/0x1ab0
[  129.992423][ T8252]  ? put_dec+0xd1/0xe0
[  129.996481][ T8252]  ? widen_string+0x40/0x3a0
[  130.001083][ T8252]  ? string+0x2c7/0x2e0
[  130.005234][ T8252]  ? vsnprintf+0x1ba3/0x1c50
[  130.009825][ T8252]  ? gfp_pfmemalloc_allowed+0x140/0x140
[  130.015365][ T8252]  ? ptr_to_hashval+0x90/0x90
[  130.020067][ T8252]  ? vsnprintf+0x1ba3/0x1c50
[  130.024648][ T8252]  ? skb_put+0x121/0x210
[  130.028896][ T8252]  alloc_slab_page+0x3f/0x390
[  130.033580][ T8252]  new_slab+0x98/0x430
[  130.037645][ T8252]  ? setup_fault_attr+0x2b0/0x2b0
[  130.042668][ T8252]  ___slab_alloc+0x2e0/0x450
[  130.047241][ T8252]  ? audit_log_d_path+0xc2/0x260
[  130.052180][ T8252]  ? __should_failslab+0x11a/0x160
[  130.057387][ T8252]  ? audit_log_d_path+0xc2/0x260
[  130.062319][ T8252]  kmem_cache_alloc_trace+0x23f/0x2f0
[  130.067684][ T8252]  audit_log_d_path+0xc2/0x260
[  130.072452][ T8252]  audit_log_d_path_exe+0x42/0x70
[  130.077483][ T8252]  audit_log_task+0x201/0x2e0
[  130.082169][ T8252]  ? audit_core_dumps+0x100/0x100
[  130.087203][ T8252]  ? should_fail+0x182/0x860
[  130.091792][ T8252]  ? __sys_socket+0x115/0x350
[  130.096473][ T8252]  ? __x64_sys_socket+0x7a/0x90
[  130.101307][ T8252]  ? do_syscall_64+0xc0/0x100
[  130.105978][ T8252]  ? setup_fault_attr+0x2b0/0x2b0
[  130.111005][ T8252]  audit_seccomp+0x83/0x180
[  130.115521][ T8252]  __seccomp_filter+0xd15/0x1890
[  130.120445][ T8252]  ? __secure_computing+0x240/0x240
[  130.125678][ T8252]  ? __kasan_check_write+0x14/0x20
[  130.130777][ T8252]  ? __mutex_init+0xa1/0xf0
[  130.135291][ T8252]  ? percpu_counter_add_batch+0x136/0x160
[  130.141002][ T8252]  ? alloc_file+0x84/0x4b0
[  130.145420][ T8252]  ? memcpy+0x49/0x60
[  130.149392][ T8252]  ? errseq_sample+0x43/0x70
[  130.153988][ T8252]  ? alloc_file+0x3d3/0x4b0
[  130.158491][ T8252]  ? alloc_file_pseudo+0x282/0x310
[  130.163602][ T8252]  ? alloc_empty_file_noaccount+0x80/0x80
[  130.169311][ T8252]  ? __alloc_fd+0x4e6/0x590
[  130.173817][ T8252]  __secure_computing+0x1c6/0x240
[  130.178843][ T8252]  syscall_trace_enter+0x596/0xa90
[  130.183945][ T8252]  ? switch_fpu_return+0x10/0x10
[  130.188871][ T8252]  ? do_syscall_64+0x100/0x100
[  130.193656][ T8252]  ? syscall_return_slowpath+0x6f/0x500
[  130.199201][ T8252]  do_syscall_64+0x6b/0x100
[  130.203699][ T8252]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  130.209609][ T8252] RIP: 0033:0x414e81
[  130.213541][ T8252] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
15:46:57 executing program 2 (fault-call:4 fault-nth:27):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  130.233142][ T8252] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000
[  130.241554][ T8252] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81
[  130.249534][ T8252] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005
[  130.257505][ T8252] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  130.265488][ T8252] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005
[  130.273560][ T8252] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000001a
15:46:57 executing program 4:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000300)='./bus\x00', 0x0)
mknod$loop(&(0x7f0000000100)='./bus/file1\x00', 0xc000, 0x1)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="866f7765726469723d2e2f627573e600e104007469723d726469723d2e2f66696cf61d681d04e3653000"/53])
link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00')
pipe2(&(0x7f0000000140)={<r0=>0xffffffffffffffff}, 0x4000)
sendto$unix(r0, &(0x7f0000000340)="d48e48821f2355ecb24f2ec565209340a5c600c8058f562c51375487df23342aaefe3657804bfb48e31d6eb897aa3086436b4dd951ad9b60339f337668f9f21456ac6e7d8f0dae1e758e64e56ad778058d9790d2077f534bce43abfb280b5eb822349ec5be106a0f6b53f1a8", 0x6c, 0x40800, 0x0, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
r4 = dup3(r2, r3, 0x0)
mknodat(r4, &(0x7f0000000080)='./bus/file0\x00', 0x8000, 0x8000)
unlink(&(0x7f0000000040)='./bus/file0\x00')
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f00000000c0)=0x100)

15:46:57 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10)
r1 = socket$vsock_stream(0x28, 0x1, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000000000)=0xc)
setresuid(r2, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x20000001}, 0x0)
prctl$PR_SET_NAME(0xf, 0x0)
creat(0x0, 0x0)
socket$inet6(0xa, 0x0, 0x5f)
socket$inet6(0xa, 0x400000000803, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r3, 0x800)
lseek(r3, 0x0, 0x2)
r4 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0)
sendfile(r3, r4, 0x0, 0x8400fffffffa)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x280900)
dup(r3)
r5 = socket$inet6(0xa, 0x0, 0x5f)
close(r5)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
creat(0x0, 0x0)
r6 = socket$inet6(0xa, 0x400000000803, 0x5f)
close(r6)
r7 = open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0)
sendfile(r6, r7, 0x0, 0x80001d00c0d0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002bbd7000fddbdf25020000000c2797dbc167030827b27300080006000000000000001c00078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x20000100}, 0x4000)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0)

15:46:57 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  130.350052][ T8268] FAULT_INJECTION: forcing a failure.
[  130.350052][ T8268] name failslab, interval 1, probability 0, space 0, times 0
[  130.364403][ T8268] CPU: 0 PID: 8268 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  130.374487][ T8268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  130.379341][ T8274] overlayfs: unrecognized mount option "�owerdir=./bus�" or missing value
[  130.384524][ T8268] Call Trace:
[  130.384545][ T8268]  dump_stack+0x1b0/0x228
[  130.384557][ T8268]  ? devkmsg_release+0x127/0x127
[  130.384566][ T8268]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  130.384582][ T8268]  ? show_regs_print_info+0x18/0x18
[  130.396196][ T8274] SELinux: ebitmap: truncated map
[  130.396474][ T8268]  ? finish_task_switch+0x2fe/0x560
[  130.401438][ T8274] SELinux: failed to load policy
[  130.405746][ T8268]  should_fail+0x6fb/0x860
[  130.405757][ T8268]  ? setup_fault_attr+0x2b0/0x2b0
[  130.405766][ T8268]  ? __seccomp_filter+0xd15/0x1890
[  130.405773][ T8268]  ? __secure_computing+0x1c6/0x240
[  130.405781][ T8268]  ? syscall_trace_enter+0x596/0xa90
[  130.405789][ T8268]  ? should_fail+0x182/0x860
[  130.405799][ T8268]  ? number+0xeac/0x1170
[  130.405809][ T8268]  __should_failslab+0x11a/0x160
[  130.405818][ T8268]  ? __alloc_skb+0xbc/0x540
[  130.405826][ T8268]  should_failslab+0x9/0x20
[  130.405840][ T8268]  kmem_cache_alloc+0x37/0x2b0
[  130.429387][ T8275] overlayfs: unrecognized mount option "�owerdir=./bus�" or missing value
[  130.432308][ T8268]  __alloc_skb+0xbc/0x540
[  130.432317][ T8268]  ? kmem_cache_alloc+0x120/0x2b0
[  130.432332][ T8268]  audit_log_start+0x4a1/0x9a0
[  130.447762][ T8275] SELinux: ebitmap: truncated map
[  130.452142][ T8268]  ? audit_serial+0x30/0x30
[  130.452153][ T8268]  ? ptr_to_hashval+0x90/0x90
[  130.452161][ T8268]  ? kasan_slab_free+0xe/0x10
[  130.452168][ T8268]  ? audit_log_start+0x9a0/0x9a0
[  130.452175][ T8268]  ? snprintf+0xc0/0x110
[  130.452183][ T8268]  ? check_stack_object+0x124/0x140
[  130.452190][ T8268]  audit_seccomp+0x62/0x180
[  130.452197][ T8268]  __seccomp_filter+0xd15/0x1890
[  130.452211][ T8268]  ? __secure_computing+0x240/0x240
[  130.457741][ T8275] SELinux: failed to load policy
[  130.462066][ T8268]  ? fsnotify+0x1390/0x1450
[  130.462074][ T8268]  ? __mutex_init+0xa1/0xf0
[  130.462085][ T8268]  ? percpu_counter_add_batch+0x136/0x160
[  130.462092][ T8268]  ? memset+0x31/0x40
[  130.462098][ T8268]  ? fsnotify+0x1390/0x1450
[  130.462107][ T8268]  ? rw_verify_area+0x360/0x360
[  130.462114][ T8268]  ? __fsnotify_parent+0x300/0x300
[  130.462123][ T8268]  __secure_computing+0x1c6/0x240
[  130.462137][ T8268]  syscall_trace_enter+0x596/0xa90
[  130.603554][ T8268]  ? switch_fpu_return+0x10/0x10
[  130.608507][ T8268]  ? do_syscall_64+0x100/0x100
[  130.613250][ T8268]  ? syscall_return_slowpath+0x6f/0x500
[  130.618782][ T8268]  do_syscall_64+0x6b/0x100
[  130.623569][ T8268]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  130.629489][ T8268] RIP: 0033:0x414e21
15:46:58 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:58 executing program 4:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0)
write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {0x0, 0x0, 0x2}}, 0x45c)
ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x5)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12)
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)

15:46:58 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x0)

[  130.633367][ T8268] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  130.652961][ T8268] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[  130.661363][ T8268] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000414e21
[  130.669440][ T8268] RDX: 0000000000000001 RSI: 00007f6006302ca0 RDI: 0000000000000005
[  130.677508][ T8268] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  130.685470][ T8268] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005
[  130.693430][ T8268] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000001b
15:46:58 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02"], 0x2a)

[  130.726584][ T8279] SELinux: failed to load policy
15:46:58 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000"], 0x31)

15:46:58 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  130.804115][ T8295] SELinux: failed to load policy
[  130.819538][ T8298] input: syz0 as /devices/virtual/input/input4
15:46:58 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x2, 0x2, 0x0)

15:46:58 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000"], 0x31)

15:46:58 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  130.871330][ T8313] SELinux: ebitmap: truncated map
[  130.876969][ T8313] SELinux: failed to load policy
15:46:58 executing program 4:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0xb1, 0x0, 0x0, 0x400}, {0x80000006}]}, 0x10)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10)
ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x4, 0x1, 0x5})
connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10)

[  130.964547][ T8329] SELinux: ebitmap: truncated map
15:46:59 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000"], 0x31)

15:46:59 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:59 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x5, 0x2, 0x0)

15:46:59 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0)

15:46:59 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10)
r1 = socket$vsock_stream(0x28, 0x1, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000000000)=0xc)
setresuid(r2, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x20000001}, 0x0)
prctl$PR_SET_NAME(0xf, 0x0)
creat(0x0, 0x0)
socket$inet6(0xa, 0x0, 0x5f)
socket$inet6(0xa, 0x400000000803, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r3, 0x800)
lseek(r3, 0x0, 0x2)
r4 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0)
sendfile(r3, r4, 0x0, 0x8400fffffffa)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x280900)
dup(r3)
r5 = socket$inet6(0xa, 0x0, 0x5f)
close(r5)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
creat(0x0, 0x0)
r6 = socket$inet6(0xa, 0x400000000803, 0x5f)
close(r6)
r7 = open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0)
sendfile(r6, r7, 0x0, 0x80001d00c0d0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002bbd7000fddbdf25020000000c2797dbc167030827b27300080006000000000000001c00078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x20000100}, 0x4000)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0)

15:46:59 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
getsockopt$inet6_int(r1, 0x29, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4)
r2 = dup2(r0, r0)
getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x50, 0x0, &(0x7f0000000240)=0x1000000)

[  131.646600][ T8363] SELinux: ebitmap: truncated map
[  131.658013][   T22] kauditd_printk_skb: 121 callbacks suppressed
[  131.658022][   T22] audit: type=1326 audit(1580485619.136:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  131.663360][ T8364] EXT4-fs: 2 callbacks suppressed
15:46:59 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d"], 0x35)

[  131.663367][ T8364] EXT4-fs (sda1): re-mounted. Opts: 
[  131.668397][   T22] audit: type=1326 audit(1580485619.146:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
15:46:59 executing program 4:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x14, 0x18, 0x331}, 0x1c}}, 0x0)
writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="edbf259659a927b189017950e3bc25e604851088077877f8f376519576f04f73e3d394a55ec727ff9847524ca3d7b4af1a6e4a80c4807c54283808838692df5950052ddbfb76642184e7529d543580d7fa4e29f837adcba637654384a6216ef0922dc9f2caf2f36534e331f3ee4444533fa8b127d7d299d1507bcbd2d1c9e2ec468e7c8c5602c58bc01b1d20b12be472f2f78b417cc72628c16cd11cebe63d12f702a739e3ff0839bb2c683cf3b052e706ac939dc8ad8682ce33398cdfaace9d346d6b4bde38400285fdecf49496a6594b537f2ffe986690243df5dc326c36504ad61ce40d5867ce789e35d8d61a4c51a6abe01d481c46ea0cb80f95657c9c6179c9e43e088e38e57dae59bbb4a15441f9924340ae45042d715946d691f025228827a2432c72bf6484d466b1452a157718a6cd2323d33de4d5c4d0e34c7baacc951f665ae62e743d0d9ed572414c8d2a8c2a52c273349d57730cc0b7da7a5ed7a476d8fdb73f5073eefdb7e76700295eb5875d0356c16041"], 0xa)
close(r2)
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e22, @loopback}, 0x8, 0x0, 0x0, 0x0, 0x8d79, 0x0, 0xfa, 0x5c9174c0, 0x9})
socket(0x10, 0x3, 0x0)
writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0)

15:46:59 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x6, 0x2, 0x0)

[  131.736443][   T22] audit: type=1326 audit(1580485619.186:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  131.763415][   T22] audit: type=1326 audit(1580485619.186:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  131.789046][   T22] audit: type=1326 audit(1580485619.196:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  131.816560][   T22] audit: type=1326 audit(1580485619.196:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  131.849042][   T22] audit: type=1326 audit(1580485619.196:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:46:59 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0)

[  131.880946][   T22] audit: type=1326 audit(1580485619.196:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
15:46:59 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x8, 0x2, 0x0)

[  131.935220][   T22] audit: type=1326 audit(1580485619.196:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:46:59 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:59 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001})
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0xfffffffffffffddc, 0x10, 0xc362e63b3f31ba5f, 0xf0bd2d, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd202}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)
r2 = creat(&(0x7f0000000200)='./file0\x00', 0x40)
ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000240)=""/22)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4)
r3 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r3, 0x0, r3)
fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000140))
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$BLKGETSIZE(r5, 0x1260, &(0x7f00000002c0))
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
r8 = fcntl$dupfd(r6, 0x0, r7)
setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000980)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
write$tun(r0, &(0x7f00000001c0)={@void, @val={0x5}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, @echo_reply={0xc}}}}, 0xfdef)
setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4)

15:46:59 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d"], 0x35)

[  131.976411][   T22] audit: type=1326 audit(1580485619.196:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  132.011477][ T8406] EXT4-fs (sda1): re-mounted. Opts: 
15:46:59 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0)

15:46:59 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0xa, 0x2, 0x0)

[  132.126525][ T8428] SELinux: ebitmap: truncated map
[  132.238989][ T8435] EXT4-fs (sda1): re-mounted. Opts: 
15:46:59 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:46:59 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
memfd_create(0x0, 0x0)
socket$inet6(0xa, 0x2, 0x0)
fcntl$addseals(0xffffffffffffffff, 0x409, 0x4)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8})
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x9)
r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_DEL_DEST(r0, 0x0, 0x0)
open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800)
inotify_add_watch(0xffffffffffffffff, 0x0, 0x0)
write$9p(r0, &(0x7f0000001400)="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", 0x600)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040))
sendfile(r0, r1, 0x0, 0x1c5f2)

15:46:59 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0xf, 0x2, 0x0)

15:46:59 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:46:59 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d"], 0x35)

15:46:59 executing program 3:
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = gettid()
ioprio_get$pid(0x1, r3)
preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/204, 0x200000cc}], 0x1, 0x0)
pipe(&(0x7f00000001c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = socket$inet_udp(0x2, 0x2, 0x0)
close(r6)
write(0xffffffffffffffff, &(0x7f0000000180)="1c0000005e00", 0x6)
write$binfmt_misc(r5, &(0x7f0000000180)=ANY=[], 0xfffffc7b)
socket$netlink(0x10, 0x3, 0x0)
splice(r4, 0x0, r6, 0x0, 0x4ffde, 0x0)

[  132.508779][ T8453] SELinux: ebitmap: truncated map
15:47:00 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c"], 0x37)

15:47:00 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x10, 0x2, 0x0)

15:47:00 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  132.529578][ T8459] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:47:00 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid='])

15:47:00 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c"], 0x37)

15:47:00 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x11, 0x2, 0x0)

[  132.683307][ T8479] SELinux: ebitmap: truncated map
15:47:00 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

[  132.739743][ T8485] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value
[  132.762476][ T8492] SELinux: ebitmap: truncated map
15:47:00 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid='])

15:47:00 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c"], 0x37)

15:47:00 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x2c, 0x2, 0x0)

15:47:00 executing program 3:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = accept$inet6(0xffffffffffffffff, 0x0, 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0)
ftruncate(r1, 0x2008002)
r2 = open(&(0x7f0000000780)='./bus\x00', 0x88000, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r2, 0x0)
socket(0x18, 0x2, 0x7)
recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0)
r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0)
ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0)
getuid()
r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={<r5=>0x0}, &(0x7f0000000280)=0xc)
ptrace$getregs(0xc, r5, 0x8, &(0x7f00000002c0)=""/107)
setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000200)={0x2, 'bridge_slave_0\x00', {0xfffffff8}, 0x8e8b})
setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x9, 0x2}, {0x1, 0x4, 0x5, 0x8}, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in6=@local}, 0x6, @in6=@rand_addr="304d8edadecf442b778e5a8382e5a896", 0x0, 0x3, 0x1, 0x0, 0x20, 0x7}}, 0xe8)
socket(0x0, 0x4, 0x0)
socket(0x0, 0x4, 0x0)
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x400, 0x0)
bind$inet(r6, &(0x7f0000000100)={0x2, 0x5, @local}, 0x10)
socket(0x0, 0x0, 0x0)

15:47:00 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
memfd_create(0x0, 0x0)
socket$inet6(0xa, 0x2, 0x0)
fcntl$addseals(0xffffffffffffffff, 0x409, 0x4)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8})
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x9)
r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_DEL_DEST(r0, 0x0, 0x0)
open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800)
inotify_add_watch(0xffffffffffffffff, 0x0, 0x0)
write$9p(r0, &(0x7f0000001400)="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", 0x600)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040))
sendfile(r0, r1, 0x0, 0x1c5f2)

15:47:00 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"])

15:47:00 executing program 0 (fault-call:1 fault-nth:0):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:00 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0)

15:47:00 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x180, 0x2, 0x0)

[  133.357763][ T8518] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value
[  133.361992][ T8530] SELinux: ebitmap: truncated map
[  133.419339][ T8537] FAULT_INJECTION: forcing a failure.
[  133.419339][ T8537] name failslab, interval 1, probability 0, space 0, times 0
[  133.434388][ T8537] CPU: 0 PID: 8537 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  133.444466][ T8537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  133.454642][ T8537] Call Trace:
[  133.457955][ T8537]  dump_stack+0x1b0/0x228
[  133.462439][ T8537]  ? devkmsg_release+0x127/0x127
[  133.467385][ T8537]  ? show_regs_print_info+0x18/0x18
[  133.472585][ T8537]  ? stack_trace_save+0x1e0/0x1e0
[  133.477615][ T8537]  ? __kernel_text_address+0x9a/0x110
[  133.482990][ T8537]  should_fail+0x6fb/0x860
[  133.487419][ T8537]  ? setup_fault_attr+0x2b0/0x2b0
[  133.492445][ T8537]  ? avc_has_perm_noaudit+0x2fc/0x3f0
[  133.497838][ T8537]  __should_failslab+0x11a/0x160
[  133.502958][ T8537]  ? __get_vm_area_node+0x1ac/0x380
[  133.508172][ T8537]  should_failslab+0x9/0x20
[  133.512697][ T8537]  kmem_cache_alloc_trace+0x3a/0x2f0
[  133.517984][ T8537]  ? kstrtouint_from_user+0x1cb/0x230
[  133.523454][ T8537]  __get_vm_area_node+0x1ac/0x380
[  133.528481][ T8537]  __vmalloc_node_range+0xe4/0x760
[  133.533608][ T8537]  ? sel_write_load+0x1c5/0x410
[  133.538564][ T8537]  ? mutex_lock+0xa6/0x110
[  133.542981][ T8537]  ? get_pid_task+0x8d/0xa0
[  133.547588][ T8537]  vmalloc+0x73/0x80
[  133.551463][ T8537]  ? sel_write_load+0x1c5/0x410
[  133.556408][ T8537]  sel_write_load+0x1c5/0x410
[  133.561090][ T8537]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  133.566754][ T8537]  __vfs_write+0xff/0x700
[  133.571104][ T8537]  ? __kernel_write+0x350/0x350
[  133.575989][ T8537]  ? avc_policy_seqno+0x1b/0x70
[  133.580834][ T8537]  ? selinux_file_permission+0x2ba/0x560
[  133.586468][ T8537]  ? security_file_permission+0x157/0x350
[  133.592187][ T8537]  ? rw_verify_area+0x1c2/0x360
[  133.597089][ T8537]  vfs_write+0x203/0x4e0
[  133.601333][ T8537]  ksys_write+0x168/0x2a0
[  133.605668][ T8537]  ? __ia32_sys_read+0x90/0x90
[  133.610441][ T8537]  ? __kasan_check_read+0x11/0x20
[  133.616039][ T8537]  ? __ia32_sys_clock_settime+0x230/0x230
[  133.621746][ T8537]  __x64_sys_write+0x7b/0x90
[  133.626354][ T8537]  do_syscall_64+0xc0/0x100
[  133.630863][ T8537]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  133.636756][ T8537] RIP: 0033:0x45b349
[  133.640656][ T8537] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  133.660261][ T8537] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
15:47:01 executing program 0 (fault-call:1 fault-nth:1):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  133.668888][ T8537] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  133.676865][ T8537] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  133.685007][ T8537] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  133.693286][ T8537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  133.701311][ T8537] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000000
15:47:01 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid='])

[  133.767024][ T8549] FAULT_INJECTION: forcing a failure.
[  133.767024][ T8549] name failslab, interval 1, probability 0, space 0, times 0
[  133.786144][ T8554] EXT4-fs (sda1): re-mounted. Opts: 
[  133.796675][ T8549] CPU: 0 PID: 8549 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  133.806779][ T8549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  133.816830][ T8549] Call Trace:
[  133.820124][ T8549]  dump_stack+0x1b0/0x228
[  133.824588][ T8549]  ? devkmsg_release+0x127/0x127
[  133.829528][ T8549]  ? show_regs_print_info+0x18/0x18
[  133.834710][ T8549]  ? nohz_balance_enter_idle+0x3a0/0x3a0
[  133.840324][ T8549]  ? dequeue_task_fair+0x68a/0x1050
[  133.845604][ T8549]  should_fail+0x6fb/0x860
[  133.850114][ T8549]  ? setup_fault_attr+0x2b0/0x2b0
[  133.855558][ T8549]  ? __vfs_write+0xff/0x700
[  133.863101][ T8549]  ? vfs_write+0x203/0x4e0
[  133.869434][ T8549]  ? ksys_write+0x168/0x2a0
[  133.874202][ T8549]  ? __x64_sys_write+0x7b/0x90
[  133.878963][ T8549]  ? do_syscall_64+0xc0/0x100
[  133.883822][ T8549]  ? __schedule+0xea0/0x1700
[  133.888405][ T8549]  ? stack_trace_save+0x1e0/0x1e0
[  133.893618][ T8549]  __should_failslab+0x11a/0x160
[  133.898650][ T8549]  ? alloc_vmap_area+0x164/0x1bb0
[  133.903664][ T8549]  should_failslab+0x9/0x20
[  133.908500][ T8549]  kmem_cache_alloc+0x37/0x2b0
[  133.913781][ T8549]  ? __kasan_check_write+0x14/0x20
[  133.918901][ T8549]  ? _raw_spin_lock+0xa1/0x170
[  133.923662][ T8549]  alloc_vmap_area+0x164/0x1bb0
[  133.928510][ T8549]  ? setup_fault_attr+0x2b0/0x2b0
[  133.933548][ T8549]  ? avc_has_perm_noaudit+0x2fc/0x3f0
[  133.938915][ T8549]  ? __should_failslab+0x11a/0x160
[  133.944050][ T8549]  ? vm_map_ram+0x980/0x980
[  133.948535][ T8549]  ? kasan_kmalloc+0x9/0x10
[  133.953052][ T8549]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  133.958598][ T8549]  ? kstrtouint_from_user+0x1cb/0x230
[  133.964156][ T8549]  __get_vm_area_node+0x1f9/0x380
[  133.969170][ T8549]  __vmalloc_node_range+0xe4/0x760
[  133.974275][ T8549]  ? sel_write_load+0x1c5/0x410
[  133.979238][ T8549]  ? mutex_lock+0x106/0x110
[  133.983771][ T8549]  ? get_pid_task+0x8d/0xa0
[  133.988274][ T8549]  vmalloc+0x73/0x80
[  133.992171][ T8549]  ? sel_write_load+0x1c5/0x410
[  133.997259][ T8549]  sel_write_load+0x1c5/0x410
[  134.002045][ T8549]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  134.007680][ T8549]  __vfs_write+0xff/0x700
[  134.011995][ T8549]  ? __kernel_write+0x350/0x350
[  134.016824][ T8549]  ? avc_policy_seqno+0x1b/0x70
[  134.021663][ T8549]  ? selinux_file_permission+0x2ba/0x560
[  134.027291][ T8549]  ? security_file_permission+0x157/0x350
[  134.033019][ T8549]  ? rw_verify_area+0x1c2/0x360
[  134.037864][ T8549]  vfs_write+0x203/0x4e0
[  134.042111][ T8549]  ksys_write+0x168/0x2a0
[  134.046424][ T8549]  ? __ia32_sys_read+0x90/0x90
[  134.051179][ T8549]  ? __kasan_check_read+0x11/0x20
[  134.056202][ T8549]  ? __ia32_sys_clock_settime+0x230/0x230
[  134.061926][ T8549]  __x64_sys_write+0x7b/0x90
[  134.066506][ T8549]  do_syscall_64+0xc0/0x100
[  134.070997][ T8549]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  134.077002][ T8549] RIP: 0033:0x45b349
[  134.080893][ T8549] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  134.100487][ T8549] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  134.108904][ T8549] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  134.116881][ T8549] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  134.124881][ T8549] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  134.132936][ T8549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  134.140893][ T8549] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000001
15:47:01 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x500, 0x2, 0x0)

15:47:01 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
memfd_create(0x0, 0x0)
socket$inet6(0xa, 0x2, 0x0)
fcntl$addseals(0xffffffffffffffff, 0x409, 0x4)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8})
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x9)
r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_DEL_DEST(r0, 0x0, 0x0)
open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800)
inotify_add_watch(0xffffffffffffffff, 0x0, 0x0)
write$9p(r0, &(0x7f0000001400)="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", 0x600)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040))
sendfile(r0, r1, 0x0, 0x1c5f2)

15:47:01 executing program 0 (fault-call:1 fault-nth:2):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  134.171042][ T8560] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value
[  134.306095][ T8576] FAULT_INJECTION: forcing a failure.
[  134.306095][ T8576] name failslab, interval 1, probability 0, space 0, times 0
[  134.318879][ T8576] CPU: 1 PID: 8576 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  134.328945][ T8576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  134.339093][ T8576] Call Trace:
[  134.342392][ T8576]  dump_stack+0x1b0/0x228
[  134.346726][ T8576]  ? devkmsg_release+0x127/0x127
15:47:01 executing program 3:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid='])

15:47:01 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0)

15:47:01 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x69c, 0x2, 0x0)

15:47:01 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0])

[  134.351666][ T8576]  ? show_regs_print_info+0x18/0x18
[  134.356864][ T8576]  ? _raw_spin_unlock+0x9/0x20
[  134.361657][ T8576]  ? alloc_vmap_area+0x1aa7/0x1bb0
[  134.366775][ T8576]  should_fail+0x6fb/0x860
[  134.371200][ T8576]  ? setup_fault_attr+0x2b0/0x2b0
[  134.376429][ T8576]  ? __kasan_check_write+0x14/0x20
[  134.381650][ T8576]  ? _raw_spin_lock+0xa1/0x170
[  134.386455][ T8576]  ? _raw_spin_trylock_bh+0x190/0x190
[  134.391826][ T8576]  __should_failslab+0x11a/0x160
[  134.396753][ T8576]  ? __vmalloc_node_range+0x2b6/0x760
[  134.402120][ T8576]  should_failslab+0x9/0x20
[  134.406613][ T8576]  __kmalloc+0x64/0x310
[  134.410750][ T8576]  __vmalloc_node_range+0x2b6/0x760
[  134.415945][ T8576]  ? mutex_lock+0xa6/0x110
[  134.420367][ T8576]  ? get_pid_task+0x8d/0xa0
[  134.424867][ T8576]  vmalloc+0x73/0x80
[  134.428743][ T8576]  ? sel_write_load+0x1c5/0x410
[  134.433634][ T8576]  sel_write_load+0x1c5/0x410
[  134.438360][ T8576]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  134.443973][ T8576]  __vfs_write+0xff/0x700
[  134.448287][ T8576]  ? __kernel_write+0x350/0x350
[  134.453173][ T8576]  ? avc_policy_seqno+0x1b/0x70
[  134.458022][ T8576]  ? selinux_file_permission+0x2ba/0x560
[  134.463668][ T8576]  ? security_file_permission+0x157/0x350
[  134.469431][ T8576]  ? rw_verify_area+0x1c2/0x360
[  134.474273][ T8576]  vfs_write+0x203/0x4e0
[  134.478520][ T8576]  ksys_write+0x168/0x2a0
[  134.482838][ T8576]  ? __ia32_sys_read+0x90/0x90
[  134.487580][ T8576]  ? __kasan_check_read+0x11/0x20
[  134.492609][ T8576]  ? __ia32_sys_clock_settime+0x230/0x230
[  134.498340][ T8576]  __x64_sys_write+0x7b/0x90
[  134.503121][ T8576]  do_syscall_64+0xc0/0x100
[  134.507618][ T8576]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  134.513616][ T8576] RIP: 0033:0x45b349
[  134.517559][ T8576] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  134.537146][ T8576] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  134.545690][ T8576] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
15:47:02 executing program 0 (fault-call:1 fault-nth:3):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  134.553670][ T8576] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  134.561673][ T8576] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  134.569642][ T8576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  134.577822][ T8576] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000002
[  134.624160][ T8583] EXT4-fs (sda1): re-mounted. Opts: 
[  134.633127][ T8593] FAULT_INJECTION: forcing a failure.
[  134.633127][ T8593] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  134.641485][ T8584] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value
[  134.656423][ T8593] CPU: 0 PID: 8593 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  134.666788][ T8593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  134.676963][ T8593] Call Trace:
[  134.680251][ T8593]  dump_stack+0x1b0/0x228
[  134.684587][ T8593]  ? devkmsg_release+0x127/0x127
[  134.689533][ T8593]  ? show_regs_print_info+0x18/0x18
[  134.694721][ T8593]  ? arch_stack_walk+0x98/0xe0
[  134.699494][ T8593]  should_fail+0x6fb/0x860
[  134.703905][ T8593]  ? setup_fault_attr+0x2b0/0x2b0
[  134.708942][ T8593]  ? stack_trace_snprint+0x150/0x150
[  134.714240][ T8593]  ? unwind_next_frame+0x415/0x870
[  134.719352][ T8593]  should_fail_alloc_page+0x4f/0x60
[  134.724655][ T8593]  __alloc_pages_nodemask+0x274/0x3010
[  134.730117][ T8593]  ? __kasan_kmalloc+0x179/0x1b0
[  134.735047][ T8593]  ? vfs_write+0x203/0x4e0
[  134.739454][ T8593]  ? __kasan_kmalloc+0x117/0x1b0
[  134.744405][ T8593]  ? __kmalloc+0x102/0x310
[  134.748825][ T8593]  ? __vmalloc_node_range+0x2b6/0x760
[  134.754184][ T8593]  ? vmalloc+0x73/0x80
[  134.758252][ T8593]  ? sel_write_load+0x1c5/0x410
[  134.763898][ T8593]  ? __vfs_write+0xff/0x700
[  134.768390][ T8593]  ? vfs_write+0x203/0x4e0
[  134.772810][ T8593]  ? ksys_write+0x168/0x2a0
[  134.777640][ T8593]  ? __x64_sys_write+0x7b/0x90
[  134.782401][ T8593]  ? do_syscall_64+0xc0/0x100
[  134.787077][ T8593]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  134.793168][ T8593]  ? insert_vmap_area+0x289/0x370
[  134.798198][ T8593]  ? _raw_spin_unlock+0x9/0x20
[  134.802974][ T8593]  ? alloc_vmap_area+0x1aa7/0x1bb0
[  134.808084][ T8593]  ? gfp_pfmemalloc_allowed+0x140/0x140
[  134.813627][ T8593]  ? should_fail+0x182/0x860
[  134.818219][ T8593]  ? setup_fault_attr+0x2b0/0x2b0
[  134.823246][ T8593]  ? __kasan_check_write+0x14/0x20
[  134.828373][ T8593]  ? _raw_spin_lock+0xa1/0x170
[  134.833159][ T8593]  ? _raw_spin_trylock_bh+0x190/0x190
[  134.838532][ T8593]  ? kasan_kmalloc+0x9/0x10
[  134.843028][ T8593]  ? __kmalloc+0x102/0x310
[  134.847436][ T8593]  __vmalloc_node_range+0x393/0x760
[  134.852640][ T8593]  vmalloc+0x73/0x80
[  134.856534][ T8593]  ? sel_write_load+0x1c5/0x410
[  134.861366][ T8593]  sel_write_load+0x1c5/0x410
[  134.866033][ T8593]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  134.871663][ T8593]  __vfs_write+0xff/0x700
[  134.875995][ T8593]  ? __kernel_write+0x350/0x350
[  134.880833][ T8593]  ? avc_policy_seqno+0x1b/0x70
[  134.885683][ T8593]  ? selinux_file_permission+0x2ba/0x560
[  134.891319][ T8593]  ? security_file_permission+0x157/0x350
[  134.897067][ T8593]  ? rw_verify_area+0x1c2/0x360
[  134.901921][ T8593]  vfs_write+0x203/0x4e0
[  134.906169][ T8593]  ksys_write+0x168/0x2a0
[  134.910497][ T8593]  ? __ia32_sys_read+0x90/0x90
[  134.915278][ T8593]  ? __kasan_check_read+0x11/0x20
[  134.920299][ T8593]  ? __ia32_sys_clock_settime+0x230/0x230
[  134.926333][ T8593]  __x64_sys_write+0x7b/0x90
[  134.930909][ T8593]  do_syscall_64+0xc0/0x100
[  134.935409][ T8593]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  134.941302][ T8593] RIP: 0033:0x45b349
[  134.945198][ T8593] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  134.964793][ T8593] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
15:47:02 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x6a0, 0x2, 0x0)

15:47:02 executing program 0 (fault-call:1 fault-nth:4):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:02 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0)

[  134.973215][ T8593] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  134.981179][ T8593] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  134.989134][ T8593] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  134.997095][ T8593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  135.005075][ T8593] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000003
15:47:02 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
memfd_create(0x0, 0x0)
socket$inet6(0xa, 0x2, 0x0)
fcntl$addseals(0xffffffffffffffff, 0x409, 0x4)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8})
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x9)
r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_DEL_DEST(r0, 0x0, 0x0)
open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800)
inotify_add_watch(0xffffffffffffffff, 0x0, 0x0)
write$9p(r0, &(0x7f0000001400)="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", 0x600)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040))
sendfile(r0, r1, 0x0, 0x1c5f2)

15:47:02 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0])

[  135.089973][ T8603] FAULT_INJECTION: forcing a failure.
[  135.089973][ T8603] name failslab, interval 1, probability 0, space 0, times 0
[  135.119820][ T8603] CPU: 0 PID: 8603 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  135.129909][ T8603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  135.139962][ T8603] Call Trace:
[  135.143244][ T8603]  dump_stack+0x1b0/0x228
[  135.147740][ T8603]  ? devkmsg_release+0x127/0x127
[  135.152687][ T8603]  ? show_regs_print_info+0x18/0x18
[  135.157905][ T8603]  ? __kasan_check_read+0x11/0x20
[  135.163031][ T8603]  should_fail+0x6fb/0x860
[  135.167428][ T8603]  ? setup_fault_attr+0x2b0/0x2b0
[  135.172434][ T8603]  ? vfs_write+0x203/0x4e0
[  135.176826][ T8603]  ? ksys_write+0x168/0x2a0
[  135.181324][ T8603]  ? __x64_sys_write+0x7b/0x90
[  135.186095][ T8603]  ? do_syscall_64+0xc0/0x100
[  135.190757][ T8603]  __should_failslab+0x11a/0x160
[  135.195691][ T8603]  ? security_load_policy+0x131/0xfd0
[  135.201045][ T8603]  should_failslab+0x9/0x20
[  135.205554][ T8603]  kmem_cache_alloc_trace+0x3a/0x2f0
[  135.210836][ T8603]  security_load_policy+0x131/0xfd0
[  135.216133][ T8603]  ? setup_fault_attr+0x2b0/0x2b0
[  135.221161][ T8603]  ? __kasan_check_write+0x14/0x20
[  135.226264][ T8603]  ? _raw_spin_lock+0xa1/0x170
[  135.231017][ T8603]  ? _raw_spin_trylock_bh+0x190/0x190
[  135.236387][ T8603]  ? security_change_sid+0x50/0x50
[  135.241495][ T8603]  ? vmap_page_range_noflush+0x67b/0x6a0
[  135.247127][ T8603]  ? __vmalloc_node_range+0x56c/0x760
[  135.252505][ T8603]  ? __kasan_check_write+0x14/0x20
[  135.257607][ T8603]  ? _copy_from_user+0xa8/0xe0
[  135.262364][ T8603]  sel_write_load+0x24e/0x410
[  135.267032][ T8603]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  135.272654][ T8603]  __vfs_write+0xff/0x700
[  135.276982][ T8603]  ? __kernel_write+0x350/0x350
[  135.281930][ T8603]  ? avc_policy_seqno+0x1b/0x70
[  135.286775][ T8603]  ? selinux_file_permission+0x2ba/0x560
[  135.292394][ T8603]  ? security_file_permission+0x157/0x350
[  135.298104][ T8603]  ? rw_verify_area+0x1c2/0x360
[  135.303019][ T8603]  vfs_write+0x203/0x4e0
[  135.307264][ T8603]  ksys_write+0x168/0x2a0
[  135.311595][ T8603]  ? __ia32_sys_read+0x90/0x90
[  135.316339][ T8603]  ? __kasan_check_read+0x11/0x20
[  135.321478][ T8603]  ? __ia32_sys_clock_settime+0x230/0x230
[  135.327206][ T8603]  __x64_sys_write+0x7b/0x90
[  135.331797][ T8603]  do_syscall_64+0xc0/0x100
[  135.336290][ T8603]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  135.342167][ T8603] RIP: 0033:0x45b349
[  135.346047][ T8603] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  135.365645][ T8603] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  135.374049][ T8603] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  135.382017][ T8603] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
15:47:02 executing program 0 (fault-call:1 fault-nth:5):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:02 executing program 3:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x7, 0x4}]}, 0xc, 0x5)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x3c}}, 0x0)

15:47:02 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x7fffffea, 0x2, 0x0)

[  135.389983][ T8603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  135.397935][ T8603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  135.405905][ T8603] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000004
[  135.417513][ T8603] sel_write_load: 7 callbacks suppressed
[  135.417517][ T8603] SELinux: failed to load policy
15:47:03 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  135.499324][ T8631] FAULT_INJECTION: forcing a failure.
[  135.499324][ T8631] name failslab, interval 1, probability 0, space 0, times 0
[  135.519570][ T8631] CPU: 1 PID: 8631 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  135.529658][ T8631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  135.539712][ T8631] Call Trace:
[  135.542982][ T8631]  dump_stack+0x1b0/0x228
[  135.547301][ T8631]  ? devkmsg_release+0x127/0x127
[  135.552228][ T8631]  ? show_regs_print_info+0x18/0x18
[  135.557423][ T8631]  ? __kasan_check_read+0x11/0x20
[  135.562441][ T8631]  should_fail+0x6fb/0x860
[  135.566885][ T8631]  ? setup_fault_attr+0x2b0/0x2b0
[  135.571935][ T8631]  ? vfs_write+0x203/0x4e0
[  135.576392][ T8631]  ? ksys_write+0x168/0x2a0
[  135.580945][ T8631]  ? __x64_sys_write+0x7b/0x90
[  135.585690][ T8631]  ? do_syscall_64+0xc0/0x100
[  135.590361][ T8631]  __should_failslab+0x11a/0x160
[  135.595277][ T8631]  ? security_load_policy+0x1af/0xfd0
[  135.600727][ T8631]  should_failslab+0x9/0x20
[  135.605211][ T8631]  kmem_cache_alloc_trace+0x3a/0x2f0
[  135.610539][ T8631]  security_load_policy+0x1af/0xfd0
[  135.615720][ T8631]  ? _raw_spin_lock+0xa1/0x170
[  135.620492][ T8631]  ? _raw_spin_trylock_bh+0x190/0x190
[  135.625913][ T8631]  ? security_change_sid+0x50/0x50
[  135.631021][ T8631]  ? vmap_page_range_noflush+0x67b/0x6a0
[  135.636635][ T8631]  ? __vmalloc_node_range+0x56c/0x760
[  135.642029][ T8631]  ? __kasan_check_write+0x14/0x20
[  135.647128][ T8631]  ? _copy_from_user+0xa8/0xe0
[  135.651883][ T8631]  sel_write_load+0x24e/0x410
[  135.656545][ T8631]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  135.662170][ T8631]  __vfs_write+0xff/0x700
[  135.666554][ T8631]  ? __kernel_write+0x350/0x350
[  135.671379][ T8631]  ? avc_policy_seqno+0x1b/0x70
[  135.676269][ T8631]  ? selinux_file_permission+0x2ba/0x560
[  135.681891][ T8631]  ? security_file_permission+0x157/0x350
[  135.687588][ T8631]  ? rw_verify_area+0x1c2/0x360
[  135.692480][ T8631]  vfs_write+0x203/0x4e0
[  135.697065][ T8631]  ksys_write+0x168/0x2a0
[  135.701380][ T8631]  ? __ia32_sys_read+0x90/0x90
[  135.706119][ T8631]  ? __kasan_check_read+0x11/0x20
[  135.711121][ T8631]  ? __ia32_sys_clock_settime+0x230/0x230
[  135.716968][ T8631]  __x64_sys_write+0x7b/0x90
[  135.721609][ T8631]  do_syscall_64+0xc0/0x100
[  135.726129][ T8631]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  135.732006][ T8631] RIP: 0033:0x45b349
[  135.735890][ T8631] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  135.755484][ T8631] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  135.763899][ T8631] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  135.771855][ T8631] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  135.779823][ T8631] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  135.787792][ T8631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
15:47:03 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x7ffffff3, 0x2, 0x0)

15:47:03 executing program 0 (fault-call:1 fault-nth:6):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:03 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ax25={{}, [@remote, @bcast, @default, @rose, @netrom, @bcast, @bcast, @default]}, &(0x7f00000000c0)=0x80)
getsockname$tipc(r1, &(0x7f0000000140), &(0x7f0000000180)=0x10)
ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0))
read(r0, &(0x7f00003fefff)=""/1, 0x1)
ioctl$TCSETS2(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "94fdc3c9cd01000000162c91ad4b33251407a2"})

[  135.795845][ T8631] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000005
[  135.805664][ T8631] SELinux: failed to load policy
15:47:03 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0])

15:47:03 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid='])

15:47:03 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x3, 0x0)

[  135.905380][ T8652] FAULT_INJECTION: forcing a failure.
[  135.905380][ T8652] name failslab, interval 1, probability 0, space 0, times 0
[  135.962261][ T8652] CPU: 1 PID: 8652 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  135.972399][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  135.982455][ T8652] Call Trace:
[  135.985746][ T8652]  dump_stack+0x1b0/0x228
[  135.990062][ T8652]  ? devkmsg_release+0x127/0x127
[  135.994983][ T8652]  ? show_regs_print_info+0x18/0x18
[  136.000267][ T8652]  ? arch_stack_walk+0x98/0xe0
[  136.005043][ T8652]  should_fail+0x6fb/0x860
[  136.009455][ T8652]  ? setup_fault_attr+0x2b0/0x2b0
[  136.014457][ T8652]  ? stack_trace_snprint+0x150/0x150
[  136.019731][ T8652]  ? __kernel_text_address+0x9a/0x110
[  136.025110][ T8652]  __should_failslab+0x11a/0x160
[  136.030056][ T8652]  ? hashtab_create+0x5c/0x3f0
[  136.034801][ T8652]  should_failslab+0x9/0x20
[  136.039284][ T8652]  kmem_cache_alloc_trace+0x3a/0x2f0
[  136.044566][ T8652]  ? __kasan_kmalloc+0x117/0x1b0
[  136.049498][ T8652]  ? kasan_kmalloc+0x9/0x10
[  136.053989][ T8652]  ? symtab_init+0xa0/0xa0
[  136.058384][ T8652]  ? symhash+0x100/0x100
[  136.062615][ T8652]  hashtab_create+0x5c/0x3f0
[  136.067205][ T8652]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  136.073255][ T8652]  ? stack_trace_save+0x111/0x1e0
[  136.078268][ T8652]  symtab_init+0x32/0xa0
[  136.082519][ T8652]  policydb_read+0xb4/0x77f0
[  136.087189][ T8652]  ? __kasan_check_write+0x14/0x20
[  136.092293][ T8652]  ? _raw_spin_lock+0xa1/0x170
[  136.097049][ T8652]  ? _raw_spin_trylock_bh+0x190/0x190
[  136.102414][ T8652]  ? should_fail+0x182/0x860
[  136.107118][ T8652]  ? __vmalloc_node_range+0x2b6/0x760
[  136.112479][ T8652]  ? setup_fault_attr+0x2b0/0x2b0
[  136.117490][ T8652]  ? vfs_write+0x203/0x4e0
[  136.121886][ T8652]  ? ksys_write+0x168/0x2a0
[  136.126394][ T8652]  ? _raw_spin_unlock+0x9/0x20
[  136.131144][ T8652]  ? string_to_av_perm+0x1c0/0x1c0
[  136.136356][ T8652]  ? security_load_policy+0x1af/0xfd0
[  136.141757][ T8652]  ? kasan_kmalloc+0x9/0x10
[  136.146245][ T8652]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  136.151704][ T8652]  security_load_policy+0x228/0xfd0
[  136.156915][ T8652]  ? _raw_spin_lock+0xa1/0x170
[  136.161683][ T8652]  ? _raw_spin_trylock_bh+0x190/0x190
[  136.167045][ T8652]  ? security_change_sid+0x50/0x50
[  136.172140][ T8652]  ? vmap_page_range_noflush+0x67b/0x6a0
[  136.177768][ T8652]  ? __vmalloc_node_range+0x56c/0x760
[  136.183131][ T8652]  ? __kasan_check_write+0x14/0x20
[  136.188247][ T8652]  ? _copy_from_user+0xa8/0xe0
[  136.193018][ T8652]  sel_write_load+0x24e/0x410
[  136.197686][ T8652]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  136.203327][ T8652]  __vfs_write+0xff/0x700
[  136.207654][ T8652]  ? __kernel_write+0x350/0x350
[  136.212559][ T8652]  ? avc_policy_seqno+0x1b/0x70
[  136.217402][ T8652]  ? selinux_file_permission+0x2ba/0x560
[  136.223025][ T8652]  ? security_file_permission+0x157/0x350
[  136.228847][ T8652]  ? rw_verify_area+0x1c2/0x360
[  136.233682][ T8652]  vfs_write+0x203/0x4e0
[  136.237903][ T8652]  ksys_write+0x168/0x2a0
[  136.242303][ T8652]  ? __ia32_sys_read+0x90/0x90
[  136.247107][ T8652]  ? __kasan_check_read+0x11/0x20
[  136.252112][ T8652]  ? __ia32_sys_clock_settime+0x230/0x230
[  136.257867][ T8652]  __x64_sys_write+0x7b/0x90
[  136.262452][ T8652]  do_syscall_64+0xc0/0x100
[  136.266935][ T8652]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  136.272815][ T8652] RIP: 0033:0x45b349
[  136.276699][ T8652] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  136.296697][ T8652] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  136.305089][ T8652] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
15:47:03 executing program 4:
sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0)
r0 = creat(0x0, 0x0)
setresuid(0x0, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0)
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0)
creat(&(0x7f0000000180)='./file0\x00', 0x0)
socket$inet6(0xa, 0x400000000803, 0x0)
close(0xffffffffffffffff)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfff}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
epoll_create1(0x0)
r1 = socket(0x0, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000002ec0), 0x0, 0x2, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00')
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0)
write$9p(0xffffffffffffffff, 0x0, 0x0)
unshare(0x40000000)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="fa0f5226b7c417f7f9f415118f500cbb", 0x10)

15:47:03 executing program 0 (fault-call:1 fault-nth:7):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  136.313049][ T8652] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  136.321015][ T8652] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  136.328976][ T8652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  136.336939][ T8652] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000006
[  136.346064][ T8652] SELinux: failed to load policy
15:47:03 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0])

[  136.454737][ T8670] FAULT_INJECTION: forcing a failure.
[  136.454737][ T8670] name failslab, interval 1, probability 0, space 0, times 0
[  136.467931][ T8670] CPU: 1 PID: 8670 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  136.478000][ T8670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  136.488043][ T8670] Call Trace:
[  136.491326][ T8670]  dump_stack+0x1b0/0x228
[  136.495635][ T8670]  ? devkmsg_release+0x127/0x127
[  136.500562][ T8670]  ? show_regs_print_info+0x18/0x18
[  136.505769][ T8670]  ? arch_stack_walk+0x98/0xe0
[  136.510540][ T8670]  should_fail+0x6fb/0x860
[  136.515216][ T8670]  ? setup_fault_attr+0x2b0/0x2b0
[  136.520220][ T8670]  ? stack_trace_snprint+0x150/0x150
[  136.525502][ T8670]  ? __kernel_text_address+0x9a/0x110
[  136.530866][ T8670]  __should_failslab+0x11a/0x160
[  136.535794][ T8670]  ? hashtab_create+0x117/0x3f0
[  136.540630][ T8670]  should_failslab+0x9/0x20
[  136.545321][ T8670]  __kmalloc+0x64/0x310
[  136.549472][ T8670]  ? kasan_kmalloc+0x9/0x10
[  136.553973][ T8670]  hashtab_create+0x117/0x3f0
[  136.558650][ T8670]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  136.564717][ T8670]  ? stack_trace_save+0x111/0x1e0
[  136.569736][ T8670]  symtab_init+0x32/0xa0
[  136.573974][ T8670]  policydb_read+0xb4/0x77f0
[  136.578549][ T8670]  ? __kasan_check_read+0x11/0x20
[  136.583565][ T8670]  ? __alloc_pages_nodemask+0x52d/0x3010
[  136.589189][ T8670]  ? vfs_write+0x203/0x4e0
[  136.593594][ T8670]  ? should_fail+0x182/0x860
[  136.598163][ T8670]  ? __vmalloc_node_range+0x2b6/0x760
[  136.603533][ T8670]  ? setup_fault_attr+0x2b0/0x2b0
[  136.608550][ T8670]  ? vfs_write+0x203/0x4e0
[  136.612959][ T8670]  ? ksys_write+0x168/0x2a0
[  136.617453][ T8670]  ? __x64_sys_write+0x7b/0x90
[  136.622231][ T8670]  ? do_syscall_64+0xc0/0x100
[  136.626904][ T8670]  ? string_to_av_perm+0x1c0/0x1c0
[  136.632007][ T8670]  ? __should_failslab+0x11a/0x160
[  136.637110][ T8670]  ? security_load_policy+0x1af/0xfd0
[  136.642471][ T8670]  ? kasan_kmalloc+0x9/0x10
[  136.646956][ T8670]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  136.652410][ T8670]  security_load_policy+0x228/0xfd0
[  136.657658][ T8670]  ? _raw_spin_lock+0xa1/0x170
[  136.662431][ T8670]  ? _raw_spin_trylock_bh+0x190/0x190
[  136.667802][ T8670]  ? security_change_sid+0x50/0x50
[  136.672921][ T8670]  ? vmap_page_range_noflush+0x67b/0x6a0
[  136.678545][ T8670]  ? __vmalloc_node_range+0x56c/0x760
[  136.683901][ T8670]  ? __kasan_check_write+0x14/0x20
[  136.689001][ T8670]  ? _copy_from_user+0xa8/0xe0
[  136.693753][ T8670]  sel_write_load+0x24e/0x410
[  136.698420][ T8670]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  136.704134][ T8670]  __vfs_write+0xff/0x700
[  136.708457][ T8670]  ? __kernel_write+0x350/0x350
[  136.713298][ T8670]  ? avc_policy_seqno+0x1b/0x70
[  136.718145][ T8670]  ? selinux_file_permission+0x2ba/0x560
[  136.723759][ T8670]  ? security_file_permission+0x157/0x350
[  136.729471][ T8670]  ? rw_verify_area+0x1c2/0x360
[  136.734302][ T8670]  vfs_write+0x203/0x4e0
[  136.738535][ T8670]  ksys_write+0x168/0x2a0
[  136.742846][ T8670]  ? __ia32_sys_read+0x90/0x90
[  136.747600][ T8670]  ? __kasan_check_read+0x11/0x20
[  136.752608][ T8670]  ? __ia32_sys_clock_settime+0x230/0x230
[  136.758426][ T8670]  __x64_sys_write+0x7b/0x90
[  136.763023][ T8670]  do_syscall_64+0xc0/0x100
[  136.767524][ T8670]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  136.773409][ T8670] RIP: 0033:0x45b349
[  136.777294][ T8670] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  136.796904][ T8670] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  136.805313][ T8670] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  136.813271][ T8670] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  136.821246][ T8670] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  136.829196][ T8670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  136.837154][ T8670] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000007
[  136.846000][ T8670] SELinux: failed to load policy
15:47:04 executing program 0 (fault-call:1 fault-nth:8):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:04 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x5, 0x0)

[  136.851339][   T22] kauditd_printk_skb: 250 callbacks suppressed
[  136.851347][   T22] audit: type=1326 audit(1580485624.336:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:47:04 executing program 3:
socket$nl_route(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0)
r1 = open(0x0, 0x3a9801, 0x58)
fstatfs(0xffffffffffffffff, 0x0)
fcntl$setsig(r1, 0xa, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0)
r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0)
fallocate(r2, 0x0, 0x0, 0x2000402)
fallocate(r0, 0x0, 0x0, 0x110001)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x4, r2, 0x0, 0x0, 0x0, 0x11010000})
r3 = socket$unix(0x1, 0x2, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getroute={0x14, 0x1a, 0x4, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x40840)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={<r5=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, &(0x7f0000000040)=r5)
socket(0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
fsetxattr$trusted_overlay_upper(r4, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x3d, 0x0, 0x7f, "a0c4f2a64559acfbc6bfbe74bb88ab70", "d6efc3fdcd1a5c4476ae39aecc864784af2514076ed1d1ddaf3c9ae5fffd3ffd05a8a6688b62a31c"}, 0x3d, 0x2)
sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00000000000000000000010000000000000002410000000000133a000000"]}}, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198)

[  136.883161][   T22] audit: type=1326 audit(1580485624.346:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  136.911786][   T22] audit: type=1326 audit(1580485624.346:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
15:47:04 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid='])

[  136.951344][   T22] audit: type=1326 audit(1580485624.356:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  136.979482][   T22] audit: type=1326 audit(1580485624.356:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  137.005679][   T22] audit: type=1326 audit(1580485624.356:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  137.031891][   T22] audit: type=1326 audit(1580485624.356:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  137.040514][ T8691] FAULT_INJECTION: forcing a failure.
[  137.040514][ T8691] name failslab, interval 1, probability 0, space 0, times 0
[  137.058209][   T22] audit: type=1326 audit(1580485624.356:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  137.085888][ T8688] EXT4-fs: 5 callbacks suppressed
[  137.085897][ T8688] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value
[  137.099769][   T22] audit: type=1326 audit(1580485624.356:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=72 compat=0 ip=0x45b349 code=0x7ffc0000
15:47:04 executing program 3:
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0xe206c26ae4fb48fe)
r0 = socket$netlink(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x6, 0x4)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
write$FUSE_DIRENT(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="78000000000000000800000000000000030000000000000006000000000000000e0000001b51000029707070302d76626f786e65743100000200000000000000ff0f00000000000007000000ae0000002b766d6e6574300001f9000000000000000000000000000001000000000000002a00000000000000"], 0x78)
unshare(0x40000000)

[  137.135885][   T22] audit: type=1326 audit(1580485624.356:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  137.169958][ T8689] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value
[  137.172806][ T8691] CPU: 0 PID: 8691 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  137.188378][ T8691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  137.198427][ T8691] Call Trace:
[  137.201715][ T8691]  dump_stack+0x1b0/0x228
[  137.206041][ T8691]  ? devkmsg_release+0x127/0x127
[  137.210981][ T8691]  ? show_regs_print_info+0x18/0x18
[  137.216159][ T8691]  ? arch_stack_walk+0x98/0xe0
[  137.220931][ T8691]  should_fail+0x6fb/0x860
[  137.225357][ T8691]  ? setup_fault_attr+0x2b0/0x2b0
[  137.230372][ T8691]  ? stack_trace_snprint+0x150/0x150
[  137.235640][ T8691]  ? __kernel_text_address+0x9a/0x110
[  137.241109][ T8691]  __should_failslab+0x11a/0x160
[  137.246128][ T8691]  ? hashtab_create+0x5c/0x3f0
[  137.250885][ T8691]  should_failslab+0x9/0x20
[  137.255401][ T8691]  kmem_cache_alloc_trace+0x3a/0x2f0
[  137.260742][ T8691]  ? kasan_kmalloc+0x9/0x10
[  137.265256][ T8691]  ? symtab_init+0xa0/0xa0
[  137.269667][ T8691]  ? symhash+0x100/0x100
[  137.273890][ T8691]  hashtab_create+0x5c/0x3f0
[  137.278482][ T8691]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  137.284546][ T8691]  ? stack_trace_save+0x111/0x1e0
[  137.289568][ T8691]  symtab_init+0x32/0xa0
[  137.293821][ T8691]  policydb_read+0xe1/0x77f0
[  137.298407][ T8691]  ? __kasan_check_read+0x11/0x20
[  137.303427][ T8691]  ? __alloc_pages_nodemask+0x52d/0x3010
[  137.309400][ T8691]  ? vfs_write+0x203/0x4e0
[  137.313813][ T8691]  ? should_fail+0x182/0x860
[  137.318687][ T8691]  ? __vmalloc_node_range+0x2b6/0x760
[  137.324112][ T8691]  ? setup_fault_attr+0x2b0/0x2b0
[  137.329140][ T8691]  ? vfs_write+0x203/0x4e0
[  137.333554][ T8691]  ? ksys_write+0x168/0x2a0
[  137.338049][ T8691]  ? __x64_sys_write+0x7b/0x90
[  137.342807][ T8691]  ? do_syscall_64+0xc0/0x100
[  137.347576][ T8691]  ? string_to_av_perm+0x1c0/0x1c0
[  137.352698][ T8691]  ? __should_failslab+0x11a/0x160
[  137.357960][ T8691]  ? security_load_policy+0x1af/0xfd0
[  137.363331][ T8691]  ? kasan_kmalloc+0x9/0x10
[  137.367840][ T8691]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  137.373296][ T8691]  security_load_policy+0x228/0xfd0
[  137.378502][ T8691]  ? _raw_spin_lock+0xa1/0x170
[  137.383263][ T8691]  ? _raw_spin_trylock_bh+0x190/0x190
[  137.388618][ T8691]  ? security_change_sid+0x50/0x50
[  137.393722][ T8691]  ? vmap_page_range_noflush+0x67b/0x6a0
[  137.399347][ T8691]  ? __vmalloc_node_range+0x56c/0x760
[  137.404713][ T8691]  ? __kasan_check_write+0x14/0x20
[  137.409878][ T8691]  ? _copy_from_user+0xa8/0xe0
[  137.414657][ T8691]  sel_write_load+0x24e/0x410
[  137.419330][ T8691]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  137.424962][ T8691]  __vfs_write+0xff/0x700
[  137.429282][ T8691]  ? __kernel_write+0x350/0x350
[  137.434236][ T8691]  ? avc_policy_seqno+0x1b/0x70
[  137.439075][ T8691]  ? selinux_file_permission+0x2ba/0x560
[  137.444708][ T8691]  ? security_file_permission+0x157/0x350
[  137.450407][ T8691]  ? rw_verify_area+0x1c2/0x360
[  137.455249][ T8691]  vfs_write+0x203/0x4e0
[  137.459496][ T8691]  ksys_write+0x168/0x2a0
[  137.463808][ T8691]  ? __ia32_sys_read+0x90/0x90
[  137.468553][ T8691]  ? __kasan_check_read+0x11/0x20
[  137.473574][ T8691]  ? __ia32_sys_clock_settime+0x230/0x230
[  137.479308][ T8691]  __x64_sys_write+0x7b/0x90
[  137.483898][ T8691]  do_syscall_64+0xc0/0x100
[  137.488395][ T8691]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  137.494901][ T8691] RIP: 0033:0x45b349
[  137.498801][ T8691] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  137.518397][ T8691] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  137.526799][ T8691] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  137.534759][ T8691] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  137.542723][ T8691] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  137.550682][ T8691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
15:47:05 executing program 0 (fault-call:1 fault-nth:9):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:05 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x8, 0x0)

[  137.558642][ T8691] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000008
[  137.567657][ T8691] SELinux: failed to load policy
15:47:05 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0])

15:47:05 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid='])

[  137.629057][ T8711] FAULT_INJECTION: forcing a failure.
[  137.629057][ T8711] name failslab, interval 1, probability 0, space 0, times 0
15:47:05 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0xa, 0x0)

[  137.721901][ T8726] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value
[  137.731705][ T8711] CPU: 0 PID: 8711 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  137.741769][ T8711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  137.751824][ T8711] Call Trace:
[  137.755108][ T8711]  dump_stack+0x1b0/0x228
[  137.759438][ T8711]  ? devkmsg_release+0x127/0x127
[  137.764378][ T8711]  ? show_regs_print_info+0x18/0x18
[  137.769598][ T8711]  ? arch_stack_walk+0x98/0xe0
[  137.774366][ T8711]  should_fail+0x6fb/0x860
[  137.778787][ T8711]  ? setup_fault_attr+0x2b0/0x2b0
[  137.783809][ T8711]  ? stack_trace_snprint+0x150/0x150
[  137.789088][ T8711]  ? __kernel_text_address+0x9a/0x110
[  137.794447][ T8711]  __should_failslab+0x11a/0x160
[  137.799377][ T8711]  ? hashtab_create+0x117/0x3f0
[  137.804225][ T8711]  should_failslab+0x9/0x20
[  137.808765][ T8711]  __kmalloc+0x64/0x310
[  137.812927][ T8711]  ? kasan_kmalloc+0x9/0x10
[  137.817424][ T8711]  hashtab_create+0x117/0x3f0
[  137.822093][ T8711]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  137.828165][ T8711]  ? stack_trace_save+0x111/0x1e0
[  137.833238][ T8711]  symtab_init+0x32/0xa0
[  137.837477][ T8711]  policydb_read+0xe1/0x77f0
[  137.842054][ T8711]  ? __kasan_check_read+0x11/0x20
[  137.847059][ T8711]  ? __alloc_pages_nodemask+0x52d/0x3010
[  137.852687][ T8711]  ? vfs_write+0x203/0x4e0
[  137.857095][ T8711]  ? should_fail+0x182/0x860
[  137.861667][ T8711]  ? __vmalloc_node_range+0x2b6/0x760
[  137.867032][ T8711]  ? setup_fault_attr+0x2b0/0x2b0
[  137.872053][ T8711]  ? vfs_write+0x203/0x4e0
[  137.876451][ T8711]  ? ksys_write+0x168/0x2a0
[  137.880942][ T8711]  ? __x64_sys_write+0x7b/0x90
[  137.885698][ T8711]  ? do_syscall_64+0xc0/0x100
[  137.890366][ T8711]  ? string_to_av_perm+0x1c0/0x1c0
[  137.895462][ T8711]  ? __should_failslab+0x11a/0x160
[  137.900555][ T8711]  ? security_load_policy+0x1af/0xfd0
[  137.905920][ T8711]  ? kasan_kmalloc+0x9/0x10
[  137.910418][ T8711]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  137.915869][ T8711]  security_load_policy+0x228/0xfd0
[  137.921322][ T8711]  ? _raw_spin_lock+0xa1/0x170
[  137.926061][ T8711]  ? _raw_spin_trylock_bh+0x190/0x190
[  137.931434][ T8711]  ? security_change_sid+0x50/0x50
[  137.936531][ T8711]  ? vmap_page_range_noflush+0x67b/0x6a0
[  137.942193][ T8711]  ? __vmalloc_node_range+0x56c/0x760
[  137.947589][ T8711]  ? __kasan_check_write+0x14/0x20
[  137.952701][ T8711]  ? _copy_from_user+0xa8/0xe0
[  137.957453][ T8711]  sel_write_load+0x24e/0x410
[  137.962114][ T8711]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  137.967741][ T8711]  __vfs_write+0xff/0x700
[  137.972062][ T8711]  ? __kernel_write+0x350/0x350
[  137.976901][ T8711]  ? avc_policy_seqno+0x1b/0x70
[  137.981733][ T8711]  ? selinux_file_permission+0x2ba/0x560
[  137.987470][ T8711]  ? security_file_permission+0x157/0x350
[  137.993182][ T8711]  ? rw_verify_area+0x1c2/0x360
[  137.998112][ T8711]  vfs_write+0x203/0x4e0
[  138.002353][ T8711]  ksys_write+0x168/0x2a0
[  138.006679][ T8711]  ? __ia32_sys_read+0x90/0x90
[  138.011429][ T8711]  ? __kasan_check_read+0x11/0x20
[  138.016441][ T8711]  ? __ia32_sys_clock_settime+0x230/0x230
[  138.022150][ T8711]  __x64_sys_write+0x7b/0x90
[  138.026735][ T8711]  do_syscall_64+0xc0/0x100
[  138.031237][ T8711]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  138.037123][ T8711] RIP: 0033:0x45b349
[  138.041015][ T8711] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  138.060679][ T8711] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
15:47:05 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
fsetxattr$security_capability(r3, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0x2, 0xc23}, {0x2cf6, 0x80000000}]}, 0x14, 0x1)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
setsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000200)="f0d227256c3d004891fffcff6df103687a935ec264608679cfe951616799bcf4227ac12d2d13deccfa9b9463ac4be81d47abf571c9d85fb287366e726d50a5cdc13d254522f6b17976cdf4d671eaece1f75dba6d8907248c3b30e8b4f1ffdd82b35a6aab89aa94d8be38d77a978943f1286e8fb32c0a739f55918e5846f290d8fa218fd971baa8a2100a30bfd13e6a6e", 0x90)
r6 = socket$key(0xf, 0x3, 0x2)
fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "e16a403b1afd63dae6af7c42350556ef"}, 0x11, 0x3)
sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0)

15:47:05 executing program 4:
setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x980, 0x0)
sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, 0x1, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x14}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x5}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x1}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x476cd0107e2b34a}, 0x400)
getpid()
recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
fcntl$setpipe(r2, 0x407, 0xb60)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0)
r3 = inotify_init()
inotify_add_watch(r3, &(0x7f0000000300)='.\x00', 0xfe)
r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0)
write$nbd(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="65029f92858f5d14dab54e89ebc4beffcb6344d95299ebe1788bbc2929d6cbfb4c0000008000000000f3c1f00417be5a5377054a0b7422efded4e9ad0873f6cc15b450a5a253cd29a5be212a4565b44b752a1b2b9cef", @ANYRESOCT, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16]], 0x3)
sendfile(r4, r4, &(0x7f0000000200), 0xa198)
r5 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc)
syncfs(r5)

[  138.069098][ T8711] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  138.077155][ T8711] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  138.085125][ T8711] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  138.093201][ T8711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  138.101158][ T8711] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000009
[  138.110584][ T8711] SELinux: failed to load policy
15:47:05 executing program 0 (fault-call:1 fault-nth:10):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:05 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x18, 0x0)

15:47:05 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0])

[  138.139290][ T8734] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value
[  138.157875][ T8744] SELinux: ebitmap: truncated map
[  138.163511][ T8744] SELinux: failed to load policy
[  138.202770][ T8744] SELinux:  policydb magic number 0x75636573 does not match expected magic number 0xf97cff8c
[  138.213652][ T8744] SELinux: failed to load policy
[  138.219275][ T8755] FAULT_INJECTION: forcing a failure.
[  138.219275][ T8755] name failslab, interval 1, probability 0, space 0, times 0
[  138.232485][ T8755] CPU: 0 PID: 8755 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  138.242558][ T8755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  138.253105][ T8755] Call Trace:
[  138.256409][ T8755]  dump_stack+0x1b0/0x228
[  138.260735][ T8755]  ? devkmsg_release+0x127/0x127
[  138.265668][ T8755]  ? show_regs_print_info+0x18/0x18
[  138.270852][ T8755]  ? arch_stack_walk+0x98/0xe0
[  138.275627][ T8755]  should_fail+0x6fb/0x860
[  138.280058][ T8755]  ? setup_fault_attr+0x2b0/0x2b0
[  138.285082][ T8755]  ? stack_trace_snprint+0x150/0x150
[  138.290351][ T8755]  ? ___slab_alloc+0xab/0x450
[  138.295020][ T8755]  __should_failslab+0x11a/0x160
[  138.299946][ T8755]  ? hashtab_create+0x117/0x3f0
[  138.304898][ T8755]  should_failslab+0x9/0x20
[  138.309385][ T8755]  __kmalloc+0x64/0x310
[  138.313531][ T8755]  hashtab_create+0x117/0x3f0
[  138.318202][ T8755]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  138.324256][ T8755]  ? stack_trace_save+0x111/0x1e0
[  138.329265][ T8755]  symtab_init+0x32/0xa0
[  138.333506][ T8755]  policydb_read+0xe1/0x77f0
[  138.338096][ T8755]  ? alloc_slab_page+0x135/0x390
[  138.343113][ T8755]  ? kasan_init_slab_obj+0x24/0x30
[  138.348237][ T8755]  ? setup_object+0xfa/0x130
[  138.352907][ T8755]  ? new_slab+0x21b/0x430
[  138.357232][ T8755]  ? string_to_av_perm+0x1c0/0x1c0
[  138.362347][ T8755]  ? __should_failslab+0x11a/0x160
[  138.367441][ T8755]  ? security_load_policy+0x1af/0xfd0
[  138.372809][ T8755]  ? kasan_kmalloc+0x9/0x10
[  138.377314][ T8755]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  138.382780][ T8755]  security_load_policy+0x228/0xfd0
[  138.387964][ T8755]  ? _raw_spin_lock+0xa1/0x170
[  138.392710][ T8755]  ? _raw_spin_trylock_bh+0x190/0x190
[  138.398081][ T8755]  ? security_change_sid+0x50/0x50
[  138.403190][ T8755]  ? vmap_page_range_noflush+0x67b/0x6a0
[  138.408892][ T8755]  ? __vmalloc_node_range+0x56c/0x760
[  138.414795][ T8755]  ? __kasan_check_write+0x14/0x20
[  138.419892][ T8755]  ? _copy_from_user+0xa8/0xe0
[  138.424667][ T8755]  sel_write_load+0x24e/0x410
[  138.429330][ T8755]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  138.435069][ T8755]  __vfs_write+0xff/0x700
[  138.439392][ T8755]  ? __kernel_write+0x350/0x350
[  138.444227][ T8755]  ? avc_policy_seqno+0x1b/0x70
[  138.449153][ T8755]  ? selinux_file_permission+0x2ba/0x560
[  138.454886][ T8755]  ? security_file_permission+0x157/0x350
[  138.460605][ T8755]  ? rw_verify_area+0x1c2/0x360
[  138.465439][ T8755]  vfs_write+0x203/0x4e0
[  138.469674][ T8755]  ksys_write+0x168/0x2a0
[  138.474013][ T8755]  ? __ia32_sys_read+0x90/0x90
[  138.478911][ T8755]  ? __kasan_check_read+0x11/0x20
[  138.483924][ T8755]  ? __ia32_sys_clock_settime+0x230/0x230
[  138.489663][ T8755]  __x64_sys_write+0x7b/0x90
[  138.494673][ T8755]  do_syscall_64+0xc0/0x100
[  138.499239][ T8755]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  138.505331][ T8755] RIP: 0033:0x45b349
[  138.509234][ T8755] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  138.528930][ T8755] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  138.537355][ T8755] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  138.545443][ T8755] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
15:47:05 executing program 3:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cf8048e3c3", 0x23}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg$IPSET_CMD_PROTOCOL(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x1, 0x6, 0x300, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

15:47:06 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0])

15:47:06 executing program 0 (fault-call:1 fault-nth:11):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  138.553442][ T8755] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  138.561425][ T8755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  138.569402][ T8755] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000a
[  138.585867][ T8755] SELinux: failed to load policy
15:47:06 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x180, 0x0)

15:47:06 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x0, 0x2}, 0x10}}, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = creat(&(0x7f0000000040)='./file0\x00', 0x8)
getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000100)=0x54)
dup3(r2, r0, 0x0)

[  138.652069][ T8769] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value
[  138.683198][ T8779] FAULT_INJECTION: forcing a failure.
[  138.683198][ T8779] name failslab, interval 1, probability 0, space 0, times 0
[  138.698605][ T8779] CPU: 1 PID: 8779 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  138.708790][ T8779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  138.718847][ T8779] Call Trace:
[  138.722147][ T8779]  dump_stack+0x1b0/0x228
[  138.726589][ T8779]  ? devkmsg_release+0x127/0x127
[  138.731537][ T8779]  ? show_regs_print_info+0x18/0x18
[  138.736741][ T8779]  ? arch_stack_walk+0x98/0xe0
[  138.741520][ T8779]  should_fail+0x6fb/0x860
[  138.745949][ T8779]  ? setup_fault_attr+0x2b0/0x2b0
[  138.751003][ T8779]  ? stack_trace_snprint+0x150/0x150
[  138.756293][ T8779]  ? ___slab_alloc+0xab/0x450
[  138.761082][ T8779]  __should_failslab+0x11a/0x160
[  138.766023][ T8779]  ? hashtab_create+0x117/0x3f0
[  138.770871][ T8779]  should_failslab+0x9/0x20
[  138.775381][ T8779]  __kmalloc+0x64/0x310
[  138.779563][ T8779]  hashtab_create+0x117/0x3f0
[  138.784231][ T8779]  symtab_init+0x32/0xa0
[  138.788449][ T8779]  policydb_read+0x113/0x77f0
[  138.793144][ T8779]  ? __kasan_check_read+0x11/0x20
[  138.798248][ T8779]  ? __alloc_pages_nodemask+0x52d/0x3010
[  138.803871][ T8779]  ? vfs_write+0x203/0x4e0
[  138.808274][ T8779]  ? should_fail+0x182/0x860
[  138.812899][ T8779]  ? __vmalloc_node_range+0x2b6/0x760
[  138.818317][ T8779]  ? setup_fault_attr+0x2b0/0x2b0
[  138.823331][ T8779]  ? vfs_write+0x203/0x4e0
[  138.827777][ T8779]  ? ksys_write+0x168/0x2a0
[  138.832334][ T8779]  ? __x64_sys_write+0x7b/0x90
[  138.837075][ T8779]  ? do_syscall_64+0xc0/0x100
[  138.842085][ T8779]  ? string_to_av_perm+0x1c0/0x1c0
[  138.847192][ T8779]  ? __should_failslab+0x11a/0x160
[  138.852384][ T8779]  ? security_load_policy+0x1af/0xfd0
[  138.857740][ T8779]  ? kasan_kmalloc+0x9/0x10
[  138.862231][ T8779]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  138.867675][ T8779]  security_load_policy+0x228/0xfd0
[  138.872898][ T8779]  ? _raw_spin_lock+0xa1/0x170
[  138.877664][ T8779]  ? _raw_spin_trylock_bh+0x190/0x190
[  138.883024][ T8779]  ? security_change_sid+0x50/0x50
[  138.888168][ T8779]  ? vmap_page_range_noflush+0x67b/0x6a0
[  138.893804][ T8779]  ? __vmalloc_node_range+0x56c/0x760
[  138.899164][ T8779]  ? __kasan_check_write+0x14/0x20
[  138.904264][ T8779]  ? _copy_from_user+0xa8/0xe0
[  138.909006][ T8779]  sel_write_load+0x24e/0x410
[  138.913940][ T8779]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  138.919570][ T8779]  __vfs_write+0xff/0x700
[  138.923919][ T8779]  ? __kernel_write+0x350/0x350
[  138.928812][ T8779]  ? avc_policy_seqno+0x1b/0x70
[  138.933639][ T8779]  ? selinux_file_permission+0x2ba/0x560
[  138.939260][ T8779]  ? security_file_permission+0x157/0x350
[  138.944984][ T8779]  ? rw_verify_area+0x1c2/0x360
[  138.949868][ T8779]  vfs_write+0x203/0x4e0
[  138.954124][ T8779]  ksys_write+0x168/0x2a0
[  138.958495][ T8779]  ? __ia32_sys_read+0x90/0x90
[  138.963295][ T8779]  ? __kasan_check_read+0x11/0x20
[  138.968353][ T8779]  ? __ia32_sys_clock_settime+0x230/0x230
[  138.974070][ T8779]  __x64_sys_write+0x7b/0x90
[  138.978648][ T8779]  do_syscall_64+0xc0/0x100
[  138.983138][ T8779]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  138.989013][ T8779] RIP: 0033:0x45b349
[  138.992885][ T8779] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  139.012476][ T8779] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  139.020926][ T8779] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  139.028936][ T8779] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  139.036941][ T8779] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  139.044890][ T8779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
15:47:06 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x2)

15:47:06 executing program 0 (fault-call:1 fault-nth:12):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  139.052845][ T8779] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000b
[  139.062669][ T8779] SELinux: failed to load policy
15:47:06 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0])

[  139.175681][ T8801] EXT4-fs (sda1): Unrecognized mount option "resg0x0000000000000000" or missing value
[  139.194465][ T8805] FAULT_INJECTION: forcing a failure.
[  139.194465][ T8805] name failslab, interval 1, probability 0, space 0, times 0
[  139.214048][ T8805] CPU: 0 PID: 8805 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  139.224122][ T8805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  139.234363][ T8805] Call Trace:
[  139.237648][ T8805]  dump_stack+0x1b0/0x228
[  139.242097][ T8805]  ? devkmsg_release+0x127/0x127
[  139.247040][ T8805]  ? show_regs_print_info+0x18/0x18
[  139.252239][ T8805]  ? arch_stack_walk+0x98/0xe0
[  139.257129][ T8805]  should_fail+0x6fb/0x860
[  139.261554][ T8805]  ? setup_fault_attr+0x2b0/0x2b0
[  139.266587][ T8805]  ? stack_trace_snprint+0x150/0x150
[  139.271881][ T8805]  ? __kernel_text_address+0x9a/0x110
[  139.277263][ T8805]  __should_failslab+0x11a/0x160
[  139.282309][ T8805]  ? hashtab_create+0x5c/0x3f0
[  139.287084][ T8805]  should_failslab+0x9/0x20
[  139.291604][ T8805]  kmem_cache_alloc_trace+0x3a/0x2f0
[  139.297022][ T8805]  ? kasan_kmalloc+0x9/0x10
[  139.301536][ T8805]  ? symtab_init+0xa0/0xa0
[  139.305967][ T8805]  ? symhash+0x100/0x100
[  139.310218][ T8805]  hashtab_create+0x5c/0x3f0
[  139.314811][ T8805]  symtab_init+0x32/0xa0
[  139.319069][ T8805]  policydb_read+0x148/0x77f0
[  139.323806][ T8805]  ? __kasan_check_read+0x11/0x20
[  139.328848][ T8805]  ? __alloc_pages_nodemask+0x52d/0x3010
[  139.334503][ T8805]  ? vfs_write+0x203/0x4e0
[  139.338908][ T8805]  ? should_fail+0x182/0x860
[  139.343501][ T8805]  ? __vmalloc_node_range+0x2b6/0x760
[  139.348871][ T8805]  ? setup_fault_attr+0x2b0/0x2b0
[  139.353916][ T8805]  ? vfs_write+0x203/0x4e0
[  139.358337][ T8805]  ? ksys_write+0x168/0x2a0
[  139.362848][ T8805]  ? do_syscall_64+0xc0/0x100
[  139.367521][ T8805]  ? string_to_av_perm+0x1c0/0x1c0
[  139.372623][ T8805]  ? __should_failslab+0x11a/0x160
[  139.377821][ T8805]  ? security_load_policy+0x1af/0xfd0
[  139.383189][ T8805]  ? kasan_kmalloc+0x9/0x10
[  139.387691][ T8805]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  139.393148][ T8805]  security_load_policy+0x228/0xfd0
[  139.398688][ T8805]  ? _raw_spin_lock+0xa1/0x170
[  139.403539][ T8805]  ? _raw_spin_trylock_bh+0x190/0x190
[  139.408907][ T8805]  ? security_change_sid+0x50/0x50
[  139.414019][ T8805]  ? vmap_page_range_noflush+0x67b/0x6a0
[  139.419723][ T8805]  ? __vmalloc_node_range+0x56c/0x760
[  139.425087][ T8805]  ? __kasan_check_write+0x14/0x20
[  139.430194][ T8805]  ? _copy_from_user+0xa8/0xe0
[  139.436489][ T8805]  sel_write_load+0x24e/0x410
[  139.441234][ T8805]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  139.446956][ T8805]  __vfs_write+0xff/0x700
[  139.451400][ T8805]  ? __kernel_write+0x350/0x350
[  139.456255][ T8805]  ? avc_policy_seqno+0x1b/0x70
[  139.461102][ T8805]  ? selinux_file_permission+0x2ba/0x560
[  139.466724][ T8805]  ? security_file_permission+0x157/0x350
[  139.473264][ T8805]  ? rw_verify_area+0x1c2/0x360
[  139.478233][ T8805]  vfs_write+0x203/0x4e0
[  139.482497][ T8805]  ksys_write+0x168/0x2a0
[  139.486816][ T8805]  ? __ia32_sys_read+0x90/0x90
[  139.491659][ T8805]  ? __kasan_check_read+0x11/0x20
[  139.496678][ T8805]  ? __ia32_sys_clock_settime+0x230/0x230
[  139.502411][ T8805]  __x64_sys_write+0x7b/0x90
[  139.507231][ T8805]  do_syscall_64+0xc0/0x100
[  139.511736][ T8805]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  139.517608][ T8805] RIP: 0033:0x45b349
[  139.521568][ T8805] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  139.541286][ T8805] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  139.549694][ T8805] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  139.557695][ T8805] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  139.565666][ T8805] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
15:47:07 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x3)

15:47:07 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0])

15:47:07 executing program 0 (fault-call:1 fault-nth:13):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:07 executing program 4:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0])

15:47:07 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x4)

[  139.573852][ T8805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  139.581906][ T8805] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000c
15:47:07 executing program 3:
prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, 0x0, 0x0, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000340)={'filter\x00', 0x0, 0x3, 0x1000, [], 0x4, &(0x7f0000000280)=[{}, {}, {}, {}], &(0x7f0000000980)=""/4096}, &(0x7f00000002c0)=0x78)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
r5 = socket(0x25, 0x6, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket(0x10, 0x80002, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r6=>0x0})
pselect6(0x40, &(0x7f00000000c0)={0x0, 0x8001}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0)

15:47:07 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0])

[  139.651949][ T8811] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value
[  139.683829][ T8823] FAULT_INJECTION: forcing a failure.
[  139.683829][ T8823] name failslab, interval 1, probability 0, space 0, times 0
[  139.700832][ T8823] CPU: 0 PID: 8823 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  139.710955][ T8823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  139.721006][ T8823] Call Trace:
[  139.724287][ T8823]  dump_stack+0x1b0/0x228
[  139.728840][ T8823]  ? devkmsg_release+0x127/0x127
[  139.733779][ T8823]  ? show_regs_print_info+0x18/0x18
[  139.738966][ T8823]  ? arch_stack_walk+0x98/0xe0
[  139.743736][ T8823]  should_fail+0x6fb/0x860
[  139.748160][ T8823]  ? setup_fault_attr+0x2b0/0x2b0
[  139.753179][ T8823]  ? stack_trace_snprint+0x150/0x150
[  139.758455][ T8823]  ? __kernel_text_address+0x9a/0x110
[  139.763813][ T8823]  __should_failslab+0x11a/0x160
[  139.768758][ T8823]  ? hashtab_create+0x117/0x3f0
[  139.773628][ T8823]  should_failslab+0x9/0x20
[  139.778113][ T8823]  __kmalloc+0x64/0x310
[  139.782261][ T8823]  ? kasan_kmalloc+0x9/0x10
[  139.786866][ T8823]  hashtab_create+0x117/0x3f0
[  139.791547][ T8823]  symtab_init+0x32/0xa0
[  139.795794][ T8823]  policydb_read+0x148/0x77f0
[  139.800470][ T8823]  ? __kasan_check_read+0x11/0x20
[  139.805526][ T8823]  ? __alloc_pages_nodemask+0x52d/0x3010
[  139.811167][ T8823]  ? vfs_write+0x203/0x4e0
[  139.815581][ T8823]  ? should_fail+0x182/0x860
[  139.820171][ T8823]  ? __vmalloc_node_range+0x2b6/0x760
[  139.825558][ T8823]  ? setup_fault_attr+0x2b0/0x2b0
[  139.830576][ T8823]  ? vfs_write+0x203/0x4e0
[  139.834988][ T8823]  ? ksys_write+0x168/0x2a0
[  139.839486][ T8823]  ? do_syscall_64+0xc0/0x100
[  139.844168][ T8823]  ? string_to_av_perm+0x1c0/0x1c0
[  139.849287][ T8823]  ? __should_failslab+0x11a/0x160
[  139.854385][ T8823]  ? security_load_policy+0x1af/0xfd0
[  139.859749][ T8823]  ? kasan_kmalloc+0x9/0x10
[  139.864332][ T8823]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  139.869788][ T8823]  security_load_policy+0x228/0xfd0
[  139.874970][ T8823]  ? _raw_spin_lock+0xa1/0x170
[  139.879713][ T8823]  ? _raw_spin_trylock_bh+0x190/0x190
[  139.885078][ T8823]  ? security_change_sid+0x50/0x50
[  139.890179][ T8823]  ? vmap_page_range_noflush+0x67b/0x6a0
[  139.895792][ T8823]  ? __vmalloc_node_range+0x56c/0x760
[  139.901154][ T8823]  ? __kasan_check_write+0x14/0x20
[  139.906257][ T8823]  ? _copy_from_user+0xa8/0xe0
[  139.911004][ T8823]  sel_write_load+0x24e/0x410
[  139.915675][ T8823]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  139.921301][ T8823]  __vfs_write+0xff/0x700
[  139.925612][ T8823]  ? __kernel_write+0x350/0x350
[  139.930573][ T8823]  ? avc_policy_seqno+0x1b/0x70
[  139.935418][ T8823]  ? selinux_file_permission+0x2ba/0x560
[  139.941060][ T8823]  ? security_file_permission+0x157/0x350
[  139.946759][ T8823]  ? rw_verify_area+0x1c2/0x360
[  139.951585][ T8823]  vfs_write+0x203/0x4e0
[  139.955827][ T8823]  ksys_write+0x168/0x2a0
[  139.960145][ T8823]  ? __ia32_sys_read+0x90/0x90
[  139.964955][ T8823]  ? __kasan_check_read+0x11/0x20
[  139.969977][ T8823]  ? __ia32_sys_clock_settime+0x230/0x230
[  139.975690][ T8823]  __x64_sys_write+0x7b/0x90
[  139.980273][ T8823]  do_syscall_64+0xc0/0x100
[  139.984763][ T8823]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  139.990647][ T8823] RIP: 0033:0x45b349
[  139.994536][ T8823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  140.014133][ T8823] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  140.022547][ T8823] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  140.030516][ T8823] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  140.038484][ T8823] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
15:47:07 executing program 0 (fault-call:1 fault-nth:14):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:07 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0])

[  140.046887][ T8823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  140.054853][ T8823] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000d
[  140.091606][ T8829] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value
15:47:07 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x5)

[  140.136678][ T8831] EXT4-fs (sda1): Unrecognized mount option "resg0x0000000000000000" or missing value
[  140.155911][ T8849] FAULT_INJECTION: forcing a failure.
[  140.155911][ T8849] name failslab, interval 1, probability 0, space 0, times 0
[  140.180207][ T8849] CPU: 1 PID: 8849 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  140.190431][ T8849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  140.200754][ T8849] Call Trace:
[  140.204053][ T8849]  dump_stack+0x1b0/0x228
[  140.208490][ T8849]  ? devkmsg_release+0x127/0x127
[  140.213465][ T8849]  ? show_regs_print_info+0x18/0x18
[  140.218765][ T8849]  ? arch_stack_walk+0x98/0xe0
[  140.223672][ T8849]  should_fail+0x6fb/0x860
[  140.228107][ T8849]  ? setup_fault_attr+0x2b0/0x2b0
[  140.233154][ T8849]  ? __perf_event_task_sched_in+0x4ed/0x550
[  140.239063][ T8849]  ? ___slab_alloc+0xab/0x450
[  140.243747][ T8849]  __should_failslab+0x11a/0x160
[  140.248699][ T8849]  ? hashtab_create+0x5c/0x3f0
[  140.253474][ T8849]  should_failslab+0x9/0x20
[  140.258011][ T8849]  kmem_cache_alloc_trace+0x3a/0x2f0
[  140.263301][ T8849]  ? symtab_init+0xa0/0xa0
[  140.267830][ T8849]  ? symhash+0x100/0x100
[  140.272100][ T8849]  hashtab_create+0x5c/0x3f0
[  140.276704][ T8849]  symtab_init+0x32/0xa0
[  140.281045][ T8849]  policydb_read+0x17d/0x77f0
[  140.285732][ T8849]  ? __sched_text_start+0x8/0x8
[  140.290586][ T8849]  ? __alloc_pages_nodemask+0x52d/0x3010
[  140.296225][ T8849]  ? __kasan_check_read+0x11/0x20
[  140.301364][ T8849]  ? preempt_schedule_irq+0xc7/0x110
[  140.306725][ T8849]  ? preempt_schedule_notrace+0x110/0x110
[  140.312542][ T8849]  ? vfs_write+0x203/0x4e0
[  140.316941][ T8849]  ? do_syscall_64+0xc0/0x100
[  140.321608][ T8849]  ? string_to_av_perm+0x1c0/0x1c0
[  140.326753][ T8849]  ? retint_kernel+0x1b/0x1b
[  140.331355][ T8849]  security_load_policy+0x228/0xfd0
[  140.336601][ T8849]  ? _raw_spin_lock+0xa1/0x170
[  140.341470][ T8849]  ? _raw_spin_trylock_bh+0x190/0x190
[  140.346966][ T8849]  ? security_change_sid+0x50/0x50
[  140.352063][ T8849]  ? vmap_page_range_noflush+0x67b/0x6a0
[  140.358066][ T8849]  ? __vmalloc_node_range+0x56c/0x760
[  140.363732][ T8849]  ? __kasan_check_write+0x14/0x20
[  140.368831][ T8849]  ? _copy_from_user+0xa8/0xe0
[  140.373676][ T8849]  sel_write_load+0x24e/0x410
[  140.378362][ T8849]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  140.384025][ T8849]  __vfs_write+0xff/0x700
[  140.388435][ T8849]  ? __kernel_write+0x350/0x350
[  140.393634][ T8849]  ? avc_policy_seqno+0x1b/0x70
[  140.398612][ T8849]  ? selinux_file_permission+0x2ba/0x560
[  140.404303][ T8849]  ? security_file_permission+0x157/0x350
[  140.410113][ T8849]  ? rw_verify_area+0x1c2/0x360
[  140.415206][ T8849]  vfs_write+0x203/0x4e0
[  140.419445][ T8849]  ksys_write+0x168/0x2a0
[  140.423856][ T8849]  ? __ia32_sys_read+0x90/0x90
[  140.428605][ T8849]  ? __kasan_check_read+0x11/0x20
[  140.433665][ T8849]  ? __ia32_sys_clock_settime+0x230/0x230
[  140.439388][ T8849]  __x64_sys_write+0x7b/0x90
[  140.443974][ T8849]  do_syscall_64+0xc0/0x100
[  140.448492][ T8849]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  140.454546][ T8849] RIP: 0033:0x45b349
[  140.458449][ T8849] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  140.478995][ T8849] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  140.487543][ T8849] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  140.495688][ T8849] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  140.503796][ T8849] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  140.511814][ T8849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  140.519782][ T8849] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000e
[  140.532631][ T8849] sel_write_load: 2 callbacks suppressed
15:47:08 executing program 0 (fault-call:1 fault-nth:15):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:08 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0])

15:47:08 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10)
r1 = socket(0x400000000000010, 0x802, 0x0)
write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24)
r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = dup3(r2, r3, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4)
r7 = dup3(r1, 0xffffffffffffffff, 0x0)
ioctl$BLKPBSZGET(r7, 0x127b, &(0x7f0000000000))
setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x30, 0x0, 0x4000)

[  140.532636][ T8849] SELinux: failed to load policy
[  140.550920][ T8848] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value
15:47:08 executing program 3:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0'])
chdir(&(0x7f00000002c0)='./bus\x00')
creat(&(0x7f0000000700)='./bus\x00', 0x0)
r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0)
write$P9_RREADDIR(r0, &(0x7f00000000c0)={0x2a, 0x29, 0x1, {0x7, [{{0x4, 0x1, 0x6}, 0xb4, 0x1, 0x7, './file1'}]}}, 0x2a)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
fadvise64(r1, 0x0, 0x0, 0x4)

15:47:08 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x6)

[  140.611555][ T8869] FAULT_INJECTION: forcing a failure.
[  140.611555][ T8869] name failslab, interval 1, probability 0, space 0, times 0
[  140.624792][ T8869] CPU: 1 PID: 8869 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  140.634887][ T8869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  140.644970][ T8869] Call Trace:
[  140.648272][ T8869]  dump_stack+0x1b0/0x228
[  140.652664][ T8869]  ? devkmsg_release+0x127/0x127
[  140.657649][ T8869]  ? show_regs_print_info+0x18/0x18
[  140.662907][ T8869]  ? arch_stack_walk+0x98/0xe0
[  140.667780][ T8869]  should_fail+0x6fb/0x860
[  140.672282][ T8869]  ? setup_fault_attr+0x2b0/0x2b0
[  140.677287][ T8869]  ? stack_trace_snprint+0x150/0x150
[  140.682732][ T8869]  ? ___slab_alloc+0xab/0x450
[  140.687398][ T8869]  __should_failslab+0x11a/0x160
[  140.692340][ T8869]  ? hashtab_create+0x117/0x3f0
[  140.697234][ T8869]  should_failslab+0x9/0x20
[  140.701763][ T8869]  __kmalloc+0x64/0x310
[  140.706014][ T8869]  hashtab_create+0x117/0x3f0
[  140.710806][ T8869]  symtab_init+0x32/0xa0
[  140.715032][ T8869]  policydb_read+0x17d/0x77f0
[  140.720788][ T8869]  ? __kasan_check_read+0x11/0x20
[  140.726321][ T8869]  ? __alloc_pages_nodemask+0x52d/0x3010
[  140.732172][ T8869]  ? vfs_write+0x203/0x4e0
[  140.736570][ T8869]  ? should_fail+0x182/0x860
[  140.741145][ T8869]  ? __vmalloc_node_range+0x2b6/0x760
[  140.746766][ T8869]  ? setup_fault_attr+0x2b0/0x2b0
[  140.751775][ T8869]  ? vfs_write+0x203/0x4e0
[  140.756186][ T8869]  ? ksys_write+0x168/0x2a0
[  140.760678][ T8869]  ? do_syscall_64+0xc0/0x100
[  140.765353][ T8869]  ? string_to_av_perm+0x1c0/0x1c0
[  140.770475][ T8869]  ? __should_failslab+0x11a/0x160
[  140.775585][ T8869]  ? security_load_policy+0x1af/0xfd0
[  140.781029][ T8869]  ? kasan_kmalloc+0x9/0x10
[  140.785634][ T8869]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  140.791526][ T8869]  security_load_policy+0x228/0xfd0
[  140.796719][ T8869]  ? _raw_spin_lock+0xa1/0x170
[  140.801585][ T8869]  ? _raw_spin_trylock_bh+0x190/0x190
[  140.806946][ T8869]  ? security_change_sid+0x50/0x50
[  140.813435][ T8869]  ? vmap_page_range_noflush+0x67b/0x6a0
[  140.819061][ T8869]  ? __vmalloc_node_range+0x56c/0x760
[  140.824430][ T8869]  ? __kasan_check_write+0x14/0x20
[  140.829551][ T8869]  ? _copy_from_user+0xa8/0xe0
[  140.834312][ T8869]  sel_write_load+0x24e/0x410
[  140.839025][ T8869]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  140.844731][ T8869]  __vfs_write+0xff/0x700
[  140.849064][ T8869]  ? __kernel_write+0x350/0x350
[  140.853915][ T8869]  ? avc_policy_seqno+0x1b/0x70
[  140.858890][ T8869]  ? selinux_file_permission+0x2ba/0x560
[  140.864774][ T8869]  ? security_file_permission+0x157/0x350
[  140.870504][ T8869]  ? rw_verify_area+0x1c2/0x360
[  140.875340][ T8869]  vfs_write+0x203/0x4e0
[  140.879588][ T8869]  ksys_write+0x168/0x2a0
[  140.883907][ T8869]  ? __ia32_sys_read+0x90/0x90
[  140.888687][ T8869]  ? __kasan_check_read+0x11/0x20
[  140.893710][ T8869]  ? __ia32_sys_clock_settime+0x230/0x230
[  140.899521][ T8869]  __x64_sys_write+0x7b/0x90
[  140.904096][ T8869]  do_syscall_64+0xc0/0x100
[  140.908624][ T8869]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  140.914598][ T8869] RIP: 0033:0x45b349
[  140.918475][ T8869] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  140.938168][ T8869] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  140.946575][ T8869] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  140.954620][ T8869] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
15:47:08 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0])

15:47:08 executing program 0 (fault-call:1 fault-nth:16):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  140.962578][ T8869] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  140.970535][ T8869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  140.978497][ T8869] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000f
[  140.998696][ T8869] SELinux: failed to load policy
15:47:08 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40, 0x163)
r3 = fcntl$dupfd(r1, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket(0xa, 0x4, 0x8)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)={'batadv_slave_0\x00', 0x7})
getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000280), &(0x7f00000000c0)=0x4)
r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r6 = dup(r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$unix(0x1, 0x2, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
setsockopt$packet_int(r3, 0x107, 0x3, &(0x7f0000000040)=0x7f, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c00000010000108002aa71a30cf7f161451e791", @ANYRES32=0x0, @ANYBLOB="000000001b000000000014001680104ae3b8fd99a84a70e6c12e8d0f823c3db8efb3e91c56d2b77e225341a277d9fa4efc4be3c3846103c803370e309612f12ee06981bd938ee6feb1da23a41b981da372fb6035b9a744d46c42fe0dcf2f109cf3c06e3bf19f476768127de214df264b6960678c3598a0bfa554fc06107a9b817ad76130ee35f75ab2571c2e506a1b804c0d0aa2102a036d6f08acfb741791a5065da362dc9ca2e17e3bcb42d0e0d91eafb8f1ebb83256dade9848e11c058e5ac620008e00"/212], 0x3c}}, 0x0)
r9 = socket$unix(0x1, 0x2, 0x0)
r10 = fcntl$dupfd(r9, 0x0, r9)
ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200)
connect$tipc(r10, &(0x7f00000002c0)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x4, 0x1}}, 0x10)
r11 = dup(0xffffffffffffffff)
r12 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r12, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7c05000000075345204c526e757816000000000400000002ab000082577402573104000900deec028c00"/56], 0x38)
r13 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00')
r14 = socket$unix(0x1, 0x2, 0x0)
r15 = fcntl$dupfd(r14, 0x0, r14)
ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200)
getsockopt$sock_timeval(r15, 0x1, 0x14, &(0x7f0000000440), &(0x7f0000000480)=0x10)
sendmsg$NL80211_CMD_JOIN_MESH(r10, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r13, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, 0xb726}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4004)
r16 = dup2(r12, r7)
getsockopt$ARPT_SO_GET_INFO(r16, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x44)
setsockopt$inet6_IPV6_ADDRFORM(r11, 0x29, 0x1, &(0x7f0000007a00), 0x4)

15:47:08 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x7)

[  141.085439][ T8893] FAULT_INJECTION: forcing a failure.
[  141.085439][ T8893] name failslab, interval 1, probability 0, space 0, times 0
[  141.100707][ T8893] CPU: 0 PID: 8893 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  141.110929][ T8893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  141.120987][ T8893] Call Trace:
[  141.124277][ T8893]  dump_stack+0x1b0/0x228
[  141.128714][ T8893]  ? devkmsg_release+0x127/0x127
[  141.133574][ T8895] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'.
[  141.133645][ T8893]  ? show_regs_print_info+0x18/0x18
[  141.148109][ T8893]  ? arch_stack_walk+0x98/0xe0
[  141.152862][ T8893]  should_fail+0x6fb/0x860
[  141.157376][ T8893]  ? setup_fault_attr+0x2b0/0x2b0
[  141.162388][ T8893]  ? stack_trace_snprint+0x150/0x150
[  141.167773][ T8893]  ? __kernel_text_address+0x9a/0x110
[  141.173130][ T8893]  __should_failslab+0x11a/0x160
[  141.178050][ T8893]  ? hashtab_create+0x117/0x3f0
[  141.182890][ T8893]  should_failslab+0x9/0x20
[  141.187484][ T8893]  __kmalloc+0x64/0x310
[  141.191632][ T8893]  ? kasan_kmalloc+0x9/0x10
[  141.196125][ T8893]  hashtab_create+0x117/0x3f0
[  141.200787][ T8893]  symtab_init+0x32/0xa0
[  141.205013][ T8893]  policydb_read+0x17d/0x77f0
[  141.209677][ T8893]  ? __kasan_check_read+0x11/0x20
[  141.214690][ T8893]  ? alloc_slab_page+0x135/0x390
[  141.219623][ T8893]  ? __kasan_check_read+0x11/0x20
[  141.224636][ T8893]  ? kasan_init_slab_obj+0x24/0x30
[  141.229762][ T8893]  ? setup_object+0xfa/0x130
[  141.234342][ T8893]  ? new_slab+0x21b/0x430
[  141.238706][ T8893]  ? string_to_av_perm+0x1c0/0x1c0
[  141.243810][ T8893]  ? __should_failslab+0x11a/0x160
[  141.248915][ T8893]  ? security_load_policy+0x1af/0xfd0
[  141.254318][ T8893]  ? kasan_kmalloc+0x9/0x10
[  141.258809][ T8893]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  141.264308][ T8893]  security_load_policy+0x228/0xfd0
[  141.269628][ T8893]  ? __sched_text_start+0x8/0x8
[  141.274464][ T8893]  ? _raw_spin_lock+0xa1/0x170
[  141.279213][ T8893]  ? _raw_spin_trylock_bh+0x190/0x190
[  141.284601][ T8893]  ? security_change_sid+0x50/0x50
[  141.290153][ T8893]  ? __kasan_check_read+0x11/0x20
[  141.295165][ T8893]  ? preempt_schedule_irq+0xc7/0x110
[  141.300443][ T8893]  ? preempt_schedule_notrace+0x110/0x110
[  141.306147][ T8893]  ? retint_kernel+0x1b/0x1b
[  141.310720][ T8893]  sel_write_load+0x24e/0x410
[  141.315419][ T8893]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  141.321031][ T8893]  __vfs_write+0xff/0x700
[  141.325348][ T8893]  ? __kernel_write+0x350/0x350
[  141.330186][ T8893]  ? avc_policy_seqno+0x1b/0x70
[  141.335010][ T8893]  ? selinux_file_permission+0x2ba/0x560
[  141.340730][ T8893]  ? security_file_permission+0x157/0x350
[  141.346441][ T8893]  ? rw_verify_area+0x1c2/0x360
[  141.351271][ T8893]  vfs_write+0x203/0x4e0
[  141.355496][ T8893]  ksys_write+0x168/0x2a0
[  141.359872][ T8893]  ? __ia32_sys_read+0x90/0x90
[  141.364625][ T8893]  ? __kasan_check_read+0x11/0x20
[  141.369660][ T8893]  ? __ia32_sys_clock_settime+0x230/0x230
[  141.375370][ T8893]  __x64_sys_write+0x7b/0x90
[  141.379961][ T8893]  do_syscall_64+0xc0/0x100
[  141.384487][ T8893]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  141.390378][ T8893] RIP: 0033:0x45b349
[  141.394255][ T8893] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  141.413864][ T8893] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  141.422264][ T8893] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
15:47:08 executing program 0 (fault-call:1 fault-nth:17):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  141.430263][ T8893] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  141.438218][ T8893] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  141.446228][ T8893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  141.454226][ T8893] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000010
[  141.462541][ T8893] SELinux: failed to load policy
[  141.475498][ T8895] SELinux:  policydb magic number 0x57cff8c does not match expected magic number 0xf97cff8c
15:47:09 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0])

15:47:09 executing program 3:
syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="020185ffffff16a40000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c30000fdfdffff80000055aa", 0x40, 0x1c0}])
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
r2 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r2, 0x0, r2)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r2, 0x336e, 0x3ff, 0xffffffff7fffffff, 0x5})
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
r5 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl$SIOCGSTAMPNS(r5, 0x8907, &(0x7f00000001c0))
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x14, 0x17, {0x18, 0x4, @l2={'ib', 0x3a, 'sit0\x00'}}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x8010)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)

15:47:09 executing program 4:
r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802)
ioctl$USBDEVFS_CONTROL(r0, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0})

[  141.486069][ T8895] SELinux: failed to load policy
[  141.497428][ T8899] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'.
[  141.526485][ T8883] overlayfs: filesystem on './file0' not supported as upperdir
15:47:09 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x8)

15:47:09 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0])

[  141.615162][ T8927] FAULT_INJECTION: forcing a failure.
[  141.615162][ T8927] name failslab, interval 1, probability 0, space 0, times 0
[  141.628422][ T8927] CPU: 1 PID: 8927 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  141.638597][ T8927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  141.648645][ T8927] Call Trace:
[  141.651935][ T8927]  dump_stack+0x1b0/0x228
[  141.656248][ T8927]  ? devkmsg_release+0x127/0x127
[  141.661178][ T8927]  ? show_regs_print_info+0x18/0x18
[  141.666368][ T8927]  ? arch_stack_walk+0x98/0xe0
[  141.671135][ T8927]  should_fail+0x6fb/0x860
[  141.675531][ T8927]  ? setup_fault_attr+0x2b0/0x2b0
[  141.680545][ T8927]  ? stack_trace_snprint+0x150/0x150
[  141.685824][ T8927]  ? ___slab_alloc+0xab/0x450
[  141.690959][ T8927]  __should_failslab+0x11a/0x160
[  141.695886][ T8927]  ? hashtab_create+0x5c/0x3f0
[  141.700633][ T8927]  should_failslab+0x9/0x20
[  141.705118][ T8927]  kmem_cache_alloc_trace+0x3a/0x2f0
[  141.710385][ T8927]  ? symtab_init+0xa0/0xa0
[  141.714792][ T8927]  ? symhash+0x100/0x100
[  141.719028][ T8927]  hashtab_create+0x5c/0x3f0
[  141.723613][ T8927]  symtab_init+0x32/0xa0
[  141.727853][ T8927]  policydb_read+0x1a7/0x77f0
[  141.732529][ T8927]  ? alloc_slab_page+0x135/0x390
[  141.737469][ T8927]  ? kasan_init_slab_obj+0x24/0x30
[  141.742574][ T8927]  ? setup_object+0xfa/0x130
[  141.747141][ T8927]  ? new_slab+0x21b/0x430
[  141.751457][ T8927]  ? string_to_av_perm+0x1c0/0x1c0
[  141.756544][ T8927]  ? __should_failslab+0x11a/0x160
[  141.761755][ T8927]  ? security_load_policy+0x1af/0xfd0
[  141.767111][ T8927]  ? kasan_kmalloc+0x9/0x10
[  141.771611][ T8927]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  141.777076][ T8927]  security_load_policy+0x228/0xfd0
[  141.782384][ T8927]  ? _raw_spin_lock+0xa1/0x170
[  141.787261][ T8927]  ? _raw_spin_trylock_bh+0x190/0x190
[  141.793017][ T8927]  ? security_change_sid+0x50/0x50
[  141.798227][ T8927]  ? vmap_page_range_noflush+0x67b/0x6a0
[  141.803865][ T8927]  ? __vmalloc_node_range+0x56c/0x760
[  141.809230][ T8927]  ? __kasan_check_write+0x14/0x20
[  141.814324][ T8927]  ? _copy_from_user+0xa8/0xe0
[  141.819209][ T8927]  sel_write_load+0x24e/0x410
[  141.823883][ T8927]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  141.829494][ T8927]  __vfs_write+0xff/0x700
[  141.833855][ T8927]  ? __kernel_write+0x350/0x350
[  141.838695][ T8927]  ? avc_policy_seqno+0x1b/0x70
[  141.843535][ T8927]  ? selinux_file_permission+0x2ba/0x560
[  141.849162][ T8927]  ? security_file_permission+0x157/0x350
[  141.854863][ T8927]  ? rw_verify_area+0x1c2/0x360
[  141.859701][ T8927]  vfs_write+0x203/0x4e0
[  141.863946][ T8927]  ksys_write+0x168/0x2a0
[  141.868274][ T8927]  ? __ia32_sys_read+0x90/0x90
[  141.873030][ T8927]  ? __kasan_check_read+0x11/0x20
[  141.878049][ T8927]  ? __ia32_sys_clock_settime+0x230/0x230
[  141.883809][ T8927]  __x64_sys_write+0x7b/0x90
[  141.888401][ T8927]  do_syscall_64+0xc0/0x100
[  141.892900][ T8927]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  141.898775][ T8927] RIP: 0033:0x45b349
[  141.902660][ T8927] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  141.922253][ T8927] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  141.930663][ T8927] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  141.938636][ T8927] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  141.946638][ T8927] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  141.954591][ T8927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
15:47:09 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r2, @ANYBLOB="c30fe8be3d9b1a403042dddf7f08001b00000000009c500100be"], 0x30}}, 0x0)

15:47:09 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x9)

[  141.962547][ T8927] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000011
[  141.974549][ T8927] SELinux: failed to load policy
[  141.988840][ T8918]  loop3: p1 < > p2 p3 < p5 > p4
[  141.996096][ T8918] loop3: partition table partially beyond EOD, truncated
[  142.004750][ T8918] loop3: p1 start 42006 is beyond EOD, truncated
15:47:09 executing program 0 (fault-call:1 fault-nth:18):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  142.019101][ T8918] loop3: p2 size 1073741824 extends beyond EOD, truncated
[  142.030412][ T8918] loop3: p3 size 2 extends beyond EOD, truncated
[  142.038522][ T8941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'.
[  142.052092][ T8918] loop3: p4 start 4294835456 is beyond EOD, truncated
[  142.059604][   T22] kauditd_printk_skb: 222 callbacks suppressed
15:47:09 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0])

[  142.059613][   T22] audit: type=1326 audit(1580485629.546:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  142.088510][ T8949] FAULT_INJECTION: forcing a failure.
[  142.088510][ T8949] name failslab, interval 1, probability 0, space 0, times 0
[  142.096362][   T22] audit: type=1326 audit(1580485629.566:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  142.105288][ T8918] loop3: p5 size 1073741824 extends beyond EOD, truncated
[  142.129433][   T22] audit: type=1326 audit(1580485629.566:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  142.162608][   T22] audit: type=1326 audit(1580485629.566:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  142.171652][ T8949] CPU: 1 PID: 8949 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  142.188090][   T22] audit: type=1326 audit(1580485629.566:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  142.197915][ T8949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  142.197918][ T8949] Call Trace:
[  142.197937][ T8949]  dump_stack+0x1b0/0x228
[  142.197946][ T8949]  ? devkmsg_release+0x127/0x127
[  142.197960][ T8949]  ? show_regs_print_info+0x18/0x18
[  142.223448][   T22] audit: type=1326 audit(1580485629.566:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  142.233452][ T8949]  ? arch_stack_walk+0x98/0xe0
[  142.233466][ T8949]  should_fail+0x6fb/0x860
[  142.233474][ T8949]  ? setup_fault_attr+0x2b0/0x2b0
[  142.233487][ T8949]  ? stack_trace_snprint+0x150/0x150
[  142.236773][   T22] audit: type=1326 audit(1580485629.566:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  142.241072][ T8949]  ? ___slab_alloc+0xab/0x450
[  142.241080][ T8949]  __should_failslab+0x11a/0x160
[  142.241088][ T8949]  ? hashtab_create+0x5c/0x3f0
[  142.241102][ T8949]  should_failslab+0x9/0x20
[  142.246036][   T22] audit: type=1326 audit(1580485629.566:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  142.251209][ T8949]  kmem_cache_alloc_trace+0x3a/0x2f0
[  142.251217][ T8949]  ? symtab_init+0xa0/0xa0
[  142.251223][ T8949]  ? symhash+0x100/0x100
[  142.251235][ T8949]  hashtab_create+0x5c/0x3f0
[  142.276701][   T22] audit: type=1326 audit(1580485629.566:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  142.281406][ T8949]  symtab_init+0x32/0xa0
[  142.281418][ T8949]  policydb_read+0x1d1/0x77f0
[  142.285810][   T22] audit: type=1326 audit(1580485629.566:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  142.290806][ T8949]  ? __kasan_check_read+0x11/0x20
[  142.290814][ T8949]  ? __alloc_pages_nodemask+0x52d/0x3010
[  142.290827][ T8949]  ? vfs_write+0x203/0x4e0
[  142.458428][ T8949]  ? should_fail+0x182/0x860
[  142.462997][ T8949]  ? __vmalloc_node_range+0x2b6/0x760
[  142.468357][ T8949]  ? setup_fault_attr+0x2b0/0x2b0
[  142.473385][ T8949]  ? vfs_write+0x203/0x4e0
[  142.477788][ T8949]  ? ksys_write+0x168/0x2a0
[  142.482270][ T8949]  ? do_syscall_64+0xc0/0x100
[  142.486929][ T8949]  ? string_to_av_perm+0x1c0/0x1c0
[  142.492160][ T8949]  ? __should_failslab+0x11a/0x160
[  142.497306][ T8949]  ? security_load_policy+0x1af/0xfd0
[  142.502682][ T8949]  ? kasan_kmalloc+0x9/0x10
[  142.507173][ T8949]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  142.512624][ T8949]  security_load_policy+0x228/0xfd0
[  142.517813][ T8949]  ? _raw_spin_lock+0xa1/0x170
[  142.522569][ T8949]  ? _raw_spin_trylock_bh+0x190/0x190
[  142.528053][ T8949]  ? security_change_sid+0x50/0x50
[  142.533157][ T8949]  ? vmap_page_range_noflush+0x67b/0x6a0
[  142.538788][ T8949]  ? __vmalloc_node_range+0x56c/0x760
[  142.544154][ T8949]  ? __kasan_check_write+0x14/0x20
[  142.549257][ T8949]  ? _copy_from_user+0xa8/0xe0
[  142.554017][ T8949]  sel_write_load+0x24e/0x410
[  142.558786][ T8949]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  142.564413][ T8949]  __vfs_write+0xff/0x700
[  142.568744][ T8949]  ? __kernel_write+0x350/0x350
[  142.573581][ T8949]  ? avc_policy_seqno+0x1b/0x70
[  142.578410][ T8949]  ? selinux_file_permission+0x2ba/0x560
[  142.584027][ T8949]  ? security_file_permission+0x157/0x350
[  142.590210][ T8949]  ? rw_verify_area+0x1c2/0x360
[  142.595050][ T8949]  vfs_write+0x203/0x4e0
[  142.599274][ T8949]  ksys_write+0x168/0x2a0
[  142.603732][ T8949]  ? __ia32_sys_read+0x90/0x90
[  142.608549][ T8949]  ? __kasan_check_read+0x11/0x20
[  142.613568][ T8949]  ? __ia32_sys_clock_settime+0x230/0x230
[  142.619278][ T8949]  __x64_sys_write+0x7b/0x90
[  142.623982][ T8949]  do_syscall_64+0xc0/0x100
[  142.628465][ T8949]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  142.634342][ T8949] RIP: 0033:0x45b349
[  142.638231][ T8949] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  142.657940][ T8949] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  142.666343][ T8949] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  142.674318][ T8949] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  142.682370][ T8949] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  142.690332][ T8949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  142.698283][ T8949] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000012
15:47:10 executing program 0 (fault-call:1 fault-nth:19):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:10 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xa)

15:47:10 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0])

15:47:10 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
unshare(0x20400)
r1 = getpid()
r2 = pidfd_open(r1, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab00008257014000000000002800deec02ff000000000000f89c1a2d463c"], 0x38)
r4 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r4, 0x0, r4)
ppoll(&(0x7f0000000040)=[{r0, 0x8604}, {r2}, {r3}, {r4, 0x181}], 0x4, 0x0, 0x0, 0x0)

[  142.719032][ T8949] SELinux: failed to load policy
[  142.810035][ T8965] SELinux: ebitmap: truncated map
[  142.815223][ T8965] SELinux: failed to load policy
[  142.849563][ T8960] EXT4-fs: 4 callbacks suppressed
[  142.849571][ T8960] EXT4-fs (sda1): Unrecognized mount option "resgid0x0000000000000000" or missing value
15:47:10 executing program 3:
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
write$selinux_create(r0, &(0x7f0000000180)=@objname={'system_u:object_r:modules_conf_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x4000000000000000, 0x20, './file0\x00'}, 0x58)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r5], 0x38}}, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x3}]}}}]}, 0x38}}, 0x0)

15:47:10 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xb)

[  142.890276][ T8980] FAULT_INJECTION: forcing a failure.
[  142.890276][ T8980] name failslab, interval 1, probability 0, space 0, times 0
[  142.911800][ T8980] CPU: 1 PID: 8980 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  142.920015][ T8973] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value
15:47:10 executing program 4:
io_setup(0x80004, 0x0)
io_submit(0x0, 0x1, &(0x7f0000356ff0)=[0x0])
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=<r0=>0x0)
sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x3, 0x20, 0x80, 0xffff, 0x9, 0x200, 0x100, 0x8d81, 0x8}, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41)
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x98a420f1c7c5a915}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r3 = syz_genetlink_get_family_id$ipvs(0x0)
sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000d06cb48a1d9bfb1ea23577ceb336444e60072155db0ac090dd09e743b3d41d25c686e2df9f6822a8683f4877556d25183317def3856f60a2030000000000000068e86025f3b67c898784df960b94d2946902a72837f0fe603d8f333eef1ec86c68219bcd7c5ec6b977c9f33049c4866b4291d68b398068a755c22ab47b0815ccee90a92c45068fe6a1f8a7f6ac9b0d4acbd59e56d52d1be8d424c6db642cfe0b396663388d3367ec3ebfc9d3646349abf052d92d771c29dd46fbaff8fb7f87ccc286d214ead3ff6b220036c96e1b088649a785d5883e440ae124fb5e86f931fcd5b1e50a3fd86caff51f50d7e397896ba692e14a2c", @ANYRES16=r3, @ANYBLOB="000400000000fddbdf2507000000"], 0x14}, 0x1, 0x0, 0x0, 0xc1}, 0x0)
sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000091}, 0x84)
lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00')
fadvise64(r1, 0x0, 0x200fff0, 0x4)

[  142.921884][ T8980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  142.941132][ T8980] Call Trace:
[  142.944439][ T8980]  dump_stack+0x1b0/0x228
[  142.948783][ T8980]  ? devkmsg_release+0x127/0x127
[  142.953739][ T8980]  ? show_regs_print_info+0x18/0x18
[  142.958945][ T8980]  ? arch_stack_walk+0x98/0xe0
[  142.963723][ T8980]  should_fail+0x6fb/0x860
[  142.968335][ T8980]  ? setup_fault_attr+0x2b0/0x2b0
[  142.973368][ T8980]  ? stack_trace_snprint+0x150/0x150
[  142.978659][ T8980]  ? ___slab_alloc+0xab/0x450
[  142.983349][ T8980]  __should_failslab+0x11a/0x160
[  142.988292][ T8980]  ? hashtab_create+0x117/0x3f0
[  142.993162][ T8980]  should_failslab+0x9/0x20
[  142.997665][ T8980]  __kmalloc+0x64/0x310
[  143.001816][ T8980]  hashtab_create+0x117/0x3f0
[  143.006478][ T8980]  symtab_init+0x32/0xa0
[  143.010792][ T8980]  policydb_read+0x1d1/0x77f0
[  143.015466][ T8980]  ? __kasan_check_read+0x11/0x20
[  143.020483][ T8980]  ? __alloc_pages_nodemask+0x52d/0x3010
[  143.026101][ T8980]  ? vfs_write+0x203/0x4e0
[  143.030495][ T8980]  ? should_fail+0x182/0x860
[  143.035059][ T8980]  ? __vmalloc_node_range+0x2b6/0x760
[  143.040406][ T8980]  ? setup_fault_attr+0x2b0/0x2b0
[  143.045514][ T8980]  ? vfs_write+0x203/0x4e0
[  143.049901][ T8980]  ? ksys_write+0x168/0x2a0
[  143.054375][ T8980]  ? do_syscall_64+0xc0/0x100
[  143.059044][ T8980]  ? string_to_av_perm+0x1c0/0x1c0
[  143.064127][ T8980]  ? __should_failslab+0x11a/0x160
[  143.069210][ T8980]  ? security_load_policy+0x1af/0xfd0
[  143.074557][ T8980]  ? kasan_kmalloc+0x9/0x10
[  143.079032][ T8980]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  143.084465][ T8980]  security_load_policy+0x228/0xfd0
[  143.089653][ T8980]  ? _raw_spin_lock+0xa1/0x170
[  143.094388][ T8980]  ? _raw_spin_trylock_bh+0x190/0x190
[  143.099750][ T8980]  ? security_change_sid+0x50/0x50
[  143.104839][ T8980]  ? vmap_page_range_noflush+0x67b/0x6a0
[  143.110454][ T8980]  ? __vmalloc_node_range+0x56c/0x760
[  143.115817][ T8980]  ? __kasan_check_write+0x14/0x20
[  143.120910][ T8980]  ? _copy_from_user+0xa8/0xe0
[  143.125669][ T8980]  sel_write_load+0x24e/0x410
[  143.130344][ T8980]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  143.136014][ T8980]  __vfs_write+0xff/0x700
[  143.140354][ T8980]  ? __kernel_write+0x350/0x350
[  143.145190][ T8980]  ? avc_policy_seqno+0x1b/0x70
[  143.150054][ T8980]  ? selinux_file_permission+0x2ba/0x560
[  143.155724][ T8980]  ? security_file_permission+0x157/0x350
[  143.161424][ T8980]  ? rw_verify_area+0x1c2/0x360
[  143.166251][ T8980]  vfs_write+0x203/0x4e0
[  143.170505][ T8980]  ksys_write+0x168/0x2a0
[  143.174836][ T8980]  ? __ia32_sys_read+0x90/0x90
[  143.179575][ T8980]  ? __kasan_check_read+0x11/0x20
[  143.184575][ T8980]  ? __ia32_sys_clock_settime+0x230/0x230
[  143.190273][ T8980]  __x64_sys_write+0x7b/0x90
[  143.194839][ T8980]  do_syscall_64+0xc0/0x100
[  143.199317][ T8980]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  143.205182][ T8980] RIP: 0033:0x45b349
[  143.209115][ T8980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  143.228710][ T8980] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
15:47:10 executing program 0 (fault-call:1 fault-nth:20):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  143.237109][ T8980] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  143.245060][ T8980] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  143.253008][ T8980] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  143.260997][ T8980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  143.268947][ T8980] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000013
[  143.277834][ T8980] SELinux: failed to load policy
15:47:10 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0])

15:47:10 executing program 3:
r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0)
r2 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r2, 0x0, r2)
dup2(r1, r2)
fallocate(r0, 0x0, 0x0, 0x4003ff)
write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d)
fallocate(r0, 0x3, 0x7fff, 0x8001)
fallocate(r0, 0x3, 0x5e89, 0xfff9)

15:47:10 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xc)

15:47:10 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0])

[  143.376716][ T9000] EXT4-fs (sda1): Unrecognized mount option "resgid0x0000000000000000" or missing value
[  143.420296][ T9013] FAULT_INJECTION: forcing a failure.
[  143.420296][ T9013] name failslab, interval 1, probability 0, space 0, times 0
[  143.434097][ T9013] CPU: 1 PID: 9013 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  143.444299][ T9013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  143.454356][ T9013] Call Trace:
[  143.457649][ T9013]  dump_stack+0x1b0/0x228
[  143.461978][ T9013]  ? devkmsg_release+0x127/0x127
[  143.466915][ T9013]  ? show_regs_print_info+0x18/0x18
[  143.472110][ T9013]  ? arch_stack_walk+0x98/0xe0
[  143.476878][ T9013]  should_fail+0x6fb/0x860
[  143.481299][ T9013]  ? setup_fault_attr+0x2b0/0x2b0
[  143.486323][ T9013]  ? stack_trace_snprint+0x150/0x150
[  143.491610][ T9013]  ? ___slab_alloc+0xab/0x450
[  143.496424][ T9013]  __should_failslab+0x11a/0x160
[  143.501503][ T9013]  ? hashtab_create+0x5c/0x3f0
[  143.506286][ T9013]  should_failslab+0x9/0x20
[  143.510792][ T9013]  kmem_cache_alloc_trace+0x3a/0x2f0
[  143.516073][ T9013]  ? symtab_init+0xa0/0xa0
[  143.520493][ T9013]  ? symhash+0x100/0x100
[  143.524758][ T9013]  hashtab_create+0x5c/0x3f0
[  143.529352][ T9013]  symtab_init+0x32/0xa0
[  143.533581][ T9013]  policydb_read+0x1fb/0x77f0
[  143.538245][ T9013]  ? __kasan_check_read+0x11/0x20
[  143.543256][ T9013]  ? __alloc_pages_nodemask+0x52d/0x3010
[  143.548883][ T9013]  ? vfs_write+0x203/0x4e0
[  143.553300][ T9013]  ? should_fail+0x182/0x860
[  143.557882][ T9013]  ? __vmalloc_node_range+0x2b6/0x760
[  143.563261][ T9013]  ? setup_fault_attr+0x2b0/0x2b0
[  143.568266][ T9013]  ? vfs_write+0x203/0x4e0
[  143.572657][ T9013]  ? ksys_write+0x168/0x2a0
[  143.577138][ T9013]  ? do_syscall_64+0xc0/0x100
[  143.581793][ T9013]  ? string_to_av_perm+0x1c0/0x1c0
[  143.586889][ T9013]  ? __should_failslab+0x11a/0x160
[  143.591984][ T9013]  ? security_load_policy+0x1af/0xfd0
[  143.597329][ T9013]  ? kasan_kmalloc+0x9/0x10
[  143.601824][ T9013]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  143.607257][ T9013]  security_load_policy+0x228/0xfd0
[  143.612443][ T9013]  ? _raw_spin_lock+0xa1/0x170
[  143.617182][ T9013]  ? _raw_spin_trylock_bh+0x190/0x190
[  143.622525][ T9013]  ? security_change_sid+0x50/0x50
[  143.627616][ T9013]  ? vmap_page_range_noflush+0x67b/0x6a0
[  143.633238][ T9013]  ? __vmalloc_node_range+0x56c/0x760
[  143.638585][ T9013]  ? __kasan_check_write+0x14/0x20
[  143.643702][ T9013]  ? _copy_from_user+0xa8/0xe0
[  143.648461][ T9013]  sel_write_load+0x24e/0x410
[  143.653117][ T9013]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  143.658762][ T9013]  __vfs_write+0xff/0x700
[  143.663089][ T9013]  ? __kernel_write+0x350/0x350
[  143.667931][ T9013]  ? avc_policy_seqno+0x1b/0x70
[  143.672764][ T9013]  ? selinux_file_permission+0x2ba/0x560
[  143.678394][ T9013]  ? security_file_permission+0x157/0x350
[  143.684115][ T9013]  ? rw_verify_area+0x1c2/0x360
[  143.688946][ T9013]  vfs_write+0x203/0x4e0
[  143.693215][ T9013]  ksys_write+0x168/0x2a0
[  143.697552][ T9013]  ? __ia32_sys_read+0x90/0x90
[  143.702298][ T9013]  ? __kasan_check_read+0x11/0x20
[  143.707308][ T9013]  ? __ia32_sys_clock_settime+0x230/0x230
[  143.713021][ T9013]  __x64_sys_write+0x7b/0x90
[  143.717601][ T9013]  do_syscall_64+0xc0/0x100
[  143.722097][ T9013]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  143.728104][ T9013] RIP: 0033:0x45b349
[  143.731997][ T9013] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  143.751723][ T9013] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  143.760150][ T9013] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
15:47:11 executing program 3:
r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0)
r2 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r2, 0x0, r2)
dup2(r1, r2)
fallocate(r0, 0x0, 0x0, 0x4003ff)
write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d)
fallocate(r0, 0x3, 0x7fff, 0x8001)
fallocate(r0, 0x3, 0x5e89, 0xfff9)

[  143.768121][ T9013] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  143.776100][ T9013] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  143.784074][ T9013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  143.792067][ T9013] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000014
15:47:11 executing program 1 (fault-call:2 fault-nth:0):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:11 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xd)

15:47:11 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'lo\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x2, 0x4}}]}, 0x40}}, 0x0)

15:47:11 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0])

[  143.888599][ T9013] SELinux: failed to load policy
15:47:11 executing program 0 (fault-call:1 fault-nth:21):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  143.911799][ T9033] FAULT_INJECTION: forcing a failure.
[  143.911799][ T9033] name failslab, interval 1, probability 0, space 0, times 0
[  143.943170][ T9033] CPU: 1 PID: 9033 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  143.953258][ T9033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  143.963304][ T9033] Call Trace:
[  143.966604][ T9033]  dump_stack+0x1b0/0x228
[  143.970940][ T9033]  ? devkmsg_release+0x127/0x127
[  143.975890][ T9033]  ? show_regs_print_info+0x18/0x18
[  143.981092][ T9033]  ? __fsnotify_parent+0x300/0x300
[  143.986208][ T9033]  should_fail+0x6fb/0x860
[  143.990629][ T9033]  ? setup_fault_attr+0x2b0/0x2b0
[  143.995654][ T9033]  ? __kasan_check_write+0x14/0x20
[  144.000770][ T9033]  ? fput_many+0x47/0x1a0
[  144.005104][ T9033]  __should_failslab+0x11a/0x160
[  144.010825][ T9033]  ? __se_sys_memfd_create+0xfa/0x3e0
[  144.016199][ T9033]  should_failslab+0x9/0x20
[  144.020712][ T9033]  __kmalloc+0x64/0x310
[  144.024855][ T9033]  __se_sys_memfd_create+0xfa/0x3e0
[  144.030039][ T9033]  __x64_sys_memfd_create+0x5b/0x70
[  144.035328][ T9033]  do_syscall_64+0xc0/0x100
[  144.039813][ T9033]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  144.045691][ T9033] RIP: 0033:0x45b349
[  144.049586][ T9033] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  144.069171][ T9033] RSP: 002b:00007f1c0b9b2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  144.077562][ T9033] RAX: ffffffffffffffda RBX: 00007f1c0b9b36d4 RCX: 000000000045b349
[  144.085578][ T9033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  144.093586][ T9033] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
[  144.101609][ T9033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  144.109561][ T9033] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000000
15:47:11 executing program 1 (fault-call:2 fault-nth:1):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:11 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000080)='./file1\x00', 0x0)
r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x6000, 0xed)
readv(r2, &(0x7f0000000580)=[{&(0x7f0000000300)=""/72, 0x48}, {&(0x7f0000000600)=""/93, 0x5d}, {&(0x7f0000000440)=""/15, 0xf}, {&(0x7f0000000480)=""/75, 0x4b}, {&(0x7f0000000500)=""/89, 0x59}], 0x5)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x3000, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_off='xino=off'}], [], 0x2c})
lsetxattr$security_capability(&(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{0x7fff, 0x7}, {0x2, 0xfffffffa}]}, 0x14, 0x2)
ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000200)={{0x1, 0x0, @identifier="f497cbaa4c0a62ed751f42306fd5b141"}})

[  144.173350][ T9050] FAULT_INJECTION: forcing a failure.
[  144.173350][ T9050] name failslab, interval 1, probability 0, space 0, times 0
[  144.186936][ T9050] CPU: 1 PID: 9050 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  144.197011][ T9050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  144.207074][ T9050] Call Trace:
[  144.210382][ T9050]  dump_stack+0x1b0/0x228
[  144.214837][ T9050]  ? devkmsg_release+0x127/0x127
[  144.219787][ T9050]  ? show_regs_print_info+0x18/0x18
[  144.224988][ T9050]  ? arch_stack_walk+0x98/0xe0
[  144.229757][ T9050]  should_fail+0x6fb/0x860
[  144.234177][ T9050]  ? setup_fault_attr+0x2b0/0x2b0
[  144.239207][ T9050]  ? stack_trace_snprint+0x150/0x150
[  144.244496][ T9050]  ? ___slab_alloc+0xab/0x450
[  144.249197][ T9050]  __should_failslab+0x11a/0x160
[  144.254245][ T9050]  ? hashtab_create+0x117/0x3f0
[  144.259096][ T9050]  should_failslab+0x9/0x20
[  144.263612][ T9050]  __kmalloc+0x64/0x310
[  144.267777][ T9050]  hashtab_create+0x117/0x3f0
[  144.272453][ T9050]  symtab_init+0x32/0xa0
[  144.276696][ T9050]  policydb_read+0x1fb/0x77f0
[  144.281374][ T9050]  ? __kasan_check_write+0x14/0x20
[  144.286487][ T9050]  ? _raw_spin_lock+0xa1/0x170
[  144.291251][ T9050]  ? _raw_spin_trylock_bh+0x190/0x190
[  144.296620][ T9050]  ? should_fail+0x182/0x860
[  144.301207][ T9050]  ? __vmalloc_node_range+0x2b6/0x760
[  144.306576][ T9050]  ? setup_fault_attr+0x2b0/0x2b0
[  144.311602][ T9050]  ? vfs_write+0x203/0x4e0
[  144.316138][ T9050]  ? ksys_write+0x168/0x2a0
[  144.320642][ T9050]  ? _raw_spin_unlock+0x9/0x20
[  144.325498][ T9050]  ? string_to_av_perm+0x1c0/0x1c0
[  144.330614][ T9050]  ? security_load_policy+0x1af/0xfd0
[  144.335990][ T9050]  ? kasan_kmalloc+0x9/0x10
[  144.340492][ T9050]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  144.345952][ T9050]  security_load_policy+0x228/0xfd0
[  144.351151][ T9050]  ? _raw_spin_lock+0xa1/0x170
[  144.355911][ T9050]  ? _raw_spin_trylock_bh+0x190/0x190
[  144.361278][ T9050]  ? security_change_sid+0x50/0x50
[  144.366386][ T9050]  ? vmap_page_range_noflush+0x67b/0x6a0
15:47:11 executing program 4:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x98428d57a99b5f44)
io_setup(0xe, &(0x7f0000000340)=<r3=>0x0)
io_submit(r3, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0xa, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}])
r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00')
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={<r5=>0x0, @initdev, @empty}, &(0x7f0000000180)=0xc)
sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r4, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000000)
r6 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
r8 = dup(r7)
getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r4, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xffffff01}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r9}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xf4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24000005}, 0x40894)
r10 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4)
r11 = socket$unix(0x1, 0x2, 0x0)
r12 = fcntl$dupfd(r11, 0x0, r11)
ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200)
r13 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r14 = syz_genetlink_get_family_id$ipvs(0x0)
sendmsg$IPVS_CMD_DEL_DEST(r13, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r14, 0x400, 0x0, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0xc1}, 0x0)
sendmsg$IPVS_CMD_GET_DEST(r12, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xc8, r14, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x48}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xfb}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xae2e62db96a712eb}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0xd}}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4044800}, 0x20004000)

[  144.372019][ T9050]  ? __vmalloc_node_range+0x56c/0x760
[  144.377396][ T9050]  ? __kasan_check_write+0x14/0x20
[  144.382513][ T9050]  ? _copy_from_user+0xa8/0xe0
[  144.387275][ T9050]  sel_write_load+0x24e/0x410
[  144.391951][ T9050]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  144.397585][ T9050]  __vfs_write+0xff/0x700
[  144.402022][ T9050]  ? __kernel_write+0x350/0x350
[  144.406870][ T9050]  ? avc_policy_seqno+0x1b/0x70
[  144.411718][ T9050]  ? selinux_file_permission+0x2ba/0x560
[  144.417368][ T9050]  ? security_file_permission+0x157/0x350
[  144.423199][ T9050]  ? rw_verify_area+0x1c2/0x360
[  144.428052][ T9050]  vfs_write+0x203/0x4e0
[  144.432410][ T9050]  ksys_write+0x168/0x2a0
[  144.436739][ T9050]  ? __ia32_sys_read+0x90/0x90
[  144.441503][ T9050]  ? __kasan_check_read+0x11/0x20
[  144.446529][ T9050]  ? __ia32_sys_clock_settime+0x230/0x230
[  144.452254][ T9050]  __x64_sys_write+0x7b/0x90
[  144.456853][ T9050]  do_syscall_64+0xc0/0x100
[  144.461380][ T9050]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  144.467311][ T9050] RIP: 0033:0x45b349
[  144.471327][ T9050] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  144.490926][ T9050] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  144.499340][ T9050] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  144.507312][ T9050] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  144.515278][ T9050] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
15:47:12 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xe)

[  144.523254][ T9050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  144.531223][ T9050] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000015
[  144.540345][ T9050] SELinux: failed to load policy
[  144.560044][ T9049] EXT4-fs (sda1): Unrecognized mount option "resg0x0000000000000000" or missing value
15:47:12 executing program 0 (fault-call:1 fault-nth:22):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:12 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x10)

[  144.614880][ T9064] FAULT_INJECTION: forcing a failure.
[  144.614880][ T9064] name failslab, interval 1, probability 0, space 0, times 0
[  144.647334][ T9069] FAULT_INJECTION: forcing a failure.
[  144.647334][ T9069] name failslab, interval 1, probability 0, space 0, times 0
[  144.679067][ T9064] CPU: 1 PID: 9064 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  144.689163][ T9064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  144.699218][ T9064] Call Trace:
[  144.702511][ T9064]  dump_stack+0x1b0/0x228
[  144.706838][ T9064]  ? devkmsg_release+0x127/0x127
[  144.711776][ T9064]  ? show_regs_print_info+0x18/0x18
[  144.716978][ T9064]  ? get_pid_task+0x8d/0xa0
[  144.721483][ T9064]  ? proc_fail_nth_write+0x166/0x200
[  144.726779][ T9064]  ? __kasan_check_write+0x14/0x20
[  144.732012][ T9064]  should_fail+0x6fb/0x860
[  144.736434][ T9064]  ? setup_fault_attr+0x2b0/0x2b0
[  144.741544][ T9064]  ? __kasan_kmalloc+0x117/0x1b0
[  144.746475][ T9064]  ? kasan_kmalloc+0x9/0x10
[  144.750975][ T9064]  ? __kmalloc+0x102/0x310
[  144.755388][ T9064]  ? __se_sys_memfd_create+0xfa/0x3e0
[  144.760973][ T9064]  ? do_syscall_64+0xc0/0x100
[  144.765692][ T9064]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  144.771764][ T9064]  ? fsnotify+0x1390/0x1450
[  144.776267][ T9064]  __should_failslab+0x11a/0x160
[  144.781212][ T9064]  ? shmem_alloc_inode+0x1b/0x40
[  144.786174][ T9064]  should_failslab+0x9/0x20
[  144.790685][ T9064]  kmem_cache_alloc+0x37/0x2b0
[  144.795553][ T9064]  ? shmem_match+0x180/0x180
[  144.800146][ T9064]  shmem_alloc_inode+0x1b/0x40
[  144.804906][ T9064]  ? shmem_match+0x180/0x180
[  144.809510][ T9064]  new_inode_pseudo+0x68/0x240
[  144.814277][ T9064]  new_inode+0x28/0x1c0
[  144.818433][ T9064]  shmem_get_inode+0x114/0x690
[  144.823339][ T9064]  __shmem_file_setup+0x129/0x280
[  144.828364][ T9064]  shmem_file_setup+0x2f/0x40
[  144.833040][ T9064]  __se_sys_memfd_create+0x215/0x3e0
[  144.838434][ T9064]  __x64_sys_memfd_create+0x5b/0x70
[  144.843632][ T9064]  do_syscall_64+0xc0/0x100
[  144.848145][ T9064]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  144.854036][ T9064] RIP: 0033:0x45b349
[  144.857927][ T9064] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
15:47:12 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0])

15:47:12 executing program 3:
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="7000000000011805030200000040000002000000240001001400010008000000ffffffff08000200ac1e00010c0002000500010000000000240002000c000000001400010008000123e0000002080008f6064571c962f3881b00"/110], 0x1}}, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYRES16=r4, @ANYPTR64, @ANYRESOCT, @ANYRESHEX, @ANYRES32=r2, @ANYRESHEX, @ANYRESOCT=r2, @ANYRES64=r1], 0x70)
socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

[  144.877645][ T9064] RSP: 002b:00007f1c0b9b2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  144.886050][ T9064] RAX: ffffffffffffffda RBX: 00007f1c0b9b36d4 RCX: 000000000045b349
[  144.894022][ T9064] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  144.901996][ T9064] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
[  144.909969][ T9064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  144.917943][ T9064] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000001
[  144.947937][ T9069] CPU: 0 PID: 9069 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  144.958030][ T9069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  144.968078][ T9069] Call Trace:
[  144.971364][ T9069]  dump_stack+0x1b0/0x228
[  144.975672][ T9069]  ? devkmsg_release+0x127/0x127
[  144.980600][ T9069]  ? show_regs_print_info+0x18/0x18
[  144.985802][ T9069]  ? should_fail+0x182/0x860
[  144.990378][ T9069]  ? stack_trace_save+0x111/0x1e0
[  144.995443][ T9069]  ? setup_fault_attr+0x2b0/0x2b0
[  145.000470][ T9069]  should_fail+0x6fb/0x860
[  145.004897][ T9069]  ? setup_fault_attr+0x2b0/0x2b0
[  145.009903][ T9069]  ? __should_failslab+0x11a/0x160
[  145.015005][ T9069]  ? hashtab_create+0x117/0x3f0
[  145.019847][ T9069]  ? kasan_kmalloc+0x9/0x10
[  145.024337][ T9069]  __should_failslab+0x11a/0x160
[  145.029255][ T9069]  ? policydb_read+0x280/0x77f0
[  145.034084][ T9069]  should_failslab+0x9/0x20
[  145.038641][ T9069]  kmem_cache_alloc_trace+0x3a/0x2f0
[  145.043941][ T9069]  ? kvfree+0x47/0x50
[  145.047901][ T9069]  policydb_read+0x280/0x77f0
[  145.052572][ T9069]  ? __kasan_check_read+0x11/0x20
[  145.057657][ T9069]  ? __alloc_pages_nodemask+0x52d/0x3010
[  145.063295][ T9069]  ? vfs_write+0x203/0x4e0
[  145.067688][ T9069]  ? should_fail+0x182/0x860
[  145.072277][ T9069]  ? __vmalloc_node_range+0x2b6/0x760
[  145.077750][ T9069]  ? setup_fault_attr+0x2b0/0x2b0
[  145.082755][ T9069]  ? vfs_write+0x203/0x4e0
[  145.087153][ T9069]  ? ksys_write+0x168/0x2a0
[  145.091647][ T9069]  ? do_syscall_64+0xc0/0x100
[  145.096332][ T9069]  ? string_to_av_perm+0x1c0/0x1c0
[  145.101426][ T9069]  ? __should_failslab+0x11a/0x160
[  145.106588][ T9069]  ? security_load_policy+0x1af/0xfd0
[  145.111956][ T9069]  ? kasan_kmalloc+0x9/0x10
[  145.116440][ T9069]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  145.121878][ T9069]  security_load_policy+0x228/0xfd0
[  145.127082][ T9069]  ? _raw_spin_lock+0xa1/0x170
[  145.131841][ T9069]  ? _raw_spin_trylock_bh+0x190/0x190
[  145.137197][ T9069]  ? security_change_sid+0x50/0x50
[  145.142341][ T9069]  ? vmap_page_range_noflush+0x67b/0x6a0
[  145.147975][ T9069]  ? __vmalloc_node_range+0x56c/0x760
[  145.154479][ T9069]  ? __kasan_check_write+0x14/0x20
[  145.159700][ T9069]  ? _copy_from_user+0xa8/0xe0
[  145.164829][ T9069]  sel_write_load+0x24e/0x410
[  145.169486][ T9069]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  145.175114][ T9069]  __vfs_write+0xff/0x700
[  145.179451][ T9069]  ? __kernel_write+0x350/0x350
[  145.184285][ T9069]  ? avc_policy_seqno+0x1b/0x70
[  145.189127][ T9069]  ? selinux_file_permission+0x2ba/0x560
[  145.194757][ T9069]  ? security_file_permission+0x157/0x350
[  145.200457][ T9069]  ? rw_verify_area+0x1c2/0x360
[  145.205297][ T9069]  vfs_write+0x203/0x4e0
[  145.209529][ T9069]  ksys_write+0x168/0x2a0
[  145.213855][ T9069]  ? __ia32_sys_read+0x90/0x90
[  145.218608][ T9069]  ? __kasan_check_read+0x11/0x20
[  145.223614][ T9069]  ? __ia32_sys_clock_settime+0x230/0x230
[  145.229333][ T9069]  __x64_sys_write+0x7b/0x90
[  145.233915][ T9069]  do_syscall_64+0xc0/0x100
[  145.238412][ T9069]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  145.244284][ T9069] RIP: 0033:0x45b349
[  145.248175][ T9069] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  145.267768][ T9069] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  145.276183][ T9069] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  145.284148][ T9069] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  145.292103][ T9069] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  145.300069][ T9069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  145.308026][ T9069] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000016
15:47:12 executing program 1 (fault-call:2 fault-nth:2):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:12 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0)
r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0)
write$P9_RLERROR(r1, &(0x7f0000000140)={0x14, 0x7, 0x2, {0xb, 'syzkaller1\x00'}}, 0x14)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001})
r2 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)
write$tun(r0, &(0x7f0000000180)={@void, @val, @ipv4=@tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x29, 0x0, @remote={0xac, 0x4}, @remote}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}, 0x32)

[  145.356817][ T9080] EXT4-fs (sda1): Unrecognized mount option "resg0x0000000000000000" or missing value
15:47:12 executing program 0 (fault-call:1 fault-nth:23):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  145.397475][ T9089] FAULT_INJECTION: forcing a failure.
[  145.397475][ T9089] name failslab, interval 1, probability 0, space 0, times 0
[  145.419278][ T9089] CPU: 1 PID: 9089 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  145.429361][ T9089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  145.439447][ T9089] Call Trace:
[  145.442732][ T9089]  dump_stack+0x1b0/0x228
[  145.447115][ T9089]  ? devkmsg_release+0x127/0x127
[  145.452099][ T9089]  ? __shmem_file_setup+0x129/0x280
[  145.457283][ T9089]  ? show_regs_print_info+0x18/0x18
[  145.462475][ T9089]  ? do_syscall_64+0xc0/0x100
[  145.467143][ T9089]  ? stack_trace_save+0x111/0x1e0
[  145.472196][ T9089]  should_fail+0x6fb/0x860
[  145.476658][ T9089]  ? setup_fault_attr+0x2b0/0x2b0
[  145.481667][ T9089]  ? ksys_mount+0xe2/0x100
[  145.486204][ T9089]  ? should_fail+0x182/0x860
[  145.490812][ T9089]  ? __kasan_kmalloc+0x179/0x1b0
[  145.495728][ T9089]  __should_failslab+0x11a/0x160
[  145.500653][ T9089]  ? security_inode_alloc+0x36/0x1f0
[  145.505928][ T9089]  should_failslab+0x9/0x20
[  145.510430][ T9089]  kmem_cache_alloc+0x37/0x2b0
[  145.515190][ T9089]  ? from_kuid_munged+0x3b0/0x3b0
[  145.520206][ T9089]  security_inode_alloc+0x36/0x1f0
[  145.525377][ T9089]  inode_init_always+0x39b/0x840
[  145.530299][ T9089]  ? shmem_match+0x180/0x180
[  145.534925][ T9089]  new_inode_pseudo+0x7f/0x240
[  145.539700][ T9089]  new_inode+0x28/0x1c0
[  145.544003][ T9089]  shmem_get_inode+0x114/0x690
[  145.548768][ T9089]  __shmem_file_setup+0x129/0x280
[  145.553775][ T9089]  shmem_file_setup+0x2f/0x40
[  145.558442][ T9089]  __se_sys_memfd_create+0x215/0x3e0
[  145.563715][ T9089]  __x64_sys_memfd_create+0x5b/0x70
[  145.569336][ T9089]  do_syscall_64+0xc0/0x100
[  145.573883][ T9089]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  145.579779][ T9089] RIP: 0033:0x45b349
[  145.583680][ T9089] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  145.603269][ T9089] RSP: 002b:00007f1c0b9b2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  145.611666][ T9089] RAX: ffffffffffffffda RBX: 00007f1c0b9b36d4 RCX: 000000000045b349
[  145.619690][ T9089] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  145.627677][ T9089] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
[  145.635762][ T9089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
15:47:13 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x11)

15:47:13 executing program 1 (fault-call:2 fault-nth:3):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  145.643721][ T9089] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000002
15:47:13 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0])

[  145.746389][ T9105] FAULT_INJECTION: forcing a failure.
[  145.746389][ T9105] name failslab, interval 1, probability 0, space 0, times 0
[  145.775620][ T9105] CPU: 1 PID: 9105 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  145.776460][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  145.787116][ T9105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  145.787120][ T9105] Call Trace:
[  145.787141][ T9105]  dump_stack+0x1b0/0x228
[  145.787152][ T9105]  ? devkmsg_release+0x127/0x127
[  145.787160][ T9105]  ? show_regs_print_info+0x18/0x18
[  145.787167][ T9105]  ? __kasan_check_read+0x11/0x20
[  145.787176][ T9105]  ? preempt_schedule_irq+0xc7/0x110
[  145.787186][ T9105]  should_fail+0x6fb/0x860
[  145.787195][ T9105]  ? setup_fault_attr+0x2b0/0x2b0
[  145.787202][ T9105]  ? should_fail+0x182/0x860
[  145.787210][ T9105]  ? setup_fault_attr+0x2b0/0x2b0
[  145.787218][ T9105]  ? __should_failslab+0x11a/0x160
[  145.787224][ T9105]  ? hashtab_create+0x117/0x3f0
[  145.787232][ T9105]  __should_failslab+0x11a/0x160
[  145.787240][ T9105]  ? policydb_read+0x60f/0x77f0
[  145.787248][ T9105]  should_failslab+0x9/0x20
[  145.787256][ T9105]  __kmalloc_track_caller+0x5f/0x320
[  145.787262][ T9105]  ? kasan_kmalloc+0x9/0x10
[  145.787270][ T9105]  kstrdup+0x34/0x70
[  145.787284][ T9105]  policydb_read+0x60f/0x77f0
[  145.794716][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  145.804675][ T9105]  ? __alloc_pages_nodemask+0x52d/0x3010
[  145.804691][ T9105]  ? should_fail+0x182/0x860
[  145.804700][ T9105]  ? __vmalloc_node_range+0x2b6/0x760
[  145.804707][ T9105]  ? setup_fault_attr+0x2b0/0x2b0
[  145.804715][ T9105]  ? vfs_write+0x203/0x4e0
[  145.804723][ T9105]  ? ksys_write+0x168/0x2a0
[  145.804730][ T9105]  ? do_syscall_64+0xc0/0x100
[  145.804745][ T9105]  ? string_to_av_perm+0x1c0/0x1c0
[  145.818828][ T9115] FAULT_INJECTION: forcing a failure.
[  145.818828][ T9115] name failslab, interval 1, probability 0, space 0, times 0
[  145.822743][ T9105]  ? __should_failslab+0x11a/0x160
[  145.822755][ T9105]  ? security_load_policy+0x1af/0xfd0
[  145.822763][ T9105]  ? kasan_kmalloc+0x9/0x10
[  145.822779][ T9105]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  145.822789][ T9105]  security_load_policy+0x228/0xfd0
[  145.822799][ T9105]  ? _raw_spin_lock+0xa1/0x170
[  145.822813][ T9105]  ? _raw_spin_trylock_bh+0x190/0x190
[  145.989356][ T9105]  ? security_change_sid+0x50/0x50
[  145.994466][ T9105]  ? vmap_page_range_noflush+0x67b/0x6a0
[  146.000082][ T9105]  ? __vmalloc_node_range+0x56c/0x760
[  146.005466][ T9105]  ? __kasan_check_write+0x14/0x20
[  146.010591][ T9105]  ? _copy_from_user+0xa8/0xe0
[  146.015355][ T9105]  sel_write_load+0x24e/0x410
[  146.020028][ T9105]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  146.025654][ T9105]  __vfs_write+0xff/0x700
[  146.029963][ T9105]  ? __kernel_write+0x350/0x350
[  146.034798][ T9105]  ? avc_policy_seqno+0x1b/0x70
[  146.039626][ T9105]  ? selinux_file_permission+0x2ba/0x560
[  146.045358][ T9105]  ? security_file_permission+0x157/0x350
[  146.051075][ T9105]  ? rw_verify_area+0x1c2/0x360
[  146.055926][ T9105]  vfs_write+0x203/0x4e0
[  146.060176][ T9105]  ksys_write+0x168/0x2a0
[  146.064500][ T9105]  ? __ia32_sys_read+0x90/0x90
[  146.069241][ T9105]  ? __kasan_check_read+0x11/0x20
[  146.074287][ T9105]  ? __ia32_sys_clock_settime+0x230/0x230
[  146.080138][ T9105]  __x64_sys_write+0x7b/0x90
[  146.084743][ T9105]  do_syscall_64+0xc0/0x100
[  146.089236][ T9105]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  146.095115][ T9105] RIP: 0033:0x45b349
[  146.099038][ T9105] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  146.118640][ T9105] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  146.127150][ T9105] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  146.135117][ T9105] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  146.143113][ T9105] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  146.151125][ T9105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  146.159108][ T9105] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000017
[  146.167073][ T9115] CPU: 0 PID: 9115 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  146.168010][ T9105] sel_write_load: 1 callbacks suppressed
[  146.168013][ T9105] SELinux: failed to load policy
[  146.177157][ T9115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  146.177160][ T9115] Call Trace:
[  146.177180][ T9115]  dump_stack+0x1b0/0x228
[  146.177190][ T9115]  ? devkmsg_release+0x127/0x127
[  146.177197][ T9115]  ? show_regs_print_info+0x18/0x18
[  146.177204][ T9115]  ? do_syscall_64+0xc0/0x100
[  146.177210][ T9115]  ? stack_trace_save+0x111/0x1e0
[  146.177220][ T9115]  should_fail+0x6fb/0x860
[  146.177227][ T9115]  ? setup_fault_attr+0x2b0/0x2b0
[  146.177234][ T9115]  ? ksys_mount+0xe2/0x100
[  146.177247][ T9115]  ? should_fail+0x182/0x860
[  146.185607][ T9114] EXT4-fs (sda1): Unrecognized mount option "resgid0x0000000000000000" or missing value
[  146.187795][ T9115]  ? __kasan_kmalloc+0x179/0x1b0
[  146.187804][ T9115]  __should_failslab+0x11a/0x160
[  146.187813][ T9115]  ? __d_alloc+0x2d/0x6d0
[  146.187822][ T9115]  should_failslab+0x9/0x20
[  146.187830][ T9115]  kmem_cache_alloc+0x37/0x2b0
[  146.187844][ T9115]  __d_alloc+0x2d/0x6d0
[  146.281306][ T9115]  ? ktime_get_coarse_real_ts64+0xf3/0x110
[  146.287092][ T9115]  d_alloc_pseudo+0x1d/0x70
[  146.291600][ T9115]  alloc_file_pseudo+0x128/0x310
[  146.296521][ T9115]  ? alloc_empty_file_noaccount+0x80/0x80
[  146.302321][ T9115]  ? __kasan_check_write+0x14/0x20
[  146.307590][ T9115]  ? clear_nlink+0x87/0xe0
[  146.311998][ T9115]  __shmem_file_setup+0x1a2/0x280
[  146.317038][ T9115]  shmem_file_setup+0x2f/0x40
[  146.321766][ T9115]  __se_sys_memfd_create+0x215/0x3e0
[  146.327030][ T9115]  __x64_sys_memfd_create+0x5b/0x70
[  146.332241][ T9115]  do_syscall_64+0xc0/0x100
[  146.336872][ T9115]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  146.342747][ T9115] RIP: 0033:0x45b349
[  146.346619][ T9115] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  146.366254][ T9115] RSP: 002b:00007f1c0b991a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  146.374662][ T9115] RAX: ffffffffffffffda RBX: 00007f1c0b9926d4 RCX: 000000000045b349
[  146.382619][ T9115] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  146.390572][ T9115] RBP: 000000000075bfc8 R08: 00000000038028b8 R09: 0000000000000001
15:47:13 executing program 4:
prctl$PR_CAPBSET_READ(0x17, 0x1d)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000a80)=ANY=[@ANYRES32])
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000580)=""/120)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000440)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x2000000001)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x2, 0x0, 0x8, 0x3, 0xfffffffffffffffc}, 0x0)
socket(0x1, 0x5, 0x0)
r4 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4)
writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3)
sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000380), &(0x7f00000003c0)=0x4)
write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0)

15:47:13 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x12)

15:47:13 executing program 0 (fault-call:1 fault-nth:24):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:13 executing program 1 (fault-call:2 fault-nth:4):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:13 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x25)

[  146.398529][ T9115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  146.406589][ T9115] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000003
15:47:13 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0])

[  146.452353][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  146.508619][ T9138] FAULT_INJECTION: forcing a failure.
[  146.508619][ T9138] name failslab, interval 1, probability 0, space 0, times 0
[  146.523497][ T9138] CPU: 0 PID: 9138 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  146.533579][ T9138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  146.543629][ T9138] Call Trace:
[  146.546913][ T9138]  dump_stack+0x1b0/0x228
[  146.551225][ T9138]  ? devkmsg_release+0x127/0x127
[  146.556148][ T9138]  ? do_syscall_64+0xc0/0x100
[  146.560805][ T9138]  ? show_regs_print_info+0x18/0x18
[  146.566993][ T9138]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  146.573061][ T9138]  should_fail+0x6fb/0x860
[  146.577460][ T9138]  ? setup_fault_attr+0x2b0/0x2b0
[  146.582468][ T9138]  ? should_fail+0x182/0x860
[  146.587052][ T9138]  ? stack_trace_snprint+0x150/0x150
[  146.592329][ T9138]  ? setup_fault_attr+0x2b0/0x2b0
[  146.597331][ T9138]  ? should_fail+0x182/0x860
[  146.601907][ T9138]  ? ___slab_alloc+0xab/0x450
[  146.606564][ T9138]  __should_failslab+0x11a/0x160
[  146.611481][ T9138]  ? hashtab_insert+0x2ae/0x440
[  146.616327][ T9138]  should_failslab+0x9/0x20
[  146.620815][ T9138]  kmem_cache_alloc+0x37/0x2b0
[  146.625559][ T9138]  ? symhash+0xa7/0x100
[  146.629694][ T9138]  hashtab_insert+0x2ae/0x440
[  146.634344][ T9138]  policydb_read+0x664/0x77f0
[  146.638997][ T9138]  ? __alloc_pages_nodemask+0x52d/0x3010
[  146.644770][ T9138]  ? should_fail+0x182/0x860
[  146.649346][ T9138]  ? __vmalloc_node_range+0x2b6/0x760
[  146.654710][ T9138]  ? setup_fault_attr+0x2b0/0x2b0
[  146.659714][ T9138]  ? vfs_write+0x203/0x4e0
[  146.664108][ T9138]  ? ksys_write+0x168/0x2a0
[  146.668586][ T9138]  ? do_syscall_64+0xc0/0x100
[  146.673246][ T9138]  ? string_to_av_perm+0x1c0/0x1c0
[  146.678332][ T9138]  ? __should_failslab+0x11a/0x160
[  146.683416][ T9138]  ? security_load_policy+0x1af/0xfd0
[  146.688761][ T9138]  ? kasan_kmalloc+0x9/0x10
[  146.693253][ T9138]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  146.698698][ T9138]  security_load_policy+0x228/0xfd0
[  146.703893][ T9138]  ? _raw_spin_lock+0xa1/0x170
[  146.708634][ T9138]  ? _raw_spin_trylock_bh+0x190/0x190
[  146.713997][ T9138]  ? security_change_sid+0x50/0x50
[  146.719093][ T9138]  ? vmap_page_range_noflush+0x67b/0x6a0
[  146.724716][ T9138]  ? __vmalloc_node_range+0x56c/0x760
[  146.730078][ T9138]  ? __kasan_check_write+0x14/0x20
[  146.735193][ T9138]  ? _copy_from_user+0xa8/0xe0
[  146.739928][ T9138]  sel_write_load+0x24e/0x410
[  146.744589][ T9138]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  146.750293][ T9138]  __vfs_write+0xff/0x700
[  146.754597][ T9138]  ? __kernel_write+0x350/0x350
[  146.759547][ T9138]  ? avc_policy_seqno+0x1b/0x70
[  146.764379][ T9138]  ? selinux_file_permission+0x2ba/0x560
[  146.770005][ T9138]  ? security_file_permission+0x157/0x350
[  146.775704][ T9138]  ? rw_verify_area+0x1c2/0x360
[  146.780531][ T9138]  vfs_write+0x203/0x4e0
[  146.784955][ T9138]  ksys_write+0x168/0x2a0
[  146.789274][ T9138]  ? __ia32_sys_read+0x90/0x90
[  146.794034][ T9138]  ? __kasan_check_read+0x11/0x20
[  146.799037][ T9138]  ? __ia32_sys_clock_settime+0x230/0x230
[  146.804739][ T9138]  __x64_sys_write+0x7b/0x90
[  146.809322][ T9138]  do_syscall_64+0xc0/0x100
[  146.813821][ T9138]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  146.820124][ T9138] RIP: 0033:0x45b349
[  146.823998][ T9138] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  146.843575][ T9138] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  146.851974][ T9138] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  146.859924][ T9138] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  146.867886][ T9138] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  146.875837][ T9138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  146.883798][ T9138] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000018
[  146.894813][ T9142] FAULT_INJECTION: forcing a failure.
[  146.894813][ T9142] name failslab, interval 1, probability 0, space 0, times 0
[  146.900227][ T9138] SELinux: failed to load policy
[  146.907568][ T9142] CPU: 1 PID: 9142 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  146.922451][ T9142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  146.932484][ T9142] Call Trace:
[  146.935758][ T9142]  dump_stack+0x1b0/0x228
[  146.940067][ T9142]  ? devkmsg_release+0x127/0x127
[  146.944977][ T9142]  ? new_inode+0x28/0x1c0
[  146.949279][ T9142]  ? show_regs_print_info+0x18/0x18
[  146.954461][ T9142]  ? path_openat+0x1e1a/0x3c00
[  146.959198][ T9142]  ? do_sys_open+0x36f/0x7a0
[  146.963771][ T9142]  ? __x64_sys_open+0x87/0x90
[  146.968422][ T9142]  should_fail+0x6fb/0x860
[  146.972827][ T9142]  ? setup_fault_attr+0x2b0/0x2b0
[  146.977838][ T9142]  __should_failslab+0x11a/0x160
[  146.982752][ T9142]  ? context_struct_to_string+0x3b5/0x7f0
[  146.988457][ T9142]  should_failslab+0x9/0x20
[  146.992945][ T9142]  __kmalloc+0x64/0x310
[  146.997078][ T9142]  context_struct_to_string+0x3b5/0x7f0
[  147.002601][ T9142]  ? security_bounded_transition+0x520/0x520
[  147.008555][ T9142]  ? mls_range_isvalid+0x3a8/0x4c0
[  147.013640][ T9142]  context_add_hash+0xf5/0x200
[  147.018381][ T9142]  ? security_sid_to_context_inval+0x50/0x50
[  147.024332][ T9142]  ? mls_context_isvalid+0x9e/0x390
[  147.029503][ T9142]  ? policydb_context_isvalid+0x1d5/0x430
[  147.035215][ T9142]  security_compute_sid+0x1147/0x1be0
[  147.040570][ T9142]  ? security_transition_sid+0x90/0x90
[  147.046007][ T9142]  ? stack_trace_save+0x111/0x1e0
[  147.051012][ T9142]  ? __kasan_kmalloc+0x179/0x1b0
[  147.056184][ T9142]  ? __kasan_kmalloc+0x117/0x1b0
[  147.061094][ T9142]  ? kasan_slab_alloc+0xe/0x10
[  147.065836][ T9142]  ? kmem_cache_alloc+0x120/0x2b0
[  147.070852][ T9142]  ? __d_alloc+0x2d/0x6d0
[  147.075164][ T9142]  ? d_alloc_pseudo+0x1d/0x70
[  147.079825][ T9142]  ? alloc_file_pseudo+0x128/0x310
[  147.084910][ T9142]  ? __shmem_file_setup+0x1a2/0x280
[  147.090081][ T9142]  ? shmem_file_setup+0x2f/0x40
[  147.094919][ T9142]  ? new_inode_pseudo+0x68/0x240
[  147.099830][ T9142]  ? new_inode+0x28/0x1c0
[  147.104141][ T9142]  ? shmem_get_inode+0x114/0x690
[  147.109051][ T9142]  ? __kasan_check_write+0x14/0x20
[  147.114138][ T9142]  ? _raw_spin_lock+0xa1/0x170
[  147.118875][ T9142]  ? _raw_spin_trylock_bh+0x190/0x190
[  147.124227][ T9142]  security_transition_sid+0x7d/0x90
[  147.129487][ T9142]  inode_doinit_with_dentry+0x5e0/0x10e0
[  147.135092][ T9142]  ? sb_finish_set_opts+0x800/0x800
[  147.140263][ T9142]  ? __d_alloc+0x2d/0x6d0
[  147.144564][ T9142]  ? kasan_slab_alloc+0xe/0x10
[  147.149312][ T9142]  ? d_set_d_op+0xfd/0x390
[  147.153704][ T9142]  selinux_d_instantiate+0x27/0x40
[  147.158803][ T9142]  security_d_instantiate+0xa0/0x100
[  147.164062][ T9142]  d_instantiate+0x55/0x90
[  147.168455][ T9142]  alloc_file_pseudo+0x24a/0x310
[  147.173369][ T9142]  ? alloc_empty_file_noaccount+0x80/0x80
[  147.179065][ T9142]  ? __kasan_check_write+0x14/0x20
[  147.184149][ T9142]  ? clear_nlink+0x87/0xe0
[  147.188552][ T9142]  __shmem_file_setup+0x1a2/0x280
[  147.193671][ T9142]  shmem_file_setup+0x2f/0x40
[  147.198345][ T9142]  __se_sys_memfd_create+0x215/0x3e0
[  147.203612][ T9142]  __x64_sys_memfd_create+0x5b/0x70
[  147.208815][ T9142]  do_syscall_64+0xc0/0x100
[  147.213337][ T9142]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  147.219227][ T9142] RIP: 0033:0x45b349
[  147.223098][ T9142] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  147.242684][ T9142] RSP: 002b:00007f1c0b991a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  147.251094][ T9142] RAX: ffffffffffffffda RBX: 00007f1c0b9926d4 RCX: 000000000045b349
15:47:14 executing program 3:
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x102)
write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e)
fallocate(r0, 0x11, 0x0, 0x4003fe)

[  147.259051][ T9142] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  147.267003][ T9142] RBP: 000000000075bfc8 R08: 00000000038028b8 R09: 0000000000000001
[  147.274964][ T9142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  147.282921][ T9142] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000004
15:47:14 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x48)

15:47:14 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0])

15:47:14 executing program 0 (fault-call:1 fault-nth:25):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  147.411266][   T22] kauditd_printk_skb: 165 callbacks suppressed
[  147.411275][   T22] audit: type=1326 audit(1580485634.896:1647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:47:14 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  147.451402][   T22] audit: type=1326 audit(1580485634.896:1648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  147.484292][   T22] audit: type=1326 audit(1580485634.896:1649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  147.492032][ T9167] FAULT_INJECTION: forcing a failure.
[  147.492032][ T9167] name failslab, interval 1, probability 0, space 0, times 0
[  147.510196][   T22] audit: type=1326 audit(1580485634.896:1650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  147.550522][   T22] audit: type=1326 audit(1580485634.896:1651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  147.579524][   T22] audit: type=1326 audit(1580485634.896:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  147.617613][ T9171] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  147.631203][   T22] audit: type=1326 audit(1580485634.896:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  147.647564][ T9167] CPU: 1 PID: 9167 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  147.666630][ T9167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  147.676675][ T9167] Call Trace:
[  147.680041][ T9167]  dump_stack+0x1b0/0x228
[  147.684349][ T9167]  ? devkmsg_release+0x127/0x127
[  147.689361][ T9167]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  147.695402][ T9167]  ? show_regs_print_info+0x18/0x18
[  147.700573][ T9167]  should_fail+0x6fb/0x860
[  147.704964][ T9167]  ? setup_fault_attr+0x2b0/0x2b0
[  147.709996][ T9167]  ? setup_fault_attr+0x2b0/0x2b0
[  147.715011][ T9167]  ? should_fail+0x182/0x860
[  147.719591][ T9167]  ? ___slab_alloc+0xab/0x450
[  147.724269][ T9167]  __should_failslab+0x11a/0x160
[  147.729193][ T9167]  ? hashtab_create+0x5c/0x3f0
[  147.733954][ T9167]  should_failslab+0x9/0x20
[  147.738445][ T9167]  kmem_cache_alloc_trace+0x3a/0x2f0
[  147.743733][ T9167]  ? perm_destroy+0x30/0x30
[  147.748209][ T9167]  ? filenametr_hash+0x250/0x250
[  147.753229][ T9167]  hashtab_create+0x5c/0x3f0
[  147.757814][ T9167]  policydb_read+0x6cf/0x77f0
[  147.762481][ T9167]  ? __alloc_pages_nodemask+0x52d/0x3010
[  147.768107][ T9167]  ? should_fail+0x182/0x860
[  147.772709][ T9167]  ? __vmalloc_node_range+0x2b6/0x760
[  147.778074][ T9167]  ? setup_fault_attr+0x2b0/0x2b0
[  147.783783][ T9167]  ? vfs_write+0x203/0x4e0
[  147.788178][ T9167]  ? ksys_write+0x168/0x2a0
[  147.792661][ T9167]  ? do_syscall_64+0xc0/0x100
[  147.797439][ T9167]  ? string_to_av_perm+0x1c0/0x1c0
[  147.802545][ T9167]  ? __should_failslab+0x11a/0x160
[  147.807688][ T9167]  ? security_load_policy+0x1af/0xfd0
[  147.813052][ T9167]  ? kasan_kmalloc+0x9/0x10
[  147.817531][ T9167]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  147.822964][ T9167]  security_load_policy+0x228/0xfd0
[  147.828152][ T9167]  ? _raw_spin_lock+0xa1/0x170
[  147.832916][ T9167]  ? _raw_spin_trylock_bh+0x190/0x190
[  147.838277][ T9167]  ? security_change_sid+0x50/0x50
[  147.843403][ T9167]  ? vmap_page_range_noflush+0x67b/0x6a0
[  147.849035][ T9167]  ? __vmalloc_node_range+0x56c/0x760
[  147.854395][ T9167]  ? __kasan_check_write+0x14/0x20
[  147.859483][ T9167]  ? _copy_from_user+0xa8/0xe0
[  147.864221][ T9167]  sel_write_load+0x24e/0x410
[  147.868887][ T9167]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  147.874506][ T9167]  __vfs_write+0xff/0x700
[  147.878810][ T9167]  ? __kernel_write+0x350/0x350
[  147.883634][ T9167]  ? avc_policy_seqno+0x1b/0x70
[  147.888466][ T9167]  ? selinux_file_permission+0x2ba/0x560
[  147.894072][ T9167]  ? security_file_permission+0x157/0x350
[  147.899769][ T9167]  ? rw_verify_area+0x1c2/0x360
[  147.904595][ T9167]  vfs_write+0x203/0x4e0
[  147.908821][ T9167]  ksys_write+0x168/0x2a0
[  147.913131][ T9167]  ? __ia32_sys_read+0x90/0x90
[  147.917873][ T9167]  ? __kasan_check_read+0x11/0x20
[  147.922871][ T9167]  ? __ia32_sys_clock_settime+0x230/0x230
[  147.928567][ T9167]  __x64_sys_write+0x7b/0x90
[  147.933156][ T9167]  do_syscall_64+0xc0/0x100
[  147.937645][ T9167]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  147.943508][ T9167] RIP: 0033:0x45b349
[  147.947391][ T9167] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
15:47:15 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x4c)

[  147.966987][ T9167] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  147.975402][ T9167] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  147.983374][ T9167] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  147.991328][ T9167] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  147.999274][ T9167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  148.007220][ T9167] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000019
[  148.028967][   T22] audit: type=1326 audit(1580485634.896:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
15:47:15 executing program 4:
bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="851000002a00000084000000000004009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x6000, 0x0)
openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r3 = accept4$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c, 0x80800)
r4 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'ipvs\x00'}, &(0x7f0000000300)=0x1e)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = dup(r5)
getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={[], [], @multicast2}, @remote, @local, 0x8, 0x5, 0x40, 0x0, 0x4, 0x400040, r7})
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000340)={'syz0', "5b6524c85aafc0fdafca368e16361cec26de71ccaab9fa9f3811379a68466a905907a7d1cb7406d6a42cdd78a5731617f175b7a3b2ccbd90a0e93d808dcfe77b3daf873e617dd54ce2fd18762b8306bd3ad3cd29c45eb357662186b3ef58f383e87752deec7b93"}, 0x6b)
r8 = socket$unix(0x1, 0x2, 0x0)
r9 = fcntl$dupfd(r8, 0x0, r8)
ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400205)
ioctl$BLKBSZSET(r9, 0x40081271, &(0x7f00000003c0)=0xa4)

15:47:15 executing program 5 (fault-call:2 fault-nth:0):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:15 executing program 0 (fault-call:1 fault-nth:26):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:15 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x68)

[  148.056514][   T22] audit: type=1326 audit(1580485634.896:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  148.080747][ T9167] SELinux: failed to load policy
[  148.083736][   T22] audit: type=1326 audit(1580485634.896:1656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
15:47:15 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  148.198617][ T9196] FAULT_INJECTION: forcing a failure.
[  148.198617][ T9196] name failslab, interval 1, probability 0, space 0, times 0
[  148.219539][ T9201] FAULT_INJECTION: forcing a failure.
[  148.219539][ T9201] name failslab, interval 1, probability 0, space 0, times 0
[  148.225465][ T9196] CPU: 1 PID: 9196 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  148.242196][ T9196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  148.252236][ T9196] Call Trace:
[  148.255520][ T9196]  dump_stack+0x1b0/0x228
[  148.259841][ T9196]  ? devkmsg_release+0x127/0x127
[  148.264882][ T9196]  ? show_regs_print_info+0x18/0x18
[  148.270062][ T9196]  ? __fsnotify_parent+0x300/0x300
[  148.275208][ T9196]  should_fail+0x6fb/0x860
[  148.279617][ T9196]  ? setup_fault_attr+0x2b0/0x2b0
[  148.284624][ T9196]  ? __kasan_check_write+0x14/0x20
[  148.289730][ T9196]  ? fput_many+0x47/0x1a0
[  148.294048][ T9196]  __should_failslab+0x11a/0x160
[  148.298978][ T9196]  ? __se_sys_memfd_create+0xfa/0x3e0
[  148.304344][ T9196]  should_failslab+0x9/0x20
[  148.308840][ T9196]  __kmalloc+0x64/0x310
[  148.313094][ T9196]  __se_sys_memfd_create+0xfa/0x3e0
[  148.318452][ T9196]  __x64_sys_memfd_create+0x5b/0x70
[  148.323637][ T9196]  do_syscall_64+0xc0/0x100
[  148.328136][ T9196]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  148.334018][ T9196] RIP: 0033:0x45b349
[  148.337896][ T9196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  148.357487][ T9196] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  148.366035][ T9196] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349
[  148.374003][ T9196] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  148.381967][ T9196] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
[  148.390018][ T9196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
15:47:15 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x6c)

15:47:15 executing program 3:
r0 = gettid()
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
readv(r1, &(0x7f0000001400)=[{&(0x7f00000010c0)=""/247, 0xf7}], 0x1)
ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0xa)
fcntl$setsig(r1, 0xa, 0x12)
dup2(r1, r2)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'\x00', 0x10005812})
io_setup(0x20000000002, &(0x7f0000000240)=<r6=>0x0)
io_submit(r6, 0x2, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000180)='\f', 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])
dup3(r4, r5, 0x0)
fcntl$setown(r1, 0x8, r0)
r7 = socket$nl_xfrm(0x10, 0x3, 0x6)
io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x0, r7, 0x0}])
ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000140)={{0x0, 0x0, @descriptor="a96963e763f33cf5"}})
r8 = fsmount(0xffffffffffffffff, 0x0, 0xb)
fgetxattr(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="73656375726974792e00b0768da094808510cdefe63f522a70648ec8108cd9f8286b"], &(0x7f00000002c0)=""/55, 0x37)
r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0)
write$P9_RSTAT(r9, &(0x7f0000000380)={0x43, 0x7d, 0x2, {0x0, 0x3c, 0xbf, 0x1, {0x20, 0x1, 0x3}, 0x78100000, 0x826, 0x73, 0x674, 0x1, '\x00', 0x1, '\x00', 0x1, '\x00', 0x6, ')\\-%*!'}}, 0x43)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={<r10=>0xffffffffffffffff})
r11 = dup(r10)
ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200)
tkill(r0, 0x15)

[  148.398057][ T9196] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000000
[  148.406056][ T9201] CPU: 0 PID: 9201 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  148.416237][ T9201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  148.426286][ T9201] Call Trace:
[  148.426639][ T9200] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  148.429573][ T9201]  dump_stack+0x1b0/0x228
[  148.429584][ T9201]  ? devkmsg_release+0x127/0x127
15:47:15 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r2, 0x0, r2)
getpeername$unix(r2, &(0x7f0000000000), &(0x7f0000000080)=0x6e)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r4, 0x10, 0x0, 0x0, {{}, {}, {0x8, 0x2, 0x2}}}, 0x24}}, 0x0)

[  148.429591][ T9201]  ? show_regs_print_info+0x18/0x18
[  148.429603][ T9201]  should_fail+0x6fb/0x860
[  148.429610][ T9201]  ? setup_fault_attr+0x2b0/0x2b0
[  148.429616][ T9201]  ? setup_fault_attr+0x2b0/0x2b0
[  148.429623][ T9201]  ? should_fail+0x182/0x860
[  148.429638][ T9201]  ? ___slab_alloc+0xab/0x450
[  148.475292][ T9201]  __should_failslab+0x11a/0x160
[  148.480227][ T9201]  ? hashtab_create+0x5c/0x3f0
[  148.484990][ T9201]  should_failslab+0x9/0x20
[  148.489490][ T9201]  kmem_cache_alloc_trace+0x3a/0x2f0
[  148.494777][ T9201]  ? perm_destroy+0x30/0x30
[  148.499291][ T9201]  ? filenametr_hash+0x250/0x250
[  148.504219][ T9201]  hashtab_create+0x5c/0x3f0
[  148.508804][ T9201]  policydb_read+0x6cf/0x77f0
[  148.513475][ T9201]  ? alloc_slab_page+0x135/0x390
[  148.518388][ T9201]  ? setup_object+0xfa/0x130
[  148.522983][ T9201]  ? new_slab+0x21b/0x430
[  148.527420][ T9201]  ? string_to_av_perm+0x1c0/0x1c0
[  148.532520][ T9201]  ? __should_failslab+0x11a/0x160
[  148.537616][ T9201]  ? security_load_policy+0x1af/0xfd0
[  148.543076][ T9201]  ? kasan_kmalloc+0x9/0x10
[  148.547562][ T9201]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  148.552999][ T9201]  security_load_policy+0x228/0xfd0
[  148.558188][ T9201]  ? _raw_spin_lock+0xa1/0x170
[  148.562962][ T9201]  ? _raw_spin_trylock_bh+0x190/0x190
[  148.568320][ T9201]  ? security_change_sid+0x50/0x50
[  148.573433][ T9201]  ? vmap_page_range_noflush+0x67b/0x6a0
[  148.579059][ T9201]  ? __vmalloc_node_range+0x56c/0x760
[  148.584413][ T9201]  ? __kasan_check_write+0x14/0x20
[  148.589510][ T9201]  ? _copy_from_user+0xa8/0xe0
[  148.594264][ T9201]  sel_write_load+0x24e/0x410
[  148.598934][ T9201]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  148.604570][ T9201]  __vfs_write+0xff/0x700
[  148.608904][ T9201]  ? __kernel_write+0x350/0x350
[  148.613747][ T9201]  ? avc_policy_seqno+0x1b/0x70
[  148.618666][ T9201]  ? selinux_file_permission+0x2ba/0x560
[  148.624293][ T9201]  ? security_file_permission+0x157/0x350
[  148.630003][ T9201]  ? rw_verify_area+0x1c2/0x360
[  148.634860][ T9201]  vfs_write+0x203/0x4e0
[  148.639089][ T9201]  ksys_write+0x168/0x2a0
[  148.643458][ T9201]  ? __ia32_sys_read+0x90/0x90
[  148.648227][ T9201]  ? __kasan_check_read+0x11/0x20
[  148.653241][ T9201]  ? __ia32_sys_clock_settime+0x230/0x230
[  148.658944][ T9201]  __x64_sys_write+0x7b/0x90
[  148.663517][ T9201]  do_syscall_64+0xc0/0x100
[  148.668041][ T9201]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  148.673915][ T9201] RIP: 0033:0x45b349
[  148.677919][ T9201] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
15:47:16 executing program 4:
r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x18}, 0x10)
dup3(r0, 0xffffffffffffffff, 0x80000)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
write$evdev(0xffffffffffffffff, &(0x7f0000000180)=[{{}, 0x1}, {{0x0, 0x2710}, 0x15}], 0x30)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
execveat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='@selinuxeth1ppp1\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='ext4\x00'], &(0x7f0000000540)=[&(0x7f0000000400)=']selinux@\x00', &(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='ext4\x00'], 0x400)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
read$eventfd(r3, &(0x7f0000000640), 0x8)
perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x25, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3f}, 0x0, 0x4, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)
r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80, 0x0)
move_mount(r4, &(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x44)

[  148.697713][ T9201] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  148.706114][ T9201] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  148.714074][ T9201] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  148.722035][ T9201] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  148.730123][ T9201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  148.738078][ T9201] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001a
15:47:16 executing program 5 (fault-call:2 fault-nth:1):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  148.759981][ T9201] SELinux: failed to load policy
15:47:16 executing program 0 (fault-call:1 fault-nth:27):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:16 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x74)

[  148.790332][ T9218] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  148.808595][ T9229] FAULT_INJECTION: forcing a failure.
[  148.808595][ T9229] name failslab, interval 1, probability 0, space 0, times 0
[  148.822030][ T9229] CPU: 0 PID: 9229 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  148.832079][ T9229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  148.842199][ T9229] Call Trace:
[  148.845475][ T9229]  dump_stack+0x1b0/0x228
[  148.849789][ T9229]  ? devkmsg_release+0x127/0x127
[  148.854708][ T9229]  ? show_regs_print_info+0x18/0x18
[  148.860009][ T9229]  ? get_pid_task+0x8d/0xa0
[  148.864495][ T9229]  ? proc_fail_nth_write+0x166/0x200
[  148.869796][ T9229]  ? __kasan_check_write+0x14/0x20
[  148.874897][ T9229]  should_fail+0x6fb/0x860
[  148.879297][ T9229]  ? setup_fault_attr+0x2b0/0x2b0
[  148.884300][ T9229]  ? __kasan_kmalloc+0x117/0x1b0
[  148.889211][ T9229]  ? kasan_kmalloc+0x9/0x10
[  148.893691][ T9229]  ? __kmalloc+0x102/0x310
[  148.898121][ T9229]  ? __se_sys_memfd_create+0xfa/0x3e0
[  148.903478][ T9229]  ? do_syscall_64+0xc0/0x100
[  148.908190][ T9229]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  148.914238][ T9229]  ? fsnotify+0x1390/0x1450
[  148.918729][ T9229]  __should_failslab+0x11a/0x160
[  148.923654][ T9229]  ? shmem_alloc_inode+0x1b/0x40
[  148.928569][ T9229]  should_failslab+0x9/0x20
[  148.933180][ T9229]  kmem_cache_alloc+0x37/0x2b0
[  148.937943][ T9229]  ? shmem_match+0x180/0x180
[  148.942527][ T9229]  shmem_alloc_inode+0x1b/0x40
[  148.947385][ T9229]  ? shmem_match+0x180/0x180
[  148.951965][ T9229]  new_inode_pseudo+0x68/0x240
[  148.956744][ T9229]  new_inode+0x28/0x1c0
[  148.960894][ T9229]  shmem_get_inode+0x114/0x690
[  148.965763][ T9229]  __shmem_file_setup+0x129/0x280
[  148.970871][ T9229]  shmem_file_setup+0x2f/0x40
[  148.975554][ T9229]  __se_sys_memfd_create+0x215/0x3e0
[  148.980848][ T9229]  __x64_sys_memfd_create+0x5b/0x70
[  148.986147][ T9229]  do_syscall_64+0xc0/0x100
[  148.990642][ T9229]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  148.996659][ T9229] RIP: 0033:0x45b349
[  149.000537][ T9229] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  149.020125][ T9229] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  149.028544][ T9229] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349
15:47:16 executing program 5 (fault-call:2 fault-nth:2):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  149.036511][ T9229] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  149.044476][ T9229] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
[  149.052437][ T9229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  149.060402][ T9229] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000001
[  149.108800][ T9236] FAULT_INJECTION: forcing a failure.
[  149.108800][ T9236] name failslab, interval 1, probability 0, space 0, times 0
[  149.121637][ T9236] CPU: 0 PID: 9236 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  149.131690][ T9236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  149.141732][ T9236] Call Trace:
[  149.145013][ T9236]  dump_stack+0x1b0/0x228
[  149.149340][ T9236]  ? devkmsg_release+0x127/0x127
[  149.154271][ T9236]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  149.161457][ T9236]  ? show_regs_print_info+0x18/0x18
[  149.166752][ T9236]  should_fail+0x6fb/0x860
[  149.171185][ T9236]  ? setup_fault_attr+0x2b0/0x2b0
[  149.176228][ T9236]  ? setup_fault_attr+0x2b0/0x2b0
[  149.181249][ T9236]  ? should_fail+0x182/0x860
[  149.185902][ T9236]  ? __kernel_text_address+0x9a/0x110
[  149.191281][ T9236]  ? ___slab_alloc+0xab/0x450
[  149.195979][ T9236]  __should_failslab+0x11a/0x160
[  149.201020][ T9236]  ? hashtab_create+0x5c/0x3f0
[  149.205778][ T9236]  should_failslab+0x9/0x20
[  149.210279][ T9236]  kmem_cache_alloc_trace+0x3a/0x2f0
[  149.215559][ T9236]  ? filenametr_cmp+0x240/0x240
[  149.220408][ T9236]  ? rangetr_hash+0xf0/0xf0
[  149.224918][ T9236]  hashtab_create+0x5c/0x3f0
[  149.229496][ T9236]  policydb_read+0x731/0x77f0
[  149.234164][ T9236]  ? __alloc_pages_nodemask+0x52d/0x3010
[  149.240070][ T9236]  ? should_fail+0x182/0x860
[  149.244656][ T9236]  ? __vmalloc_node_range+0x2b6/0x760
[  149.250024][ T9236]  ? setup_fault_attr+0x2b0/0x2b0
[  149.255028][ T9236]  ? vfs_write+0x203/0x4e0
[  149.259438][ T9236]  ? ksys_write+0x168/0x2a0
[  149.263926][ T9236]  ? do_syscall_64+0xc0/0x100
[  149.268594][ T9236]  ? string_to_av_perm+0x1c0/0x1c0
[  149.273688][ T9236]  ? __should_failslab+0x11a/0x160
[  149.278794][ T9236]  ? security_load_policy+0x1af/0xfd0
[  149.284161][ T9236]  ? kasan_kmalloc+0x9/0x10
[  149.288661][ T9236]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  149.294107][ T9236]  security_load_policy+0x228/0xfd0
[  149.299308][ T9236]  ? _raw_spin_lock+0xa1/0x170
[  149.304068][ T9236]  ? _raw_spin_trylock_bh+0x190/0x190
[  149.309530][ T9236]  ? security_change_sid+0x50/0x50
[  149.314644][ T9236]  ? vmap_page_range_noflush+0x67b/0x6a0
[  149.320263][ T9236]  ? __vmalloc_node_range+0x56c/0x760
[  149.325626][ T9236]  ? __kasan_check_write+0x14/0x20
[  149.330785][ T9236]  ? _copy_from_user+0xa8/0xe0
[  149.335539][ T9236]  sel_write_load+0x24e/0x410
[  149.340197][ T9236]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  149.345930][ T9236]  __vfs_write+0xff/0x700
[  149.350245][ T9236]  ? __kernel_write+0x350/0x350
[  149.355100][ T9236]  ? avc_policy_seqno+0x1b/0x70
[  149.359963][ T9236]  ? selinux_file_permission+0x2ba/0x560
[  149.365721][ T9236]  ? security_file_permission+0x157/0x350
[  149.371431][ T9236]  ? rw_verify_area+0x1c2/0x360
[  149.376284][ T9236]  vfs_write+0x203/0x4e0
[  149.380525][ T9236]  ksys_write+0x168/0x2a0
[  149.384906][ T9236]  ? __ia32_sys_read+0x90/0x90
[  149.389667][ T9236]  ? __kasan_check_read+0x11/0x20
[  149.394687][ T9236]  ? __ia32_sys_clock_settime+0x230/0x230
[  149.400398][ T9236]  __x64_sys_write+0x7b/0x90
[  149.404995][ T9236]  do_syscall_64+0xc0/0x100
[  149.409493][ T9236]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  149.415381][ T9236] RIP: 0033:0x45b349
[  149.419265][ T9236] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  149.438880][ T9236] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  149.447295][ T9236] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  149.455260][ T9236] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  149.463335][ T9236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  149.471288][ T9236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  149.479261][ T9236] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001b
15:47:17 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:17 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x7a)

15:47:17 executing program 0 (fault-call:1 fault-nth:28):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  149.514530][ T9236] SELinux: failed to load policy
[  149.543386][ T9245] FAULT_INJECTION: forcing a failure.
[  149.543386][ T9245] name failslab, interval 1, probability 0, space 0, times 0
[  149.556195][ T9245] CPU: 1 PID: 9245 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  149.566287][ T9245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  149.576373][ T9245] Call Trace:
[  149.579666][ T9245]  dump_stack+0x1b0/0x228
[  149.584152][ T9245]  ? devkmsg_release+0x127/0x127
[  149.589090][ T9245]  ? __shmem_file_setup+0x129/0x280
[  149.594298][ T9245]  ? show_regs_print_info+0x18/0x18
[  149.599485][ T9245]  ? do_syscall_64+0xc0/0x100
[  149.604822][ T9245]  ? stack_trace_save+0x111/0x1e0
[  149.609835][ T9245]  should_fail+0x6fb/0x860
[  149.614347][ T9245]  ? setup_fault_attr+0x2b0/0x2b0
[  149.619367][ T9245]  ? ksys_mount+0xe2/0x100
[  149.623763][ T9245]  ? should_fail+0x182/0x860
[  149.628539][ T9245]  ? __kasan_kmalloc+0x179/0x1b0
[  149.633456][ T9245]  __should_failslab+0x11a/0x160
[  149.638385][ T9245]  ? security_inode_alloc+0x36/0x1f0
[  149.643686][ T9245]  should_failslab+0x9/0x20
[  149.648179][ T9245]  kmem_cache_alloc+0x37/0x2b0
[  149.652936][ T9245]  ? from_kuid_munged+0x3b0/0x3b0
[  149.657948][ T9245]  security_inode_alloc+0x36/0x1f0
[  149.663041][ T9245]  inode_init_always+0x39b/0x840
[  149.668098][ T9245]  ? shmem_match+0x180/0x180
[  149.672664][ T9245]  new_inode_pseudo+0x7f/0x240
[  149.677412][ T9245]  new_inode+0x28/0x1c0
[  149.681607][ T9245]  shmem_get_inode+0x114/0x690
[  149.686370][ T9245]  __shmem_file_setup+0x129/0x280
[  149.691391][ T9245]  shmem_file_setup+0x2f/0x40
[  149.696080][ T9245]  __se_sys_memfd_create+0x215/0x3e0
[  149.701415][ T9245]  __x64_sys_memfd_create+0x5b/0x70
[  149.706621][ T9245]  do_syscall_64+0xc0/0x100
[  149.711110][ T9245]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  149.716980][ T9245] RIP: 0033:0x45b349
[  149.720860][ T9245] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  149.740552][ T9245] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  149.748954][ T9245] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349
[  149.756910][ T9245] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  149.764864][ T9245] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
[  149.772862][ T9245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  149.780814][ T9245] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000002
15:47:17 executing program 5 (fault-call:2 fault-nth:3):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:17 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x180)

[  149.807289][ T9225] EXT4-fs (loop4): VFS: Can't find ext4 filesystem
[  149.830063][ T9260] FAULT_INJECTION: forcing a failure.
[  149.830063][ T9260] name failslab, interval 1, probability 0, space 0, times 0
[  149.843352][ T9260] CPU: 0 PID: 9260 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  149.853418][ T9260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  149.863465][ T9260] Call Trace:
[  149.866790][ T9260]  dump_stack+0x1b0/0x228
[  149.871103][ T9260]  ? devkmsg_release+0x127/0x127
[  149.876020][ T9260]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  149.882065][ T9260]  ? show_regs_print_info+0x18/0x18
[  149.887276][ T9260]  should_fail+0x6fb/0x860
[  149.891676][ T9260]  ? setup_fault_attr+0x2b0/0x2b0
[  149.896685][ T9260]  ? setup_fault_attr+0x2b0/0x2b0
[  149.901685][ T9260]  ? should_fail+0x182/0x860
[  149.906340][ T9260]  ? ___slab_alloc+0xab/0x450
[  149.910997][ T9260]  __should_failslab+0x11a/0x160
[  149.915921][ T9260]  ? hashtab_create+0x117/0x3f0
[  149.920764][ T9260]  should_failslab+0x9/0x20
[  149.925257][ T9260]  __kmalloc+0x64/0x310
[  149.929403][ T9260]  hashtab_create+0x117/0x3f0
[  149.934064][ T9260]  policydb_read+0x731/0x77f0
[  149.938845][ T9260]  ? __alloc_pages_nodemask+0x52d/0x3010
[  149.944508][ T9260]  ? should_fail+0x182/0x860
[  149.949094][ T9260]  ? __vmalloc_node_range+0x2b6/0x760
[  149.954448][ T9260]  ? setup_fault_attr+0x2b0/0x2b0
[  149.959452][ T9260]  ? vfs_write+0x203/0x4e0
[  149.963853][ T9260]  ? ksys_write+0x168/0x2a0
[  149.968336][ T9260]  ? do_syscall_64+0xc0/0x100
[  149.973097][ T9260]  ? string_to_av_perm+0x1c0/0x1c0
[  149.978256][ T9260]  ? __should_failslab+0x11a/0x160
[  149.983355][ T9260]  ? security_load_policy+0x1af/0xfd0
[  149.988707][ T9260]  ? kasan_kmalloc+0x9/0x10
[  149.993217][ T9260]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  149.998718][ T9260]  security_load_policy+0x228/0xfd0
[  150.003906][ T9260]  ? _raw_spin_lock+0xa1/0x170
[  150.008763][ T9260]  ? _raw_spin_trylock_bh+0x190/0x190
[  150.014120][ T9260]  ? security_change_sid+0x50/0x50
[  150.019210][ T9260]  ? vmap_page_range_noflush+0x67b/0x6a0
[  150.024866][ T9260]  ? __vmalloc_node_range+0x56c/0x760
[  150.030220][ T9260]  ? __kasan_check_write+0x14/0x20
[  150.035312][ T9260]  ? _copy_from_user+0xa8/0xe0
[  150.040054][ T9260]  sel_write_load+0x24e/0x410
[  150.044715][ T9260]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  150.050354][ T9260]  __vfs_write+0xff/0x700
[  150.054694][ T9260]  ? __kernel_write+0x350/0x350
[  150.059526][ T9260]  ? avc_policy_seqno+0x1b/0x70
[  150.064406][ T9260]  ? selinux_file_permission+0x2ba/0x560
[  150.070069][ T9260]  ? security_file_permission+0x157/0x350
[  150.075765][ T9260]  ? rw_verify_area+0x1c2/0x360
[  150.080686][ T9260]  vfs_write+0x203/0x4e0
[  150.084915][ T9260]  ksys_write+0x168/0x2a0
[  150.089221][ T9260]  ? __ia32_sys_read+0x90/0x90
[  150.094096][ T9260]  ? __kasan_check_read+0x11/0x20
[  150.099150][ T9260]  ? __ia32_sys_clock_settime+0x230/0x230
[  150.104910][ T9260]  __x64_sys_write+0x7b/0x90
[  150.109511][ T9260]  do_syscall_64+0xc0/0x100
[  150.114004][ T9260]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  150.119883][ T9260] RIP: 0033:0x45b349
[  150.123771][ T9260] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  150.143402][ T9260] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
15:47:17 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0xf)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4)
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
syz_open_dev$ttys(0xc, 0x2, 0x0)
sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xb4, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x40, @mcast1, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvlan0\x00'}}]}, @TIPC_NLA_SOCK={0x20, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9d21}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}]}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x400c011}, 0x2000c054)
preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/133, 0x85}, {&(0x7f0000000380)=""/237, 0xed}, {&(0x7f0000000480)=""/102, 0x66}, {&(0x7f0000000500)=""/204, 0xcc}], 0x4, 0x3)
r1 = socket$unix(0x1, 0x2, 0x0)
socketpair(0x18, 0x4, 0x0, &(0x7f0000000240)={<r2=>0xffffffffffffffff})
accept$unix(r2, 0x0, &(0x7f0000000280))
r3 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'macvtap0\x00', 0x8000})

15:47:17 executing program 0 (fault-call:1 fault-nth:29):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  150.151791][ T9260] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  150.159790][ T9260] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  150.167744][ T9260] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  150.175708][ T9260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  150.183751][ T9260] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001c
[  150.193715][ T9260] SELinux: failed to load policy
15:47:17 executing program 4:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00')
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x474042, 0x0)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000940)={{0xcc, 0x5, 0x48, 0x61, 0x3d8, 0xfff, 0x6e, 0x4}, "f74cd28835c5c70de776f0a9a97d92aa8fd95c8dc4240ce6044b97481fb0ccb5222e89ee80b20d9ab179b243017ea2485589663bf2d8c1415a937f8c64d3be030a13563d69e6d3532287f210efea4d8ef13c0fd2e0483be5384e0d0c177f04cdf5445af4a7edad4d3b89293b7a684d7238bbd71411c71d97a2706f0b8c7ebba7d0a4f530974e6fc5d0c594fbeae5c4723e3467622a9b99bc3c2be5b6dd", [[], [], []]}, 0x3bd)
r3 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, <r4=>0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x80000)
r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r5, 0x800)
sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="00000400", @ANYRES16=0x0, @ANYBLOB="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"], 0x158}, 0x1, 0x0, 0x0, 0x10}, 0x840)
lseek(r5, 0x0, 0x2)
open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0)
sendfile(r5, r2, 0x0, 0x280901)
r6 = getpid()
sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r7 = getpid()
sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r8 = getpid()
sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r9 = getpid()
sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r10 = getpid()
sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r11 = clone3(&(0x7f0000000d40)={0x8008200, &(0x7f0000000240), &(0x7f0000000480), &(0x7f0000000600), {0x9}, &(0x7f0000000640)=""/57, 0x39, &(0x7f00000006c0)=""/122, &(0x7f0000000d00)=[0xffffffffffffffff, r6, r7, r8, r9, 0x0, r10], 0x7}, 0x50)
sched_setattr(r11, &(0x7f0000000dc0)={0x38, 0x6, 0x2, 0xfffffff8, 0x4, 0x2, 0x9, 0x5d5, 0x8}, 0x0)
r12 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00')
r13 = open(0x0, 0x84002, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="080001", @ANYRES32, @ANYBLOB, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB, @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="080001", @ANYRES32], 0xd}}, 0x0)
sendmsg$NBD_CMD_STATUS(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r12, @ANYBLOB="100027bd70000000000000008a0f0700"/25], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20004001)
preadv(r1, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/151, 0x97}], 0x1, 0x0)
ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x10)
lseek(r2, 0x9, 0x2)
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x4, 0x3fe, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.controllers\x00', 0x275a, 0x0)
r14 = socket$unix(0x1, 0x2, 0x0)
r15 = fcntl$dupfd(r14, 0x0, r14)
ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200)
ioctl$FS_IOC_RESVSP(r15, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x400})

[  150.219494][ T9258] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  150.260966][ T9276] FAULT_INJECTION: forcing a failure.
[  150.260966][ T9276] name failslab, interval 1, probability 0, space 0, times 0
[  150.263090][ T9277] FAULT_INJECTION: forcing a failure.
[  150.263090][ T9277] name failslab, interval 1, probability 0, space 0, times 0
[  150.303056][ T9277] CPU: 1 PID: 9277 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  150.313169][ T9277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  150.323220][ T9277] Call Trace:
[  150.326511][ T9277]  dump_stack+0x1b0/0x228
[  150.330839][ T9277]  ? devkmsg_release+0x127/0x127
[  150.335774][ T9277]  ? show_regs_print_info+0x18/0x18
[  150.340961][ T9277]  ? should_fail+0x182/0x860
[  150.345538][ T9277]  ? should_fail+0x182/0x860
[  150.350133][ T9277]  ? setup_fault_attr+0x2b0/0x2b0
[  150.355145][ T9277]  should_fail+0x6fb/0x860
[  150.359551][ T9277]  ? setup_fault_attr+0x2b0/0x2b0
[  150.364913][ T9277]  ? __should_failslab+0x11a/0x160
[  150.370014][ T9277]  ? hashtab_create+0x117/0x3f0
[  150.374878][ T9277]  __should_failslab+0x11a/0x160
[  150.379808][ T9277]  ? policydb_read+0x9ab/0x77f0
[  150.384645][ T9277]  should_failslab+0x9/0x20
[  150.389141][ T9277]  kmem_cache_alloc_trace+0x3a/0x2f0
[  150.394427][ T9277]  policydb_read+0x9ab/0x77f0
[  150.399100][ T9277]  ? __alloc_pages_nodemask+0x52d/0x3010
[  150.404734][ T9277]  ? __vmalloc_node_range+0x2b6/0x760
[  150.410144][ T9277]  ? vfs_write+0x203/0x4e0
[  150.414553][ T9277]  ? do_syscall_64+0xc0/0x100
[  150.419224][ T9277]  ? string_to_av_perm+0x1c0/0x1c0
[  150.424330][ T9277]  ? __should_failslab+0x11a/0x160
[  150.429784][ T9277]  ? security_load_policy+0x1af/0xfd0
[  150.435145][ T9277]  ? kasan_kmalloc+0x9/0x10
[  150.439643][ T9277]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  150.445118][ T9277]  security_load_policy+0x228/0xfd0
[  150.450316][ T9277]  ? _raw_spin_lock+0xa1/0x170
[  150.455066][ T9277]  ? _raw_spin_trylock_bh+0x190/0x190
[  150.460420][ T9277]  ? security_change_sid+0x50/0x50
[  150.465524][ T9277]  ? vmap_page_range_noflush+0x67b/0x6a0
[  150.471151][ T9277]  ? __vmalloc_node_range+0x56c/0x760
[  150.476507][ T9277]  ? __kasan_check_write+0x14/0x20
[  150.481613][ T9277]  ? _copy_from_user+0xa8/0xe0
[  150.486372][ T9277]  sel_write_load+0x24e/0x410
[  150.491039][ T9277]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  150.496652][ T9277]  __vfs_write+0xff/0x700
[  150.500976][ T9277]  ? __kernel_write+0x350/0x350
[  150.505817][ T9277]  ? avc_policy_seqno+0x1b/0x70
[  150.510657][ T9277]  ? selinux_file_permission+0x2ba/0x560
[  150.516300][ T9277]  ? security_file_permission+0x157/0x350
[  150.522131][ T9277]  ? rw_verify_area+0x1c2/0x360
[  150.526970][ T9277]  vfs_write+0x203/0x4e0
[  150.531194][ T9277]  ksys_write+0x168/0x2a0
[  150.535512][ T9277]  ? __ia32_sys_read+0x90/0x90
[  150.540266][ T9277]  ? __kasan_check_read+0x11/0x20
[  150.545281][ T9277]  ? __ia32_sys_clock_settime+0x230/0x230
[  150.550978][ T9277]  __x64_sys_write+0x7b/0x90
[  150.555558][ T9277]  do_syscall_64+0xc0/0x100
[  150.560055][ T9277]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  150.565942][ T9277] RIP: 0033:0x45b349
[  150.569820][ T9277] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  150.589424][ T9277] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
15:47:17 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:18 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x300)

[  150.597830][ T9277] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  150.605796][ T9277] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  150.613874][ T9277] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  150.621845][ T9277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  150.629826][ T9277] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001d
[  150.637901][ T9276] CPU: 0 PID: 9276 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
15:47:18 executing program 3:
sched_setattr(0x0, 0x0, 0x0)
r0 = creat(0x0, 0x10)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r1 = socket(0x10, 0x0, 0x0)
recvmmsg(r1, 0x0, 0x0, 0x0, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0}, 0x2004c000)
setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x7}, 0x16, 0x1)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$9p(0xffffffffffffffff, 0x0, 0x0)
unshare(0x40000000)
fallocate(0xffffffffffffffff, 0x70, 0x0, 0x429cacbd)
r2 = gettid()
tkill(r2, 0x3c)
write$P9_RGETLOCK(r0, &(0x7f0000000140)={0x1e, 0x37, 0x1, {0x2, 0x6c5d, 0x80000000, r2}}, 0x1e)
write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x6f, 0x1, {0x3, [{0x10, 0x2, 0x7}, {0x20, 0x2, 0x1}, {0x4, 0x2, 0x6}]}}, 0x30)
sched_setattr(0x0, 0x0, 0x0)
fstat(r0, &(0x7f0000003a40))
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x402000, 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000200)=0x9)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0)

[  150.648060][ T9276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  150.658107][ T9276] Call Trace:
[  150.661397][ T9276]  dump_stack+0x1b0/0x228
[  150.665731][ T9276]  ? devkmsg_release+0x127/0x127
[  150.670662][ T9276]  ? show_regs_print_info+0x18/0x18
[  150.675855][ T9276]  ? do_syscall_64+0xc0/0x100
[  150.678220][ T9277] SELinux:  unable to allocate memory for policydb string of length 8
[  150.680526][ T9276]  ? stack_trace_save+0x111/0x1e0
[  150.680537][ T9276]  should_fail+0x6fb/0x860
[  150.680546][ T9276]  ? setup_fault_attr+0x2b0/0x2b0
[  150.680556][ T9276]  ? ksys_mount+0xe2/0x100
[  150.680563][ T9276]  ? should_fail+0x182/0x860
[  150.680571][ T9276]  ? __kasan_kmalloc+0x179/0x1b0
[  150.680579][ T9276]  __should_failslab+0x11a/0x160
[  150.680592][ T9276]  ? __d_alloc+0x2d/0x6d0
[  150.726196][ T9276]  should_failslab+0x9/0x20
[  150.730684][ T9276]  kmem_cache_alloc+0x37/0x2b0
[  150.735441][ T9276]  __d_alloc+0x2d/0x6d0
[  150.739591][ T9276]  ? ktime_get_coarse_real_ts64+0xf3/0x110
[  150.745399][ T9276]  d_alloc_pseudo+0x1d/0x70
[  150.749886][ T9276]  alloc_file_pseudo+0x128/0x310
[  150.754935][ T9276]  ? alloc_empty_file_noaccount+0x80/0x80
[  150.760644][ T9276]  ? __kasan_check_write+0x14/0x20
[  150.765734][ T9276]  ? clear_nlink+0x87/0xe0
[  150.770131][ T9276]  __shmem_file_setup+0x1a2/0x280
[  150.775145][ T9276]  shmem_file_setup+0x2f/0x40
[  150.779810][ T9276]  __se_sys_memfd_create+0x215/0x3e0
[  150.785075][ T9276]  __x64_sys_memfd_create+0x5b/0x70
[  150.790255][ T9276]  do_syscall_64+0xc0/0x100
[  150.794754][ T9276]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  150.800682][ T9276] RIP: 0033:0x45b349
[  150.804649][ T9276] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  150.824336][ T9276] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  150.832737][ T9276] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349
[  150.840698][ T9276] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
15:47:18 executing program 0 (fault-call:1 fault-nth:30):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:18 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x346)

15:47:18 executing program 5 (fault-call:2 fault-nth:4):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  150.848668][ T9276] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
[  150.856626][ T9276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  150.864600][ T9276] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000003
[  150.882593][ T9277] SELinux: failed to load policy
[  150.939887][ T9308] FAULT_INJECTION: forcing a failure.
[  150.939887][ T9308] name failslab, interval 1, probability 0, space 0, times 0
[  150.954472][ T9308] CPU: 0 PID: 9308 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  150.964664][ T9308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  150.974717][ T9308] Call Trace:
[  150.978007][ T9308]  dump_stack+0x1b0/0x228
[  150.982390][ T9308]  ? devkmsg_release+0x127/0x127
[  150.987329][ T9308]  ? _raw_spin_lock+0xa1/0x170
[  150.990756][ T9312] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  150.992090][ T9308]  ? show_regs_print_info+0x18/0x18
[  150.992101][ T9308]  ? should_fail+0x182/0x860
[  150.992109][ T9308]  ? should_fail+0x182/0x860
[  150.992128][ T9308]  ? setup_fault_attr+0x2b0/0x2b0
[  151.019032][ T9308]  should_fail+0x6fb/0x860
[  151.023445][ T9308]  ? setup_fault_attr+0x2b0/0x2b0
[  151.028464][ T9308]  ? __should_failslab+0x11a/0x160
[  151.033568][ T9308]  ? hashtab_create+0x117/0x3f0
[  151.038411][ T9308]  __should_failslab+0x11a/0x160
[  151.043343][ T9308]  ? policydb_read+0x9ab/0x77f0
[  151.048186][ T9308]  should_failslab+0x9/0x20
[  151.052670][ T9308]  kmem_cache_alloc_trace+0x3a/0x2f0
[  151.057949][ T9308]  policydb_read+0x9ab/0x77f0
[  151.062800][ T9308]  ? __kasan_check_write+0x14/0x20
[  151.067899][ T9308]  ? _raw_spin_trylock_bh+0x190/0x190
[  151.073249][ T9308]  ? new_slab+0x21b/0x430
[  151.077567][ T9308]  ? string_to_av_perm+0x1c0/0x1c0
[  151.082680][ T9308]  ? security_load_policy+0x1af/0xfd0
[  151.088040][ T9308]  ? kasan_kmalloc+0x9/0x10
[  151.092527][ T9308]  ? kmem_cache_alloc_trace+0xe2/0x2f0
[  151.097976][ T9308]  security_load_policy+0x228/0xfd0
[  151.103162][ T9308]  ? _raw_spin_lock+0xa1/0x170
[  151.107919][ T9308]  ? _raw_spin_trylock_bh+0x190/0x190
[  151.113295][ T9308]  ? security_change_sid+0x50/0x50
[  151.118389][ T9308]  ? vmap_page_range_noflush+0x67b/0x6a0
[  151.123999][ T9308]  ? __vmalloc_node_range+0x56c/0x760
[  151.129362][ T9308]  ? __kasan_check_write+0x14/0x20
[  151.134476][ T9308]  ? _copy_from_user+0xa8/0xe0
[  151.139231][ T9308]  sel_write_load+0x24e/0x410
[  151.143887][ T9308]  ? sel_make_policy_nodes+0x19f0/0x19f0
[  151.149520][ T9308]  __vfs_write+0xff/0x700
[  151.153841][ T9308]  ? __kernel_write+0x350/0x350
[  151.158680][ T9308]  ? avc_policy_seqno+0x1b/0x70
[  151.163511][ T9308]  ? selinux_file_permission+0x2ba/0x560
[  151.169144][ T9308]  ? security_file_permission+0x157/0x350
[  151.174871][ T9308]  ? rw_verify_area+0x1c2/0x360
[  151.179717][ T9308]  vfs_write+0x203/0x4e0
[  151.183960][ T9308]  ksys_write+0x168/0x2a0
[  151.188274][ T9308]  ? __ia32_sys_read+0x90/0x90
[  151.193031][ T9308]  ? __kasan_check_read+0x11/0x20
[  151.198044][ T9308]  ? __ia32_sys_clock_settime+0x230/0x230
[  151.203746][ T9308]  __x64_sys_write+0x7b/0x90
[  151.208314][ T9308]  do_syscall_64+0xc0/0x100
[  151.212824][ T9308]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  151.218706][ T9308] RIP: 0033:0x45b349
[  151.222588][ T9308] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  151.242182][ T9308] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  151.250576][ T9308] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349
[  151.258641][ T9308] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003
[  151.266597][ T9308] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  151.274923][ T9308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  151.282881][ T9308] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001e
[  151.316891][ T9308] SELinux:  unable to allocate memory for policydb string of length 8
[  151.325546][ T9318] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  151.338066][ T9323] FAULT_INJECTION: forcing a failure.
[  151.338066][ T9323] name failslab, interval 1, probability 0, space 0, times 0
[  151.350838][ T9323] CPU: 1 PID: 9323 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  151.360899][ T9323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  151.370952][ T9323] Call Trace:
[  151.374246][ T9323]  dump_stack+0x1b0/0x228
[  151.378583][ T9323]  ? devkmsg_release+0x127/0x127
[  151.383510][ T9323]  ? new_inode+0x28/0x1c0
[  151.387941][ T9323]  ? show_regs_print_info+0x18/0x18
[  151.393141][ T9323]  ? path_openat+0x1e1a/0x3c00
[  151.398016][ T9323]  ? do_sys_open+0x36f/0x7a0
[  151.398177][ T9308] SELinux: failed to load policy
[  151.402591][ T9323]  ? __x64_sys_open+0x87/0x90
[  151.402603][ T9323]  should_fail+0x6fb/0x860
15:47:18 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r3, &(0x7f0000000200), 0x806000)
ftruncate(r1, 0xff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$EXT4_IOC_MIGRATE(r5, 0x6609)
write$cgroup_int(r1, &(0x7f0000000200), 0x806000)

15:47:18 executing program 0 (fault-call:1 fault-nth:31):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:18 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x480)

[  151.402611][ T9323]  ? setup_fault_attr+0x2b0/0x2b0
[  151.402621][ T9323]  __should_failslab+0x11a/0x160
[  151.402632][ T9323]  ? context_struct_to_string+0x3b5/0x7f0
[  151.402640][ T9323]  should_failslab+0x9/0x20
[  151.402647][ T9323]  __kmalloc+0x64/0x310
[  151.402660][ T9323]  context_struct_to_string+0x3b5/0x7f0
[  151.446458][ T9323]  ? security_bounded_transition+0x520/0x520
[  151.452422][ T9323]  ? mls_range_isvalid+0x3a8/0x4c0
[  151.457556][ T9323]  context_add_hash+0xf5/0x200
[  151.462336][ T9323]  ? security_sid_to_context_inval+0x50/0x50
[  151.468301][ T9323]  ? mls_context_isvalid+0x9e/0x390
[  151.473480][ T9323]  ? policydb_context_isvalid+0x1d5/0x430
[  151.479176][ T9323]  security_compute_sid+0x1147/0x1be0
[  151.484537][ T9323]  ? security_transition_sid+0x90/0x90
[  151.489975][ T9323]  ? stack_trace_save+0x111/0x1e0
[  151.494975][ T9323]  ? __kasan_kmalloc+0x179/0x1b0
[  151.499887][ T9323]  ? __kasan_kmalloc+0x117/0x1b0
[  151.504814][ T9323]  ? kasan_slab_alloc+0xe/0x10
[  151.509608][ T9323]  ? kmem_cache_alloc+0x120/0x2b0
[  151.514736][ T9323]  ? __d_alloc+0x2d/0x6d0
[  151.519045][ T9323]  ? d_alloc_pseudo+0x1d/0x70
[  151.523714][ T9323]  ? alloc_file_pseudo+0x128/0x310
[  151.528806][ T9323]  ? __shmem_file_setup+0x1a2/0x280
[  151.533993][ T9323]  ? shmem_file_setup+0x2f/0x40
[  151.538832][ T9323]  ? new_inode_pseudo+0x68/0x240
[  151.543754][ T9323]  ? new_inode+0x28/0x1c0
[  151.548107][ T9323]  ? shmem_get_inode+0x114/0x690
[  151.553035][ T9323]  ? __kasan_check_write+0x14/0x20
[  151.558131][ T9323]  ? _raw_spin_lock+0xa1/0x170
[  151.562911][ T9323]  ? _raw_spin_trylock_bh+0x190/0x190
[  151.568270][ T9323]  security_transition_sid+0x7d/0x90
[  151.573545][ T9323]  inode_doinit_with_dentry+0x5e0/0x10e0
[  151.579187][ T9323]  ? sb_finish_set_opts+0x800/0x800
[  151.584365][ T9323]  ? __d_alloc+0x2d/0x6d0
[  151.588682][ T9323]  ? kasan_slab_alloc+0xe/0x10
[  151.593471][ T9323]  ? d_set_d_op+0xfd/0x390
[  151.597868][ T9323]  selinux_d_instantiate+0x27/0x40
[  151.602959][ T9323]  security_d_instantiate+0xa0/0x100
[  151.608275][ T9323]  d_instantiate+0x55/0x90
[  151.612669][ T9323]  alloc_file_pseudo+0x24a/0x310
[  151.617592][ T9323]  ? alloc_empty_file_noaccount+0x80/0x80
[  151.623298][ T9323]  ? __kasan_check_write+0x14/0x20
[  151.628447][ T9323]  ? clear_nlink+0x87/0xe0
[  151.632953][ T9323]  __shmem_file_setup+0x1a2/0x280
[  151.637999][ T9323]  shmem_file_setup+0x2f/0x40
[  151.642664][ T9323]  __se_sys_memfd_create+0x215/0x3e0
[  151.647931][ T9323]  __x64_sys_memfd_create+0x5b/0x70
[  151.653233][ T9323]  do_syscall_64+0xc0/0x100
[  151.657718][ T9323]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  151.663636][ T9323] RIP: 0033:0x45b349
[  151.667515][ T9323] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  151.687796][ T9323] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  151.696182][ T9323] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349
[  151.704130][ T9323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
15:47:19 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  151.712081][ T9323] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
[  151.720024][ T9323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  151.727976][ T9323] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000004
15:47:19 executing program 4:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c)
getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54)
syz_read_part_table(0x80044, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffff8500e931190000000000004000ffffffbf000000e100000088770072003007000500000000000000008000da55aa", 0x40, 0x1c0}])

15:47:19 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:19 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x500)

[  151.769199][ T9323] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  151.803935][ T9341] SELinux: ebitmap: truncated map
[  151.813302][ T9341] SELinux: failed to load policy
15:47:19 executing program 5 (fault-call:2 fault-nth:5):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:19 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x600)

15:47:19 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8c037cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  151.871224][ T9345] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  151.899867][ T9358] SELinux: ebitmap: truncated map
[  151.905461][ T9358] SELinux: failed to load policy
[  151.963144][ T9361] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  151.971377][ T9371] FAULT_INJECTION: forcing a failure.
[  151.971377][ T9371] name failslab, interval 1, probability 0, space 0, times 0
[  151.985062][ T9371] CPU: 0 PID: 9371 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  151.995135][ T9371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  152.005181][ T9371] Call Trace:
[  152.008471][ T9371]  dump_stack+0x1b0/0x228
[  152.012820][ T9371]  ? devkmsg_release+0x127/0x127
[  152.017750][ T9371]  ? show_regs_print_info+0x18/0x18
[  152.022929][ T9371]  ? new_inode+0x28/0x1c0
[  152.027239][ T9371]  ? shmem_get_inode+0x114/0x690
[  152.032157][ T9371]  should_fail+0x6fb/0x860
[  152.036552][ T9371]  ? setup_fault_attr+0x2b0/0x2b0
[  152.041567][ T9371]  ? _raw_spin_unlock+0x9/0x20
[  152.046474][ T9371]  ? inode_doinit_with_dentry+0x782/0x10e0
[  152.052363][ T9371]  __should_failslab+0x11a/0x160
[  152.057294][ T9371]  ? __alloc_file+0x29/0x3b0
[  152.061877][ T9371]  should_failslab+0x9/0x20
[  152.066374][ T9371]  kmem_cache_alloc+0x37/0x2b0
[  152.071130][ T9371]  ? _raw_spin_trylock_bh+0x190/0x190
[  152.076499][ T9371]  __alloc_file+0x29/0x3b0
[  152.080896][ T9371]  ? alloc_empty_file+0x4c/0x1b0
[  152.085826][ T9371]  alloc_empty_file+0xac/0x1b0
[  152.090569][ T9371]  alloc_file+0x5b/0x4b0
[  152.094808][ T9371]  ? _raw_spin_unlock+0x9/0x20
[  152.099571][ T9371]  alloc_file_pseudo+0x25b/0x310
[  152.104502][ T9371]  ? alloc_empty_file_noaccount+0x80/0x80
[  152.110320][ T9371]  ? __kasan_check_write+0x14/0x20
[  152.115406][ T9371]  ? clear_nlink+0x87/0xe0
[  152.119800][ T9371]  __shmem_file_setup+0x1a2/0x280
[  152.124827][ T9371]  shmem_file_setup+0x2f/0x40
[  152.129494][ T9371]  __se_sys_memfd_create+0x215/0x3e0
[  152.134772][ T9371]  __x64_sys_memfd_create+0x5b/0x70
[  152.139961][ T9371]  do_syscall_64+0xc0/0x100
[  152.144456][ T9371]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  152.150331][ T9371] RIP: 0033:0x45b349
[  152.154201][ T9371] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  152.173932][ T9371] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  152.182348][ T9371] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349
[  152.190400][ T9371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  152.198364][ T9371] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
[  152.206325][ T9371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
15:47:19 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000000a45204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:19 executing program 5 (fault-call:2 fault-nth:6):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  152.214300][ T9371] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000005
[  152.222669][ T9375] SELinux:  policydb magic number 0xf97c038c does not match expected magic number 0xf97cff8c
[  152.234932][ T9375] SELinux: failed to load policy
[  152.301588][ T9373]  loop4: p1 p2 < > p3 p4 < p5 p6 >
[  152.306945][ T9373] loop4: p1 size 11290111 extends beyond EOD, truncated
[  152.327116][ T9373] loop4: p3 size 1912633224 extends beyond EOD, truncated
[  152.337832][ T9373] loop4: p5 size 11290111 extends beyond EOD, truncated
[  152.345647][ T9389] SELinux:  policydb string 
[  152.345647][ T9389] E Linux does not match my string SE Linux
[  152.357423][ T9373] loop4: p6 size 1912633224 extends beyond EOD, truncated
[  152.365125][ T9390] FAULT_INJECTION: forcing a failure.
[  152.365125][ T9390] name failslab, interval 1, probability 0, space 0, times 0
[  152.365562][ T9389] SELinux: failed to load policy
[  152.383386][ T9390] CPU: 0 PID: 9390 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
15:47:19 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x700)

15:47:19 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  152.393547][ T9390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  152.403703][ T9390] Call Trace:
[  152.407005][ T9390]  dump_stack+0x1b0/0x228
[  152.411338][ T9390]  ? devkmsg_release+0x127/0x127
[  152.416276][ T9390]  ? alloc_file_pseudo+0x128/0x310
[  152.421400][ T9390]  ? show_regs_print_info+0x18/0x18
[  152.426692][ T9390]  should_fail+0x6fb/0x860
[  152.431111][ T9390]  ? setup_fault_attr+0x2b0/0x2b0
[  152.436149][ T9390]  ? should_fail+0x182/0x860
[  152.440745][ T9390]  ? setup_fault_attr+0x2b0/0x2b0
[  152.445763][ T9390]  __should_failslab+0x11a/0x160
[  152.450693][ T9390]  ? security_file_alloc+0x36/0x210
[  152.455890][ T9390]  should_failslab+0x9/0x20
[  152.460395][ T9390]  kmem_cache_alloc+0x37/0x2b0
[  152.465160][ T9390]  security_file_alloc+0x36/0x210
[  152.470182][ T9390]  __alloc_file+0xd2/0x3b0
[  152.474599][ T9390]  alloc_empty_file+0xac/0x1b0
[  152.479373][ T9390]  alloc_file+0x5b/0x4b0
[  152.483608][ T9390]  ? _raw_spin_unlock+0x9/0x20
[  152.488403][ T9390]  alloc_file_pseudo+0x25b/0x310
[  152.493332][ T9390]  ? alloc_empty_file_noaccount+0x80/0x80
[  152.499042][ T9390]  ? __kasan_check_write+0x14/0x20
[  152.504252][ T9390]  ? clear_nlink+0x87/0xe0
[  152.508661][ T9390]  __shmem_file_setup+0x1a2/0x280
[  152.513701][ T9390]  shmem_file_setup+0x2f/0x40
[  152.518395][ T9390]  __se_sys_memfd_create+0x215/0x3e0
[  152.523678][ T9390]  __x64_sys_memfd_create+0x5b/0x70
[  152.528885][ T9390]  do_syscall_64+0xc0/0x100
[  152.533402][ T9390]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  152.539310][ T9390] RIP: 0033:0x45b349
[  152.543198][ T9390] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  152.562814][ T9390] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  152.571426][ T9390] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349
[  152.579681][ T9390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8
[  152.587638][ T9390] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001
15:47:20 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000002545204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  152.595685][ T9390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  152.603664][ T9390] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000006
[  152.634674][   T22] kauditd_printk_skb: 188 callbacks suppressed
[  152.634683][   T22] audit: type=1326 audit(1580485640.116:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  152.671137][ T9396] print_req_error: 23 callbacks suppressed
[  152.671148][ T9396] blk_update_request: I/O error, dev loop4, sector 10 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[  152.675727][ T9399] blk_update_request: I/O error, dev loop4, sector 225 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
15:47:20 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x900)

[  152.683518][  T183] blk_update_request: I/O error, dev loop4, sector 10 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  152.701534][   T22] audit: type=1326 audit(1580485640.116:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  152.713465][  T183] buffer_io_error: 20 callbacks suppressed
[  152.713471][  T183] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  152.753426][  T183] blk_update_request: I/O error, dev loop4, sector 225 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  152.763920][   T22] audit: type=1326 audit(1580485640.116:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  152.764646][  T183] Buffer I/O error on dev loop4p6, logical block 0, async page read
[  152.794868][ T9412] SELinux:  policydb string %E Linux does not match my string SE Linux
[  152.799855][  T183] blk_update_request: I/O error, dev loop4, sector 12 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  152.809576][ T9412] SELinux: failed to load policy
[  152.819327][  T183] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  152.831132][   T22] audit: type=1326 audit(1580485640.116:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  152.834130][  T183] blk_update_request: I/O error, dev loop4, sector 14 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  152.864897][   T22] audit: type=1326 audit(1580485640.126:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  152.877221][  T183] Buffer I/O error on dev loop4p1, logical block 2, async page read
[  152.904400][   T22] audit: type=1326 audit(1580485640.126:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  152.911339][  T183] blk_update_request: I/O error, dev loop4, sector 16 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  152.937141][   T22] audit: type=1326 audit(1580485640.126:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  152.947689][  T183] Buffer I/O error on dev loop4p1, logical block 3, async page read
[  152.973518][   T22] audit: type=1326 audit(1580485640.126:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  152.981092][  T183] blk_update_request: I/O error, dev loop4, sector 226 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  153.008299][   T22] audit: type=1326 audit(1580485640.126:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=72 compat=0 ip=0x45b349 code=0x7ffc0000
[  153.017589][  T183] Buffer I/O error on dev loop4p6, logical block 1, async page read
[  153.043268][   T22] audit: type=1326 audit(1580485640.126:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  153.050942][  T183] blk_update_request: I/O error, dev loop4, sector 227 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  153.087365][  T183] Buffer I/O error on dev loop4p6, logical block 2, async page read
[  153.095464][  T183] blk_update_request: I/O error, dev loop4, sector 228 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  153.106587][  T183] Buffer I/O error on dev loop4p6, logical block 3, async page read
[  153.114665][  T183] Buffer I/O error on dev loop4p6, logical block 4, async page read
[  153.122798][  T183] Buffer I/O error on dev loop4p6, logical block 5, async page read
15:47:20 executing program 5 (fault-call:2 fault-nth:7):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:20 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000280))
r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00')
r2 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = dup(r3)
getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', <r6=>0x0})
r7 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
r9 = dup(r8)
getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, <r10=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', <r11=>r10})
r12 = socket$unix(0x1, 0x2, 0x0)
r13 = fcntl$dupfd(r12, 0x0, r12)
ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200)
getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f00000012c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000013c0)=0xe8)
r15 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r16=>0xffffffffffffffff})
r17 = dup(r16)
getsockname$packet(r17, &(0x7f00000000c0)={0x11, 0x0, <r18=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r15, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="3800000013000100"/20, @ANYRES32=r18, @ANYBLOB="0000418010000900"/24], 0x38}}, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001400)={'team0\x00', <r19=>0x0})
r20 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r21=>0xffffffffffffffff})
r22 = dup(r21)
getsockname$packet(r22, &(0x7f00000000c0)={0x11, 0x0, <r23=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r20, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001480)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x1, {0x43, 0x1}}, @l2tp={0x2, 0x0, @broadcast, 0x1}, @xdp={0x2c, 0x2, <r24=>r23, 0x1e}, 0x3f, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001440)='ip6tnl0\x00', 0x1f, 0xf78, 0x6})
getsockname$packet(r0, &(0x7f0000001500)={0x11, 0x0, <r25=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001540)=0x14)
r26 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r27=>0xffffffffffffffff})
r28 = dup(r27)
getsockname$packet(r28, &(0x7f00000000c0)={0x11, 0x0, <r29=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r26, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r29}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001880)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001840)={&(0x7f00000004c0)={0x294, r1, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xd3}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x43be}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r14}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r25}}}]}}, {{0x8, 0x1, r29}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}]}, 0x294}, 0x1, 0x0, 0x0, 0x85}, 0x4000)
getdents64(r0, &(0x7f00000000c0)=""/183, 0xb7)

15:47:20 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080200005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  153.152373][ T9373] __loop_clr_fd: partition scan of loop4 failed (rc=-16)
15:47:20 executing program 4:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = dup(r3)
getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x7, 0x5})
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x5, &(0x7f0000000080)=@raw=[@generic={0x81, 0xb, 0x7, 0x1, 0x9}, @exit, @map={0x18, 0x7, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x4f}], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x3, [], r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xbc72c58b}, 0x10, 0x0, r7}, 0x78)

[  153.195015][ T9406] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  153.222386][ T9420] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
15:47:20 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:20 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xa00)

[  153.271298][ T9428] SELinux:  policydb string length 520 does not match expected length 8
[  153.289746][ T9429] FAULT_INJECTION: forcing a failure.
[  153.289746][ T9429] name failslab, interval 1, probability 0, space 0, times 0
[  153.294484][ T9433] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
[  153.314816][ T9428] SELinux: failed to load policy
[  153.328121][ T9429] CPU: 1 PID: 9429 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  153.338306][ T9429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  153.348352][ T9429] Call Trace:
[  153.351692][ T9429]  dump_stack+0x1b0/0x228
[  153.356112][ T9429]  ? devkmsg_release+0x127/0x127
[  153.361044][ T9429]  ? show_regs_print_info+0x18/0x18
[  153.366221][ T9429]  ? memset+0x31/0x40
[  153.370187][ T9429]  should_fail+0x6fb/0x860
[  153.374592][ T9429]  ? setup_fault_attr+0x2b0/0x2b0
[  153.379608][ T9429]  ? __fsnotify_parent+0x300/0x300
[  153.384703][ T9429]  __should_failslab+0x11a/0x160
[  153.389728][ T9429]  ? getname_flags+0xba/0x640
[  153.394387][ T9429]  should_failslab+0x9/0x20
[  153.398879][ T9429]  kmem_cache_alloc+0x37/0x2b0
[  153.403663][ T9429]  getname_flags+0xba/0x640
[  153.408169][ T9429]  getname+0x19/0x20
[  153.412062][ T9429]  do_sys_open+0x32a/0x7a0
[  153.416476][ T9429]  ? file_open_root+0x440/0x440
[  153.421307][ T9429]  ? __kasan_check_read+0x11/0x20
[  153.426312][ T9429]  __x64_sys_open+0x87/0x90
[  153.430798][ T9429]  do_syscall_64+0xc0/0x100
[  153.435299][ T9429]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  153.441219][ T9429] RIP: 0033:0x4150e1
[  153.445090][ T9429] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  153.464672][ T9429] RSP: 002b:00007fa4f22dba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
15:47:21 executing program 4:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x72, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000040)=""/114}, &(0x7f0000000140)=0x78)
r3 = dup(r0)
close(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getitimer(0x1, &(0x7f0000000180))

15:47:21 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001})
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)
r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
write$P9_RREADDIR(r5, &(0x7f0000000040)={0x2a, 0x29, 0x1, {0x1, [{{0x4, 0x4, 0x6}, 0x3, 0xff, 0x7, './file0'}]}}, 0x2a)
r6 = dup3(r2, r3, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0300580010002c00000060d2b402ac6f3a0000000000000000000000000001000000ff020000000000000000000000000001040000000000000000000000000000007c0f897c00"/98], 0xfdef)

[  153.473109][ T9429] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 00000000004150e1
[  153.481064][ T9429] RDX: 00007fa4f22dbb0a RSI: 0000000000000002 RDI: 00007fa4f22dbb00
[  153.489074][ T9429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a
[  153.497054][ T9429] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004
[  153.505021][ T9429] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000007
15:47:21 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080300005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:21 executing program 5 (fault-call:2 fault-nth:8):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:21 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xb00)

15:47:21 executing program 4:
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'veth1_virt_wifi\x00', {0x3}, 0x800})
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/434], &(0x7f0000000140)='GPL\x00'}, 0x48)
r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r3 = dup(r2)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x2, 0xe, 0x0, &(0x7f0000001140)="afa55ea5081d1dc7610da2290f9e", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  153.551995][ T9442] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  153.568401][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  153.623463][ T9464] SELinux:  policydb string length 776 does not match expected length 8
[  153.636311][ T9462] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  153.644334][ T9467] FAULT_INJECTION: forcing a failure.
[  153.644334][ T9467] name failslab, interval 1, probability 0, space 0, times 0
[  153.646712][ T9464] SELinux: failed to load policy
[  153.658044][ T9467] CPU: 1 PID: 9467 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
15:47:21 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080400005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  153.663461][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  153.672202][ T9467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  153.672207][ T9467] Call Trace:
[  153.672228][ T9467]  dump_stack+0x1b0/0x228
[  153.672238][ T9467]  ? devkmsg_release+0x127/0x127
[  153.672246][ T9467]  ? show_regs_print_info+0x18/0x18
[  153.672257][ T9467]  should_fail+0x6fb/0x860
[  153.672265][ T9467]  ? setup_fault_attr+0x2b0/0x2b0
[  153.672272][ T9467]  ? __rcu_read_lock+0x50/0x50
[  153.672282][ T9467]  __should_failslab+0x11a/0x160
[  153.672289][ T9467]  ? __alloc_file+0x29/0x3b0
[  153.672296][ T9467]  should_failslab+0x9/0x20
[  153.672305][ T9467]  kmem_cache_alloc+0x37/0x2b0
[  153.672313][ T9467]  ? is_bpf_text_address+0x2c8/0x2e0
[  153.672319][ T9467]  __alloc_file+0x29/0x3b0
[  153.672325][ T9467]  ? alloc_empty_file+0x4c/0x1b0
[  153.672332][ T9467]  alloc_empty_file+0xac/0x1b0
[  153.672340][ T9467]  path_openat+0x122/0x3c00
[  153.672346][ T9467]  ? stack_trace_save+0x111/0x1e0
[  153.672359][ T9467]  ? stack_trace_snprint+0x150/0x150
[  153.774436][ T9467]  ? unwind_get_return_address+0x4c/0x90
[  153.780054][ T9467]  ? __kasan_kmalloc+0x179/0x1b0
[  153.784970][ T9467]  ? do_filp_open+0x430/0x430
[  153.789631][ T9467]  ? getname_flags+0xba/0x640
[  153.794313][ T9467]  ? getname+0x19/0x20
[  153.798384][ T9467]  ? do_sys_open+0x32a/0x7a0
[  153.803086][ T9467]  ? __x64_sys_open+0x87/0x90
[  153.807741][ T9467]  ? do_syscall_64+0xc0/0x100
[  153.812409][ T9467]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  153.818455][ T9467]  ? avc_has_perm_noaudit+0x3f0/0x3f0
[  153.823805][ T9467]  ? should_fail+0x182/0x860
[  153.828388][ T9467]  ? memset+0x31/0x40
[  153.832351][ T9467]  ? fsnotify+0x1389/0x1450
[  153.836853][ T9467]  ? expand_files+0xd1/0x970
[  153.841428][ T9467]  do_filp_open+0x1f7/0x430
[  153.845914][ T9467]  ? vfs_tmpfile+0x230/0x230
[  153.850483][ T9467]  ? __kasan_check_write+0x14/0x20
[  153.855569][ T9467]  ? _raw_spin_lock+0xa1/0x170
[  153.860311][ T9467]  ? _raw_spin_trylock_bh+0x190/0x190
[  153.865659][ T9467]  ? __kasan_check_read+0x11/0x20
[  153.870660][ T9467]  ? __check_object_size+0x309/0x3d0
[  153.875923][ T9467]  ? _raw_spin_unlock+0x9/0x20
[  153.880667][ T9467]  ? get_unused_fd_flags+0x97/0xb0
[  153.885795][ T9467]  do_sys_open+0x36f/0x7a0
[  153.890209][ T9467]  ? file_open_root+0x440/0x440
[  153.895075][ T9467]  ? __kasan_check_read+0x11/0x20
[  153.900098][ T9467]  __x64_sys_open+0x87/0x90
[  153.904601][ T9467]  do_syscall_64+0xc0/0x100
[  153.909104][ T9467]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  153.914982][ T9467] RIP: 0033:0x4150e1
[  153.918879][ T9467] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  153.938464][ T9467] RSP: 002b:00007fa4f22dba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
[  153.946860][ T9467] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 00000000004150e1
[  153.954812][ T9467] RDX: 00007fa4f22dbb0a RSI: 0000000000000002 RDI: 00007fa4f22dbb00
[  153.962763][ T9467] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a
15:47:21 executing program 5 (fault-call:2 fault-nth:9):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:21 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xc00)

15:47:21 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  153.970713][ T9467] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004
[  153.978684][ T9467] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000008
15:47:21 executing program 3:
r0 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="570c3d1e8de06c5e1169c9cccac18291322f44687d74daf90bfef708c526", 0x1e, 0xfffffffffffffffc)
keyctl$revoke(0x3, r0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'cpu'}]}, 0x5)

15:47:21 executing program 4:
syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000000)={0x64, 0x3, [0x3ff, 0x8001, 0x4, 0x8, 0x81], 0x4})
r3 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
mremap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2002, 0x3, &(0x7f0000009000/0x2000)=nil)

15:47:21 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xd00)

15:47:21 executing program 3:
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0})
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

[  154.063302][ T9487] SELinux:  policydb string length 1032 does not match expected length 8
[  154.081708][ T9486] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  154.101823][ T9487] SELinux: failed to load policy
15:47:21 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080500005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:21 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
close(r2)
socket$netlink(0x10, 0x3, 0x0)
r5 = socket$unix(0x1, 0x1, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
sendmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="5500000018007f5f00fe01b2a4a29093020600000000ff", 0x17}], 0x1}, 0x800)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x4ffdd, 0x0)

[  154.117662][ T9500] FAULT_INJECTION: forcing a failure.
[  154.117662][ T9500] name failslab, interval 1, probability 0, space 0, times 0
[  154.130761][ T9500] CPU: 1 PID: 9500 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  154.140827][ T9500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  154.150872][ T9500] Call Trace:
[  154.154153][ T9500]  dump_stack+0x1b0/0x228
[  154.158471][ T9500]  ? devkmsg_release+0x127/0x127
[  154.163412][ T9500]  ? show_regs_print_info+0x18/0x18
[  154.168610][ T9500]  should_fail+0x6fb/0x860
[  154.173025][ T9500]  ? setup_fault_attr+0x2b0/0x2b0
[  154.178035][ T9500]  ? should_fail+0x182/0x860
[  154.182625][ T9500]  ? __read_once_size_nocheck+0x10/0x10
[  154.188152][ T9500]  ? unwind_next_frame+0x415/0x870
[  154.193268][ T9500]  ? setup_fault_attr+0x2b0/0x2b0
[  154.198286][ T9500]  __should_failslab+0x11a/0x160
[  154.203223][ T9500]  ? security_file_alloc+0x36/0x210
[  154.209369][ T9500]  should_failslab+0x9/0x20
[  154.214142][ T9500]  kmem_cache_alloc+0x37/0x2b0
[  154.221631][ T9500]  security_file_alloc+0x36/0x210
[  154.227019][ T9500]  __alloc_file+0xd2/0x3b0
[  154.231607][ T9500]  alloc_empty_file+0xac/0x1b0
[  154.236897][ T9500]  path_openat+0x122/0x3c00
[  154.241411][ T9500]  ? stack_trace_save+0x111/0x1e0
[  154.246442][ T9500]  ? stack_trace_snprint+0x150/0x150
[  154.253152][ T9500]  ? unwind_get_return_address+0x4c/0x90
[  154.259489][ T9500]  ? __kasan_kmalloc+0x179/0x1b0
[  154.264416][ T9500]  ? do_filp_open+0x430/0x430
[  154.269104][ T9500]  ? getname_flags+0xba/0x640
[  154.274454][ T9500]  ? getname+0x19/0x20
[  154.278698][ T9500]  ? do_sys_open+0x32a/0x7a0
[  154.287994][ T9500]  ? __x64_sys_open+0x87/0x90
[  154.292776][ T9500]  ? do_syscall_64+0xc0/0x100
[  154.297715][ T9500]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  154.305526][ T9500]  ? avc_has_perm_noaudit+0x3f0/0x3f0
[  154.310901][ T9500]  ? should_fail+0x182/0x860
[  154.315585][ T9500]  ? memset+0x31/0x40
[  154.319920][ T9500]  ? fsnotify+0x1389/0x1450
[  154.324438][ T9500]  ? expand_files+0xd1/0x970
[  154.329272][ T9500]  do_filp_open+0x1f7/0x430
[  154.334373][ T9500]  ? vfs_tmpfile+0x230/0x230
[  154.341835][ T9500]  ? __kasan_check_write+0x14/0x20
[  154.347239][ T9500]  ? _raw_spin_lock+0xa1/0x170
[  154.351999][ T9500]  ? _raw_spin_trylock_bh+0x190/0x190
[  154.357446][ T9500]  ? __kasan_check_read+0x11/0x20
[  154.362640][ T9500]  ? __check_object_size+0x309/0x3d0
[  154.367986][ T9500]  ? _raw_spin_unlock+0x9/0x20
[  154.372854][ T9500]  ? get_unused_fd_flags+0x97/0xb0
[  154.377949][ T9500]  do_sys_open+0x36f/0x7a0
[  154.382367][ T9500]  ? file_open_root+0x440/0x440
[  154.388498][ T9500]  ? __kasan_check_read+0x11/0x20
[  154.393497][ T9500]  __x64_sys_open+0x87/0x90
[  154.397972][ T9500]  do_syscall_64+0xc0/0x100
[  154.402579][ T9500]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  154.408464][ T9500] RIP: 0033:0x4150e1
[  154.412347][ T9500] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  154.431941][ T9500] RSP: 002b:00007fa4f22dba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
[  154.440355][ T9500] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 00000000004150e1
[  154.448317][ T9500] RDX: 00007fa4f22dbb0a RSI: 0000000000000002 RDI: 00007fa4f22dbb00
[  154.456274][ T9500] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a
15:47:21 executing program 5 (fault-call:2 fault-nth:10):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  154.464233][ T9500] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004
[  154.472181][ T9500] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000009
15:47:22 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xe00)

[  154.512585][ T9505] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  154.548645][ T9521] SELinux:  policydb string length 1288 does not match expected length 8
[  154.558073][ T9521] SELinux: failed to load policy
[  154.560550][ T9513] FAULT_INJECTION: forcing a failure.
[  154.560550][ T9513] name failslab, interval 1, probability 0, space 0, times 0
[  154.576405][ T9513] CPU: 1 PID: 9513 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  154.586478][ T9513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  154.596519][ T9513] Call Trace:
[  154.599800][ T9513]  dump_stack+0x1b0/0x228
[  154.604109][ T9513]  ? devkmsg_release+0x127/0x127
[  154.609046][ T9513]  ? show_regs_print_info+0x18/0x18
[  154.614252][ T9513]  ? __kasan_check_read+0x11/0x20
[  154.619276][ T9513]  ? update_curr+0x176/0x8c0
[  154.623858][ T9513]  should_fail+0x6fb/0x860
[  154.628283][ T9513]  ? setup_fault_attr+0x2b0/0x2b0
[  154.633301][ T9513]  ? __kasan_check_write+0x14/0x20
[  154.638396][ T9513]  ? kobject_get_unless_zero+0x1c8/0x2a0
[  154.644027][ T9513]  __should_failslab+0x11a/0x160
[  154.648943][ T9513]  ? __kthread_create_on_node+0x142/0x470
[  154.654738][ T9513]  should_failslab+0x9/0x20
[  154.659241][ T9513]  kmem_cache_alloc_trace+0x3a/0x2f0
[  154.664503][ T9513]  ? __kasan_check_write+0x14/0x20
[  154.669607][ T9513]  ? loop_set_fd+0x1280/0x1280
[  154.674363][ T9513]  __kthread_create_on_node+0x142/0x470
[  154.679895][ T9513]  ? kthread_create_on_node+0x110/0x110
[  154.685437][ T9513]  ? _raw_spin_unlock+0x9/0x20
[  154.690179][ T9513]  ? bd_start_claiming+0x469/0x550
[  154.695271][ T9513]  ? loop_set_fd+0x1280/0x1280
[  154.700117][ T9513]  kthread_create_on_node+0xc6/0x110
[  154.705420][ T9513]  ? tsk_fork_get_node+0x10/0x10
[  154.710346][ T9513]  ? mutex_lock_killable+0x10a/0x120
[  154.715614][ T9513]  ? unwind_next_frame+0x415/0x870
[  154.720732][ T9513]  ? memset+0x31/0x40
[  154.724710][ T9513]  loop_set_fd+0x69d/0x1280
[  154.729207][ T9513]  lo_ioctl+0x17a/0x2340
[  154.733442][ T9513]  ? lo_release+0x1f0/0x1f0
[  154.737929][ T9513]  ? enqueue_task_fair+0x2255/0x24a0
[  154.743201][ T9513]  ? check_preempt_wakeup+0x56a/0xba0
[  154.748561][ T9513]  ? __kasan_check_read+0x11/0x20
[  154.753578][ T9513]  ? ttwu_do_wakeup+0x1dc/0x5d0
[  154.758431][ T9513]  ? __kasan_check_read+0x11/0x20
[  154.763484][ T9513]  ? try_to_wake_up+0x1615/0x2190
[  154.768510][ T9513]  ? cpus_share_cache+0xd0/0xd0
[  154.773342][ T9513]  ? __kasan_check_write+0x14/0x20
[  154.778538][ T9513]  ? _raw_spin_lock+0xa1/0x170
[  154.783399][ T9513]  ? _raw_spin_trylock_bh+0x190/0x190
[  154.788759][ T9513]  ? wake_up_q+0x84/0xb0
[  154.792992][ T9513]  ? __mutex_unlock_slowpath+0x219/0x260
[  154.798619][ T9513]  ? mutex_unlock+0x40/0x40
[  154.803108][ T9513]  ? down_write+0xd8/0x150
[  154.807504][ T9513]  ? up_read+0x10/0x10
[  154.811579][ T9513]  ? disk_unblock_events+0x51/0x60
[  154.816687][ T9513]  ? __blkdev_get+0x125b/0x1b40
[  154.821535][ T9513]  ? __read_once_size_nocheck+0x10/0x10
[  154.827096][ T9513]  ? unwind_next_frame+0x415/0x870
[  154.832186][ T9513]  ? __rcu_read_lock+0x50/0x50
[  154.836936][ T9513]  ? unwind_next_frame+0x415/0x870
[  154.842053][ T9513]  ? unwind_get_return_address_ptr+0xa0/0xa0
[  154.848033][ T9513]  ? is_bpf_text_address+0x2c8/0x2e0
[  154.853297][ T9513]  ? lo_release+0x1f0/0x1f0
[  154.857780][ T9513]  blkdev_ioctl+0x89a/0x2c30
[  154.862366][ T9513]  ? __kernel_text_address+0x9a/0x110
[  154.867747][ T9513]  ? unwind_get_return_address+0x4c/0x90
[  154.873376][ T9513]  ? arch_stack_walk+0x98/0xe0
[  154.878144][ T9513]  ? __blkdev_driver_ioctl+0xc0/0xc0
[  154.883426][ T9513]  ? __rcu_read_lock+0x50/0x50
[  154.888188][ T9513]  ? stack_trace_save+0x111/0x1e0
[  154.893217][ T9513]  ? avc_has_extended_perms+0xb27/0x10d0
[  154.898846][ T9513]  ? __kasan_slab_free+0x1e2/0x220
[  154.903949][ T9513]  ? __kasan_slab_free+0x168/0x220
[  154.909038][ T9513]  ? kasan_slab_free+0xe/0x10
[  154.913711][ T9513]  ? kmem_cache_free+0x181/0x7a0
[  154.918628][ T9513]  ? avc_ss_reset+0x3e0/0x3e0
[  154.923297][ T9513]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  154.929363][ T9513]  ? should_fail+0x182/0x860
[  154.933946][ T9513]  ? memset+0x31/0x40
[  154.937916][ T9513]  ? fsnotify+0x1389/0x1450
[  154.942414][ T9513]  ? expand_files+0xd1/0x970
[  154.947007][ T9513]  ? do_filp_open+0x2e1/0x430
[  154.951678][ T9513]  ? memset+0x31/0x40
[  154.955655][ T9513]  block_ioctl+0xbd/0x100
[  154.959988][ T9513]  ? blkdev_iopoll+0x100/0x100
[  154.964740][ T9513]  do_vfs_ioctl+0x747/0x1700
[  154.969336][ T9513]  ? selinux_file_ioctl+0x6e6/0x930
[  154.974964][ T9513]  ? ioctl_preallocate+0x240/0x240
[  154.980180][ T9513]  ? __fget+0x37c/0x3c0
[  154.984328][ T9513]  ? __kasan_check_write+0x14/0x20
[  154.989436][ T9513]  ? fget_many+0x30/0x30
[  154.993688][ T9513]  ? security_file_ioctl+0xae/0xd0
[  154.998804][ T9513]  __x64_sys_ioctl+0xe3/0x120
[  155.003475][ T9513]  do_syscall_64+0xc0/0x100
[  155.007990][ T9513]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  155.013871][ T9513] RIP: 0033:0x45b1b7
[  155.017754][ T9513] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  155.037438][ T9513] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  155.045847][ T9513] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7
[  155.053823][ T9513] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
15:47:22 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080600005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  155.061807][ T9513] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a
[  155.069781][ T9513] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004
[  155.077757][ T9513] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000a
[  155.087125][ T9523] selinux_nlmsg_perm: 86 callbacks suppressed
[  155.087134][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
15:47:22 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  155.118287][ T9516] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks)
[  155.134714][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
15:47:22 executing program 5 (fault-call:2 fault-nth:11):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  155.156372][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
[  155.171770][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
[  155.185051][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
[  155.209462][ T9535] SELinux:  policydb string length 1544 does not match expected length 8
15:47:22 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x1100)

15:47:22 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080700005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  155.223490][ T9533] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  155.237917][ T9541] FAULT_INJECTION: forcing a failure.
[  155.237917][ T9541] name failslab, interval 1, probability 0, space 0, times 0
[  155.253831][ T9541] CPU: 0 PID: 9541 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  155.263918][ T9541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
15:47:22 executing program 3:
syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
fchdir(r0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=<r1=>0x0)
sched_getaffinity(r1, 0x8, &(0x7f0000000140))
syncfs(r0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x275a, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYRESHEX=r3], 0x12)
fallocate(r3, 0x8, 0x8000, 0x3)
write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac)
r4 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r4, 0x0, r4)
sendfile(r2, r4, &(0x7f0000000040)=0x8, 0x7fffffff)
ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x3f})

[  155.273968][ T9541] Call Trace:
[  155.277249][ T9541]  dump_stack+0x1b0/0x228
[  155.280620][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
[  155.281575][ T9541]  ? devkmsg_release+0x127/0x127
[  155.281587][ T9541]  ? show_regs_print_info+0x18/0x18
[  155.281597][ T9541]  ? __perf_event_task_sched_in+0x4ed/0x550
[  155.281604][ T9541]  ? __kasan_check_read+0x11/0x20
[  155.281613][ T9541]  should_fail+0x6fb/0x860
[  155.281622][ T9541]  ? setup_fault_attr+0x2b0/0x2b0
[  155.281639][ T9541]  ? finish_task_switch+0x2fe/0x560
[  155.295300][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
[  155.299253][ T9541]  __should_failslab+0x11a/0x160
[  155.299263][ T9541]  ? __kernfs_new_node+0xdb/0x6e0
[  155.299272][ T9541]  should_failslab+0x9/0x20
[  155.299280][ T9541]  kmem_cache_alloc+0x37/0x2b0
[  155.299288][ T9541]  __kernfs_new_node+0xdb/0x6e0
[  155.299300][ T9541]  ? kernfs_new_node+0x170/0x170
[  155.304791][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
[  155.310490][ T9541]  ? __kasan_check_read+0x11/0x20
[  155.310498][ T9541]  ? preempt_schedule+0xeb/0x110
[  155.310505][ T9541]  ? schedule_preempt_disabled+0x20/0x20
[  155.310514][ T9541]  ? ___preempt_schedule+0x16/0x20
[  155.310523][ T9541]  kernfs_create_dir_ns+0x9b/0x230
[  155.310532][ T9541]  internal_create_group+0x234/0xe40
[  155.310545][ T9541]  ? __kasan_check_write+0x14/0x20
[  155.310551][ T9541]  ? __kasan_check_write+0x14/0x20
[  155.310556][ T9541]  ? down_write+0xd8/0x150
[  155.310571][ T9541]  ? sysfs_create_group+0x30/0x30
[  155.315830][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
[  155.320036][ T9541]  sysfs_create_group+0x1f/0x30
[  155.320047][ T9541]  loop_set_fd+0xdbd/0x1280
[  155.320057][ T9541]  lo_ioctl+0x17a/0x2340
[  155.320065][ T9541]  ? lo_release+0x1f0/0x1f0
[  155.320076][ T9541]  ? __read_once_size_nocheck+0x10/0x10
[  155.320083][ T9541]  ? unwind_next_frame+0x415/0x870
[  155.320096][ T9541]  ? __rcu_read_lock+0x50/0x50
[  155.325314][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4
[  155.330321][ T9541]  ? unwind_next_frame+0x415/0x870
[  155.330331][ T9541]  ? unwind_get_return_address_ptr+0xa0/0xa0
[  155.330338][ T9541]  ? stack_trace_save+0x1e0/0x1e0
[  155.330347][ T9541]  ? is_bpf_text_address+0x2c8/0x2e0
[  155.330353][ T9541]  ? stack_trace_save+0x1e0/0x1e0
[  155.330361][ T9541]  ? __kasan_check_write+0x14/0x20
[  155.330367][ T9541]  ? kobject_get_unless_zero+0x1c8/0x2a0
[  155.330373][ T9541]  ? kobj_kset_leave+0x3a0/0x3a0
[  155.330386][ T9541]  ? __kasan_check_write+0x14/0x20
[  155.330394][ T9541]  ? mutex_lock+0xa6/0x110
[  155.330408][ T9541]  ? __module_put_and_exit+0x20/0x20
[  155.553393][ T9541]  ? __kasan_check_write+0x14/0x20
[  155.558487][ T9541]  ? __up_read+0x6f/0x1b0
[  155.562813][ T9541]  ? disk_check_events+0x600/0x600
[  155.567917][ T9541]  ? __kasan_check_write+0x14/0x20
[  155.573034][ T9541]  ? up_write+0xa1/0x190
[  155.577412][ T9541]  ? __kasan_check_write+0x14/0x20
[  155.582519][ T9541]  ? down_write+0xd8/0x150
[  155.586935][ T9541]  ? up_read+0x10/0x10
[  155.591016][ T9541]  ? __kasan_check_write+0x14/0x20
[  155.596128][ T9541]  ? disk_unblock_events+0x51/0x60
[  155.601226][ T9541]  ? __blkdev_get+0x125b/0x1b40
[  155.606196][ T9541]  ? __read_once_size_nocheck+0x10/0x10
[  155.611742][ T9541]  ? unwind_next_frame+0x415/0x870
[  155.616957][ T9541]  ? __rcu_read_lock+0x50/0x50
[  155.621695][ T9541]  ? unwind_next_frame+0x415/0x870
[  155.626780][ T9541]  ? unwind_get_return_address_ptr+0xa0/0xa0
[  155.632748][ T9541]  ? is_bpf_text_address+0x2c8/0x2e0
[  155.638201][ T9541]  ? lo_release+0x1f0/0x1f0
[  155.642715][ T9541]  blkdev_ioctl+0x89a/0x2c30
[  155.647288][ T9541]  ? __kernel_text_address+0x9a/0x110
[  155.652649][ T9541]  ? unwind_get_return_address+0x4c/0x90
[  155.658310][ T9541]  ? arch_stack_walk+0x98/0xe0
[  155.663198][ T9541]  ? __blkdev_driver_ioctl+0xc0/0xc0
[  155.668473][ T9541]  ? __rcu_read_lock+0x50/0x50
[  155.673226][ T9541]  ? stack_trace_save+0x111/0x1e0
[  155.678239][ T9541]  ? avc_has_extended_perms+0xb27/0x10d0
[  155.683859][ T9541]  ? __kasan_slab_free+0x1e2/0x220
[  155.688962][ T9541]  ? __kasan_slab_free+0x168/0x220
[  155.694071][ T9541]  ? kasan_slab_free+0xe/0x10
[  155.698747][ T9541]  ? kmem_cache_free+0x181/0x7a0
[  155.703684][ T9541]  ? avc_ss_reset+0x3e0/0x3e0
[  155.708369][ T9541]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  155.714430][ T9541]  ? should_fail+0x182/0x860
[  155.719006][ T9541]  ? memset+0x31/0x40
[  155.722974][ T9541]  ? fsnotify+0x1389/0x1450
[  155.727458][ T9541]  ? expand_files+0xd1/0x970
[  155.732038][ T9541]  ? do_filp_open+0x2e1/0x430
[  155.736800][ T9541]  ? memset+0x31/0x40
[  155.740770][ T9541]  block_ioctl+0xbd/0x100
[  155.745083][ T9541]  ? blkdev_iopoll+0x100/0x100
[  155.749844][ T9541]  do_vfs_ioctl+0x747/0x1700
[  155.754423][ T9541]  ? selinux_file_ioctl+0x6e6/0x930
[  155.759608][ T9541]  ? ioctl_preallocate+0x240/0x240
[  155.764776][ T9541]  ? __fget+0x37c/0x3c0
[  155.768966][ T9541]  ? fget_many+0x30/0x30
[  155.773224][ T9541]  ? security_file_ioctl+0xae/0xd0
[  155.778323][ T9541]  __x64_sys_ioctl+0xe3/0x120
[  155.783074][ T9541]  do_syscall_64+0xc0/0x100
[  155.787648][ T9541]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  155.793519][ T9541] RIP: 0033:0x45b1b7
[  155.797395][ T9541] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  155.817263][ T9541] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  155.825663][ T9541] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7
[  155.833621][ T9541] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[  155.841580][ T9541] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a
[  155.849787][ T9541] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004
[  155.857749][ T9541] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000b
15:47:23 executing program 4:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000300)='./bus\x00', 0x0)
unlink(&(0x7f0000000080)='./bus/file0\x00')
creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./bus/file0\x00')
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0'])
link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00')
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x2, 0x3, 0x401, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x11}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x4)

15:47:23 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080800005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  155.883607][ T9541] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  155.897542][ T9549] SELinux:  policydb string length 1800 does not match expected length 8
15:47:23 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x1200)

15:47:23 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080900005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:23 executing program 5 (fault-call:2 fault-nth:12):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  155.969155][ T9559] SELinux:  policydb string length 2056 does not match expected length 8
[  155.995596][ T9552] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:47:23 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  156.018571][ T9563] SELinux:  policydb magic number 0x30307830 does not match expected magic number 0xf97cff8c
[  156.031204][ T9571] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior.
[  156.046221][ T9571] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior.
15:47:23 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x2500)

[  156.111168][ T9583] SELinux:  policydb string length 2312 does not match expected length 8
[  156.114138][ T9581] FAULT_INJECTION: forcing a failure.
[  156.114138][ T9581] name failslab, interval 1, probability 0, space 0, times 0
[  156.133997][ T9581] CPU: 1 PID: 9581 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  156.144072][ T9581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  156.154237][ T9581] Call Trace:
[  156.157535][ T9581]  dump_stack+0x1b0/0x228
[  156.161871][ T9581]  ? devkmsg_release+0x127/0x127
[  156.166830][ T9581]  ? show_regs_print_info+0x18/0x18
[  156.172037][ T9581]  ? __kasan_check_write+0x14/0x20
[  156.177243][ T9581]  ? mutex_lock+0xa6/0x110
[  156.181661][ T9581]  ? mutex_trylock+0xb0/0xb0
[  156.186364][ T9581]  should_fail+0x6fb/0x860
[  156.190850][ T9581]  ? setup_fault_attr+0x2b0/0x2b0
[  156.195936][ T9581]  ? kernfs_xattr_get+0x80/0x90
[  156.200816][ T9581]  ? selinux_kernfs_init_security+0x10a/0x700
[  156.206898][ T9581]  __should_failslab+0x11a/0x160
[  156.211828][ T9581]  ? __kernfs_new_node+0xdb/0x6e0
[  156.216959][ T9581]  should_failslab+0x9/0x20
[  156.221458][ T9581]  kmem_cache_alloc+0x37/0x2b0
[  156.226211][ T9581]  ? idr_alloc+0x300/0x300
[  156.230610][ T9581]  __kernfs_new_node+0xdb/0x6e0
[  156.235492][ T9581]  ? kernfs_new_node+0x170/0x170
[  156.240416][ T9581]  ? __kasan_check_write+0x14/0x20
[  156.245507][ T9581]  ? mutex_lock+0xa6/0x110
[  156.249980][ T9581]  ? mutex_trylock+0xb0/0xb0
[  156.254560][ T9581]  kernfs_new_node+0x97/0x170
[  156.259219][ T9581]  __kernfs_create_file+0x4a/0x270
[  156.264314][ T9581]  sysfs_add_file_mode_ns+0x274/0x320
[  156.269677][ T9581]  internal_create_group+0x511/0xe40
[  156.274952][ T9581]  ? down_write+0xd8/0x150
[  156.279355][ T9581]  ? sysfs_create_group+0x30/0x30
[  156.284376][ T9581]  ? _raw_spin_unlock_irqrestore+0x28/0x30
[  156.290163][ T9581]  sysfs_create_group+0x1f/0x30
[  156.294997][ T9581]  loop_set_fd+0xdbd/0x1280
[  156.299484][ T9581]  lo_ioctl+0x17a/0x2340
[  156.303753][ T9581]  ? lo_release+0x1f0/0x1f0
[  156.308289][ T9581]  ? __read_once_size_nocheck+0x10/0x10
[  156.313849][ T9581]  ? unwind_next_frame+0x415/0x870
[  156.318977][ T9581]  ? __rcu_read_lock+0x50/0x50
[  156.323739][ T9581]  ? unwind_next_frame+0x415/0x870
[  156.328834][ T9581]  ? unwind_get_return_address_ptr+0xa0/0xa0
[  156.334793][ T9581]  ? stack_trace_save+0x1e0/0x1e0
[  156.339805][ T9581]  ? is_bpf_text_address+0x2c8/0x2e0
[  156.345176][ T9581]  ? stack_trace_save+0x1e0/0x1e0
[  156.350172][ T9581]  ? __kasan_check_write+0x14/0x20
[  156.355260][ T9581]  ? kobject_get_unless_zero+0x1c8/0x2a0
[  156.360876][ T9581]  ? kobj_kset_leave+0x3a0/0x3a0
[  156.365896][ T9581]  ? __kasan_check_write+0x14/0x20
[  156.370998][ T9581]  ? mutex_lock+0xa6/0x110
[  156.375694][ T9581]  ? __module_put_and_exit+0x20/0x20
[  156.381107][ T9581]  ? __kasan_check_write+0x14/0x20
[  156.386225][ T9581]  ? __up_read+0x6f/0x1b0
[  156.390541][ T9581]  ? disk_check_events+0x600/0x600
[  156.395634][ T9581]  ? __kasan_check_write+0x14/0x20
[  156.400739][ T9581]  ? up_write+0xa1/0x190
[  156.404969][ T9581]  ? __kasan_check_write+0x14/0x20
[  156.410074][ T9581]  ? down_write+0xd8/0x150
[  156.414470][ T9581]  ? up_read+0x10/0x10
[  156.418520][ T9581]  ? __kasan_check_write+0x14/0x20
[  156.423635][ T9581]  ? disk_unblock_events+0x51/0x60
[  156.428735][ T9581]  ? __blkdev_get+0x125b/0x1b40
[  156.433596][ T9581]  ? __read_once_size_nocheck+0x10/0x10
[  156.439145][ T9581]  ? unwind_next_frame+0x415/0x870
[  156.444310][ T9581]  ? __rcu_read_lock+0x50/0x50
[  156.449061][ T9581]  ? unwind_next_frame+0x415/0x870
[  156.454159][ T9581]  ? unwind_get_return_address_ptr+0xa0/0xa0
[  156.460238][ T9581]  ? is_bpf_text_address+0x2c8/0x2e0
[  156.465589][ T9581]  ? lo_release+0x1f0/0x1f0
[  156.470099][ T9581]  blkdev_ioctl+0x89a/0x2c30
[  156.474672][ T9581]  ? __kernel_text_address+0x9a/0x110
[  156.480020][ T9581]  ? unwind_get_return_address+0x4c/0x90
[  156.485635][ T9581]  ? arch_stack_walk+0x98/0xe0
[  156.490503][ T9581]  ? __blkdev_driver_ioctl+0xc0/0xc0
[  156.495787][ T9581]  ? __rcu_read_lock+0x50/0x50
[  156.500551][ T9581]  ? stack_trace_save+0x111/0x1e0
[  156.505561][ T9581]  ? avc_has_extended_perms+0xb27/0x10d0
[  156.511177][ T9581]  ? __kasan_slab_free+0x1e2/0x220
[  156.516265][ T9581]  ? __kasan_slab_free+0x168/0x220
[  156.521351][ T9581]  ? kasan_slab_free+0xe/0x10
[  156.526008][ T9581]  ? kmem_cache_free+0x181/0x7a0
[  156.530927][ T9581]  ? avc_ss_reset+0x3e0/0x3e0
[  156.535583][ T9581]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  156.541654][ T9581]  ? should_fail+0x182/0x860
[  156.546238][ T9581]  ? memset+0x31/0x40
[  156.550210][ T9581]  ? fsnotify+0x1389/0x1450
[  156.554688][ T9581]  ? expand_files+0xd1/0x970
[  156.559258][ T9581]  ? do_filp_open+0x2e1/0x430
[  156.564036][ T9581]  ? memset+0x31/0x40
[  156.568016][ T9581]  block_ioctl+0xbd/0x100
[  156.572319][ T9581]  ? blkdev_iopoll+0x100/0x100
[  156.577068][ T9581]  do_vfs_ioctl+0x747/0x1700
[  156.581642][ T9581]  ? selinux_file_ioctl+0x6e6/0x930
[  156.586818][ T9581]  ? ioctl_preallocate+0x240/0x240
[  156.591908][ T9581]  ? __fget+0x37c/0x3c0
[  156.596091][ T9581]  ? fget_many+0x30/0x30
[  156.600321][ T9581]  ? security_file_ioctl+0xae/0xd0
[  156.605406][ T9581]  __x64_sys_ioctl+0xe3/0x120
[  156.610059][ T9581]  do_syscall_64+0xc0/0x100
[  156.614545][ T9581]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  156.620434][ T9581] RIP: 0033:0x45b1b7
[  156.624328][ T9581] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  156.644008][ T9581] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  156.652428][ T9581] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7
15:47:24 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080a00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  156.660375][ T9581] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[  156.668586][ T9581] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a
[  156.676540][ T9581] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004
[  156.684492][ T9581] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000c
[  156.700447][ T9581] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:47:24 executing program 4:
r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802)
ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000007580)})
r3 = openat$selinux_load(0xffffffffffffff9c, 0xffffffffffffffff, 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x14)
signalfd4(r3, &(0x7f0000000040)={[0x7]}, 0x8, 0x80800)

15:47:24 executing program 5 (fault-call:2 fault-nth:13):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:24 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x4000)

[  156.749897][ T9586] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  156.776358][ T9598] SELinux:  policydb string length 2568 does not match expected length 8
[  156.794234][ T9598] sel_write_load: 5 callbacks suppressed
15:47:24 executing program 3:
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendmsg(r3, &(0x7f0000000780)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)="dec7befe35d129281f226501c4b9c6059a0cc79e171bff0b2ec19c7d0f6be9184a7d6d2102e84aeebdc55a3efb0a96de20d8224496c5e1d198a04b9a9827e70f1b6582c1919034dd15ae9c7e8f960a0067bd48be9213c66383dbee7575144febcdd3d82a2d37a602df9d2fcec3d60cc0446321cfdbcf2406e8034df243629d6a9db1c6c484d00832501afc1e320ccd46140e398843e774adca6c578e900a7162cc8ac5643dad7bcd21e2471463f86fbbaa9cabae9436fa16cf80a7eef4b0575758b2519b04cc42315e9c427722cf678901a2883d", 0xd4}, {&(0x7f0000000180)="91d76d5174d286b2738dd4bac704a76616b98bd78fb3ff711883786e9a7a8e6edbc7c8b51fac372ca2728fa5c37469d9f952ee50f66a7b98669d43109d1bafa11d2fcbac179d10d14f30bd4345c662af4a96478e32806d461ffba192948be47c6bdc2cff18e611414e457e1ff1508fd538c86583835281787d175449b761ca05dbff86ebfe82ead4a84aa6b501955fd0b5ff9da039f596f477d9b8c3aec07fee59d188f56a0475e1a10c90c44011c901df80f62fe9fc9006f10fbd007483781b55a3a9244a8db6cc067aa877511101f3515d0620c9b67510efe6f28147b38f83af9bc47a013b699061c2ff39eb505a", 0xef}, {&(0x7f0000000280)="66667e2c166bf3b262d76835fce64b508a2b9ae71e437b7a5986d3fa43522866024ae1", 0x23}], 0x3, &(0x7f0000000300)=[{0x18, 0x1, 0x0, "4cd3e520687a04a0"}, {0x70, 0x10c, 0xffffff80, "bd31f769175198c4192821550fa3dc6ee49fbfed15795e9dd66803effa5178990f9477773c43d31f3be05032a98153b6321da42427403a355801256d61847e43cb0bd3fe3636d6555744d5527f898af324fe6488afb849ef6fb41144"}, {0xc0, 0x1, 0x3ff, "3ef547d9c6970a6dac1f2cc6f0759a54017a2ed45b05f29b9980cb91c811e3a02256917f9105b75631033f27b3e198b634c3c2670a65d864762c4b7b96de0561dec3bf1dae7f5a91624cca923ed8472ad5c5e4cf15bb746179c27059aae0c98008a579275b383e2e36654da95ea6b565578ab3e1c9bb6ff01c95bd90dbec7a1dbc2fd51361229222545c4f6137dd8f2425a14b9ccd5e8a35a1e843afb63f9b056ee4dda3c37ddd2cba5a736e8be6b8"}, {0xd0, 0x1, 0x8637, "9c2bd12aaa22caf4a2b88e529b6c062a3cb4eba2b44eeaad37ef2f7efbd3c4d05e6cdca8e8a7e9e1ca5e7895b95bc968b2cf3cf29a55736d2e2ba722f0ab7b25c08999202cf8560a2eccdf004605ce9b1decffabdf87db65ab14764ad81e45ad02b6e99980992025eadb2b64ff044fe4498a61b776a049e05c0a9355b8ef3eaa9eb64000da79c3fd69358d6314cd85712dd27c3a96876ddd2d6eb363eb423497b4bae836658924e0debc54e16ff159553be7bb8fc6a5edabd45493d1e08a9737"}, {0xc0, 0xff, 0x1, "c14d22b6874650fc6903afb11cc6f1a541bd18d7519ca06ef1e624da37ec28ee4958074fc1dcccaa8fb8d1bb46d9bf63287d45860e55aa2a349c1f428459d248bbd3489cd23c7b8bd0e1d9ce97e148d532979e6f512793b6b88c91ed767bcc0958ca3fbc62087f749e68b0a75883dc261ca98c22731b0076e96514ef64164a9d0f47e2ddc0f4835d5f02231cf3a883c7dc7478bd41116e3d27dffb12315db9614694eefd4685e7370febbfedfba5"}, {0xe0, 0x114, 0x91fb, "1fd36a4f2f92b9409ef6f48e25f4111f45e192d43504ff2e7d2b50dd117281704d05e89b1bd390b232aa3208bb62653ae42ad27a55d4ac01b96b39db0912214536f3622a859711073d79cfcba87fa2670b6acb2f24ee999e4c654cb1db2dc2cc5f9c2083078e87ab162ae3cb44b6caf4eff36189670bc860faa2a64cb33431f9177f17ed998ecaeee4b50b0f81be50000b40c9c3655091d977beb7984800b6ed30ba736a2a8fe7ffa62fb6b7db59d82ebad50501aa410dee72a2a385e38245536ad56109e1761dfbae"}, {0xb8, 0x0, 0x1, "b7e36138179d5d2054880925ed109560121a77e07fe87ec65ae0dc2ee6c0694de9df4167b3cea4f2c3e0f792a8cfc5031cc360920165ed56f7927cfbff364dfe12721f3d35655f7f8eae52ed682973ae72d57b09ceca9b175088f1fa5dd6f8195fe5f3f2d55f34611ba23cfc865fcf05fdde55d8fce503f69a9280b26b2592fdf6803d864fb2dc2f0fcc82f8666475a0589338bb1e0f7938c9ec72b430aa8d0bd4e6f3d0bc43cae4"}], 0x470}, 0x20000040)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_int(r4, 0x29, 0x40, &(0x7f0000001fde), 0x4)

15:47:24 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080b00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  156.794237][ T9598] SELinux: failed to load policy
15:47:24 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PDEATHSIG(0x1, 0x16)
r0 = socket(0x10, 0x803, 0x0)
syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00')
sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x8004)
epoll_create1(0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000840)="78e5a9ef319f386ed9e6f9bbf76596d792f9e94c5eca15b12fcbd298a5ffebeda93452a65c61ebbbb798de43ef1b4f1bc6a54aa45272b0ce7d8a92c982d44df3dba3477fa27df52e810deeeb8e6b1121aedf416ed427017c024ccc0ad263b8b8c7ed859fd4b0", 0x66}, {&(0x7f00000009c0)}], 0x2}}], 0x1, 0x40)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000680)}, 0x0, 0x0, 0x4, 0xd, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x803, 0x2)
openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x20000}, {}, 0x10000, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8)
getsockopt$sock_int(r0, 0x1, 0x918e9f2342b0b2a9, &(0x7f0000000040), &(0x7f0000000080)=0x4)

[  156.821917][ T9600] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  156.901095][ T9609] FAULT_INJECTION: forcing a failure.
[  156.901095][ T9609] name failslab, interval 1, probability 0, space 0, times 0
[  156.910561][ T9616] SELinux:  policydb string length 2824 does not match expected length 8
[  156.918256][ T9609] CPU: 0 PID: 9609 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  156.929498][ T9616] SELinux: failed to load policy
[  156.932171][ T9609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  156.932175][ T9609] Call Trace:
15:47:24 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080c00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  156.932191][ T9609]  dump_stack+0x1b0/0x228
[  156.932208][ T9609]  ? devkmsg_release+0x127/0x127
[  156.959699][ T9609]  ? show_regs_print_info+0x18/0x18
[  156.964900][ T9609]  ? __kasan_check_write+0x14/0x20
[  156.970036][ T9609]  ? mutex_lock+0xa6/0x110
[  156.974471][ T9609]  ? mutex_trylock+0xb0/0xb0
[  156.979056][ T9609]  should_fail+0x6fb/0x860
[  156.983491][ T9609]  ? setup_fault_attr+0x2b0/0x2b0
[  156.988509][ T9609]  ? kernfs_xattr_get+0x80/0x90
[  156.993362][ T9609]  ? selinux_kernfs_init_security+0x10a/0x700
[  156.999856][ T9609]  __should_failslab+0x11a/0x160
[  157.004901][ T9609]  ? __kernfs_new_node+0xdb/0x6e0
[  157.009908][ T9609]  should_failslab+0x9/0x20
[  157.014399][ T9609]  kmem_cache_alloc+0x37/0x2b0
[  157.019151][ T9609]  ? idr_alloc+0x300/0x300
[  157.023549][ T9609]  __kernfs_new_node+0xdb/0x6e0
[  157.028390][ T9609]  ? kernfs_new_node+0x170/0x170
[  157.033312][ T9609]  ? __kasan_check_write+0x14/0x20
[  157.038511][ T9609]  ? mutex_lock+0xa6/0x110
[  157.042908][ T9609]  ? mutex_trylock+0xb0/0xb0
[  157.047492][ T9609]  kernfs_new_node+0x97/0x170
[  157.052147][ T9609]  __kernfs_create_file+0x4a/0x270
[  157.057241][ T9609]  sysfs_add_file_mode_ns+0x274/0x320
[  157.062592][ T9609]  internal_create_group+0x511/0xe40
[  157.067860][ T9609]  ? down_write+0xd8/0x150
[  157.072255][ T9609]  ? sysfs_create_group+0x30/0x30
[  157.077260][ T9609]  ? _raw_spin_unlock_irqrestore+0x28/0x30
[  157.083094][ T9609]  sysfs_create_group+0x1f/0x30
[  157.087940][ T9609]  loop_set_fd+0xdbd/0x1280
[  157.092430][ T9609]  lo_ioctl+0x17a/0x2340
[  157.096685][ T9609]  ? lo_release+0x1f0/0x1f0
[  157.101173][ T9609]  ? __kasan_check_write+0x14/0x20
[  157.106273][ T9609]  ? _raw_spin_lock_irqsave+0xda/0x1c0
[  157.111727][ T9609]  ? __read_once_size_nocheck+0x10/0x10
[  157.117269][ T9609]  ? _raw_spin_lock+0x170/0x170
[  157.122103][ T9609]  ? __rcu_read_lock+0x50/0x50
[  157.126943][ T9609]  ? unwind_next_frame+0x415/0x870
[  157.132034][ T9609]  ? try_to_wake_up+0x32f/0x2190
[  157.136959][ T9609]  ? __kasan_check_write+0x14/0x20
[  157.142049][ T9609]  ? stack_trace_save+0x1e0/0x1e0
[  157.147045][ T9609]  ? cpus_share_cache+0xd0/0xd0
[  157.151874][ T9609]  ? __kasan_check_write+0x14/0x20
[  157.157047][ T9609]  ? _raw_spin_lock+0xa1/0x170
[  157.161787][ T9609]  ? _raw_spin_trylock_bh+0x190/0x190
[  157.167140][ T9609]  ? mutex_lock+0xa6/0x110
[  157.171535][ T9609]  ? wake_up_q+0x84/0xb0
[  157.175754][ T9609]  ? __kasan_check_write+0x14/0x20
[  157.180844][ T9609]  ? up_write+0xa1/0x190
[  157.185068][ T9609]  ? __kasan_check_write+0x14/0x20
[  157.190173][ T9609]  ? down_write+0xd8/0x150
[  157.194609][ T9609]  ? up_read+0x10/0x10
[  157.198669][ T9609]  ? __kasan_check_write+0x14/0x20
[  157.203775][ T9609]  ? disk_unblock_events+0x51/0x60
[  157.209010][ T9609]  ? __blkdev_get+0x125b/0x1b40
[  157.213887][ T9609]  ? __read_once_size_nocheck+0x10/0x10
[  157.219451][ T9609]  ? unwind_next_frame+0x415/0x870
[  157.224548][ T9609]  ? __rcu_read_lock+0x50/0x50
[  157.229295][ T9609]  ? unwind_next_frame+0x415/0x870
[  157.234401][ T9609]  ? unwind_get_return_address_ptr+0xa0/0xa0
[  157.240416][ T9609]  ? is_bpf_text_address+0x2c8/0x2e0
[  157.245704][ T9609]  ? lo_release+0x1f0/0x1f0
[  157.250185][ T9609]  blkdev_ioctl+0x89a/0x2c30
[  157.254769][ T9609]  ? __kernel_text_address+0x9a/0x110
[  157.260119][ T9609]  ? unwind_get_return_address+0x4c/0x90
[  157.265742][ T9609]  ? arch_stack_walk+0x98/0xe0
[  157.270495][ T9609]  ? __blkdev_driver_ioctl+0xc0/0xc0
[  157.275770][ T9609]  ? __rcu_read_lock+0x50/0x50
[  157.280508][ T9609]  ? stack_trace_save+0x111/0x1e0
[  157.285515][ T9609]  ? avc_has_extended_perms+0xb27/0x10d0
[  157.291166][ T9609]  ? __kasan_slab_free+0x1e2/0x220
[  157.296261][ T9609]  ? __kasan_slab_free+0x168/0x220
[  157.301349][ T9609]  ? kasan_slab_free+0xe/0x10
[  157.306018][ T9609]  ? kmem_cache_free+0x181/0x7a0
[  157.310934][ T9609]  ? avc_ss_reset+0x3e0/0x3e0
[  157.315585][ T9609]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  157.321631][ T9609]  ? should_fail+0x182/0x860
[  157.326196][ T9609]  ? memset+0x31/0x40
[  157.330152][ T9609]  ? fsnotify+0x1389/0x1450
[  157.334661][ T9609]  ? expand_files+0xd1/0x970
[  157.339245][ T9609]  ? do_filp_open+0x2e1/0x430
[  157.343911][ T9609]  ? memset+0x31/0x40
[  157.347878][ T9609]  block_ioctl+0xbd/0x100
[  157.352190][ T9609]  ? blkdev_iopoll+0x100/0x100
[  157.356940][ T9609]  do_vfs_ioctl+0x747/0x1700
[  157.361518][ T9609]  ? selinux_file_ioctl+0x6e6/0x930
[  157.366733][ T9609]  ? ioctl_preallocate+0x240/0x240
[  157.371822][ T9609]  ? __fget+0x37c/0x3c0
[  157.375954][ T9609]  ? fget_many+0x30/0x30
[  157.380174][ T9609]  ? security_file_ioctl+0xae/0xd0
[  157.385258][ T9609]  __x64_sys_ioctl+0xe3/0x120
[  157.389913][ T9609]  do_syscall_64+0xc0/0x100
[  157.394392][ T9609]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  157.400262][ T9609] RIP: 0033:0x45b1b7
[  157.404133][ T9609] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  157.423717][ T9609] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  157.432146][ T9609] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7
[  157.440110][ T9609] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
15:47:24 executing program 3:
unshare(0x400)
pipe(&(0x7f0000000540)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r1, 0x0, r1)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES64=0x0, @ANYRESDEC=0x0, @ANYRES16=r0, @ANYRES16=r0, @ANYRES16]], 0xfffffffe)
r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
r6 = openat$cgroup_ro(r5, &(0x7f0000000340)='io.stat\x00', 0x275a, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffd83)
ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x1000, 0x3})
readahead(r6, 0x0, 0x0)
pipe(&(0x7f0000000540)={<r7=>0xffffffffffffffff})
r8 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r8, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4)
setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10)
connect$inet(r8, &(0x7f00000001c0)={0x2, 0xfffc, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r8, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x78, 0x21fc}, 0x14)
splice(r7, 0x0, r8, 0x0, 0x10003, 0x0)
pipe(&(0x7f0000000540)={<r9=>0xffffffffffffffff})
r10 = socket$inet_tcp(0x2, 0x1, 0x0)
r11 = socket$inet_udp(0x2, 0x2, 0x0)
close(r11)
ioctl$int_in(r11, 0x5421, &(0x7f0000000040)=0xdd5d)
ioctl$int_in(r11, 0x5452, &(0x7f0000000140)=0x5)
setsockopt$inet_tcp_int(r10, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4)
setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10)
connect$inet(r10, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r10, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x78, 0x21fc}, 0x14)
splice(r9, 0x0, r10, 0x0, 0x10003, 0x0)
getcwd(&(0x7f0000000200)=""/227, 0xe3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, <r12=>0x0}, &(0x7f0000000100)=0xc)
ioctl$TUNSETOWNER(r9, 0x400454cc, r12)
ioctl$NS_GET_PARENT(r7, 0xb702, 0x0)

15:47:24 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x4603)

[  157.448084][ T9609] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a
[  157.456046][ T9609] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004
[  157.464024][ T9609] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000d
15:47:25 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xb, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:25 executing program 5 (fault-call:2 fault-nth:14):
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  157.566924][ T9636] SELinux: ebitmap: truncated map
[  157.590200][ T9636] SELinux: failed to load policy
[  157.608549][ T9635] SELinux:  policydb string length 3080 does not match expected length 8
[  157.622209][ T9642] FAULT_INJECTION: forcing a failure.
[  157.622209][ T9642] name failslab, interval 1, probability 0, space 0, times 0
[  157.623919][ T9635] SELinux: failed to load policy
[  157.640273][ T9642] CPU: 0 PID: 9642 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  157.650347][ T9642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  157.660405][ T9642] Call Trace:
[  157.663692][ T9642]  dump_stack+0x1b0/0x228
[  157.667996][ T9642]  ? devkmsg_release+0x127/0x127
[  157.672907][ T9642]  ? show_regs_print_info+0x18/0x18
[  157.678079][ T9642]  ? __kasan_check_write+0x14/0x20
[  157.683183][ T9642]  ? mutex_unlock+0x1d/0x40
[  157.687667][ T9642]  ? kernfs_xattr_get+0x80/0x90
[  157.692493][ T9642]  should_fail+0x6fb/0x860
[  157.696933][ T9642]  ? setup_fault_attr+0x2b0/0x2b0
[  157.702035][ T9642]  ? idr_alloc+0x300/0x300
[  157.706435][ T9642]  __should_failslab+0x11a/0x160
[  157.711350][ T9642]  ? __kernfs_new_node+0xdb/0x6e0
[  157.716389][ T9642]  should_failslab+0x9/0x20
[  157.720874][ T9642]  kmem_cache_alloc+0x37/0x2b0
[  157.725613][ T9642]  __kernfs_new_node+0xdb/0x6e0
[  157.730530][ T9642]  ? mutex_lock+0xa6/0x110
[  157.734920][ T9642]  ? kernfs_new_node+0x170/0x170
[  157.739838][ T9642]  ? __kasan_check_write+0x14/0x20
[  157.744926][ T9642]  ? mutex_unlock+0x1d/0x40
[  157.749403][ T9642]  ? kernfs_activate+0x459/0x470
[  157.754313][ T9642]  kernfs_new_node+0x97/0x170
[  157.759072][ T9642]  __kernfs_create_file+0x4a/0x270
[  157.764211][ T9642]  sysfs_add_file_mode_ns+0x274/0x320
[  157.769581][ T9642]  internal_create_group+0x511/0xe40
[  157.774852][ T9642]  ? down_write+0xd8/0x150
[  157.779249][ T9642]  ? sysfs_create_group+0x30/0x30
[  157.784255][ T9642]  ? _raw_spin_unlock_irqrestore+0x28/0x30
[  157.790051][ T9642]  sysfs_create_group+0x1f/0x30
[  157.794914][ T9642]  loop_set_fd+0xdbd/0x1280
[  157.799469][ T9642]  lo_ioctl+0x17a/0x2340
[  157.803700][ T9642]  ? __kasan_check_read+0x11/0x20
[  157.808702][ T9642]  ? perf_pmu_sched_task+0x370/0x370
[  157.813962][ T9642]  ? __kasan_check_read+0x11/0x20
[  157.818967][ T9642]  ? switch_mm_irqs_off+0x6a1/0x9d0
[  157.824145][ T9642]  ? lo_release+0x1f0/0x1f0
[  157.828699][ T9642]  ? _raw_spin_unlock_irq+0x9/0x20
[  157.833796][ T9642]  ? finish_task_switch+0x274/0x560
[  157.839075][ T9642]  ? __schedule+0xea0/0x1700
[  157.843646][ T9642]  ? __kasan_check_write+0x14/0x20
[  157.848739][ T9642]  ? _raw_spin_lock+0xa1/0x170
[  157.853555][ T9642]  ? _raw_spin_trylock_bh+0x190/0x190
[  157.858930][ T9642]  ? schedule+0x14b/0x1d0
[  157.863240][ T9642]  ? _raw_spin_unlock+0x9/0x20
[  157.867980][ T9642]  ? __mutex_lock+0xabf/0xc40
[  157.872632][ T9642]  ? stack_trace_save+0x1e0/0x1e0
[  157.877638][ T9642]  ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20
[  157.884387][ T9642]  ? __kasan_check_write+0x14/0x20
[  157.889476][ T9642]  ? mutex_lock+0xa6/0x110
[  157.893870][ T9642]  ? __module_put_and_exit+0x20/0x20
[  157.899130][ T9642]  ? __kasan_check_write+0x14/0x20
[  157.904222][ T9642]  ? __up_read+0x6f/0x1b0
[  157.908529][ T9642]  ? disk_check_events+0x600/0x600
[  157.913626][ T9642]  ? __kasan_check_write+0x14/0x20
[  157.918743][ T9642]  ? up_write+0xa1/0x190
[  157.922966][ T9642]  ? __kasan_check_write+0x14/0x20
[  157.928051][ T9642]  ? down_write+0xd8/0x150
[  157.932492][ T9642]  ? up_read+0x10/0x10
[  157.936538][ T9642]  ? __kasan_check_write+0x14/0x20
[  157.941638][ T9642]  ? disk_unblock_events+0x51/0x60
[  157.946813][ T9642]  ? __blkdev_get+0x125b/0x1b40
[  157.951706][ T9642]  ? __read_once_size_nocheck+0x10/0x10
[  157.957342][ T9642]  ? unwind_next_frame+0x415/0x870
[  157.962440][ T9642]  ? __rcu_read_lock+0x50/0x50
[  157.967191][ T9642]  ? unwind_next_frame+0x415/0x870
[  157.972348][ T9642]  ? unwind_get_return_address_ptr+0xa0/0xa0
[  157.978429][ T9642]  ? is_bpf_text_address+0x2c8/0x2e0
[  157.983700][ T9642]  ? lo_release+0x1f0/0x1f0
[  157.988195][ T9642]  blkdev_ioctl+0x89a/0x2c30
[  157.993201][ T9642]  ? __kernel_text_address+0x9a/0x110
[  157.998560][ T9642]  ? unwind_get_return_address+0x4c/0x90
[  158.004211][ T9642]  ? arch_stack_walk+0x98/0xe0
[  158.008971][ T9642]  ? __blkdev_driver_ioctl+0xc0/0xc0
[  158.014274][ T9642]  ? __rcu_read_lock+0x50/0x50
[  158.019045][ T9642]  ? stack_trace_save+0x111/0x1e0
[  158.024064][ T9642]  ? avc_has_extended_perms+0xb27/0x10d0
[  158.029703][ T9642]  ? __kasan_slab_free+0x1e2/0x220
[  158.034840][ T9642]  ? __kasan_slab_free+0x168/0x220
[  158.039968][ T9642]  ? kasan_slab_free+0xe/0x10
[  158.044632][ T9642]  ? kmem_cache_free+0x181/0x7a0
[  158.049589][ T9642]  ? avc_ss_reset+0x3e0/0x3e0
[  158.054250][ T9642]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  158.060338][ T9642]  ? should_fail+0x182/0x860
[  158.064915][ T9642]  ? memset+0x31/0x40
[  158.068892][ T9642]  ? fsnotify+0x1389/0x1450
[  158.073427][ T9642]  ? expand_files+0xd1/0x970
[  158.078022][ T9642]  ? do_filp_open+0x2e1/0x430
[  158.082736][ T9642]  ? memset+0x31/0x40
[  158.086716][ T9642]  block_ioctl+0xbd/0x100
[  158.091025][ T9642]  ? blkdev_iopoll+0x100/0x100
[  158.095775][ T9642]  do_vfs_ioctl+0x747/0x1700
[  158.100379][ T9642]  ? selinux_file_ioctl+0x6e6/0x930
[  158.105581][ T9642]  ? ioctl_preallocate+0x240/0x240
[  158.110679][ T9642]  ? __fget+0x37c/0x3c0
[  158.114966][ T9642]  ? __kasan_check_write+0x14/0x20
[  158.120082][ T9642]  ? fget_many+0x30/0x30
[  158.124337][ T9642]  ? security_file_ioctl+0xae/0xd0
[  158.129437][ T9642]  __x64_sys_ioctl+0xe3/0x120
[  158.134095][ T9642]  do_syscall_64+0xc0/0x100
[  158.138621][ T9642]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  158.144606][ T9642] RIP: 0033:0x45b1b7
[  158.148481][ T9642] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  158.168223][ T9642] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  158.176675][ T9642] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7
[  158.184648][ T9642] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
15:47:25 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x4800)

15:47:25 executing program 4:
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss, @sack_perm, @sack_perm, @window={0x3, 0x7}], 0x4)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2500, 0x0)
sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, 0x3, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0xc, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x7f}]}}]}, 0x24}}, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

15:47:25 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080d00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  158.192854][ T9642] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a
[  158.200829][ T9642] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004
[  158.208786][ T9642] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000e
15:47:25 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x4c00)

[  158.255418][   T22] kauditd_printk_skb: 217 callbacks suppressed
[  158.255426][   T22] audit: type=1326 audit(1580485645.736:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  158.288015][   T22] audit: type=1326 audit(1580485645.736:2073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  158.313535][   T22] audit: type=1326 audit(1580485645.736:2074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  158.338953][   T22] audit: type=1326 audit(1580485645.766:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  158.364406][   T22] audit: type=1326 audit(1580485645.766:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  158.389703][   T22] audit: type=1326 audit(1580485645.766:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  158.415185][   T22] audit: type=1326 audit(1580485645.766:2078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
15:47:25 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pipe(&(0x7f0000000380)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10)
r7 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r8 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x9)
write$9p(r7, &(0x7f0000001400)="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", 0x600)
sendfile(r7, r8, 0x0, 0x1c500)
write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0xfffffc7b)
splice(r2, 0x0, r4, 0x0, 0x4ffde, 0x0)

[  158.440784][   T22] audit: type=1326 audit(1580485645.766:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  158.470443][   T22] audit: type=1326 audit(1580485645.766:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:47:26 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xc, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:26 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  158.495955][   T22] audit: type=1326 audit(1580485645.766:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
15:47:26 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080e00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:26 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x6800)

[  158.580157][ T9675] SELinux:  policydb string length 3336 does not match expected length 8
[  158.589726][ T9674] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended
[  158.591508][ T9675] SELinux: failed to load policy
[  158.606138][ T9674] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  158.617773][ T9674] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  158.628095][ T9683] EXT4-fs: 4 callbacks suppressed
[  158.628103][ T9683] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  158.628335][ T9674] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  158.651475][ T9674] EXT4-fs (loop4): no journal found
15:47:26 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x6c00)

15:47:26 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9081000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  158.673426][ T9686] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  158.696891][ T9698] SELinux:  policydb string length 3592 does not match expected length 8
[  158.705987][ T9698] SELinux: failed to load policy
[  158.719032][ T9689] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:47:26 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x7400)

15:47:26 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:26 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xd, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:26 executing program 4:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000), 0x0, 0x0)
mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x7)
r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r2, r3)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x0, <r4=>0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x8, 0x0, 0x2}, &(0x7f00000001c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x18, &(0x7f0000000400)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70005b5977900023566b34c450f4e2759500faff00000000dd3299a621f50a062cd2988aa1210329017b83c83ce13d70f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d80ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb77489c5ea2a361b18c"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340), 0x8, 0x10, &(0x7f0000000000), 0x10, r4}, 0x78)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x10, &(0x7f0000000240)={&(0x7f0000000580)=""/181, 0xb5, <r5=>r4}}, 0x10)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=r5, 0x4)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0)
r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133)
getdents(0xffffffffffffffff, &(0x7f0000000280)=""/217, 0xd9)
sendfile(r6, r6, &(0x7f00000001c0), 0xa198)
syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00')
r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0)
fsconfig$FSCONFIG_SET_STRING(r7, 0x1, &(0x7f0000000180)='nl80211\x00', &(0x7f0000000400)='nl80211\x00', 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)

15:47:26 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9081100005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  158.854683][ T9718] SELinux:  policydb string length 4104 does not match expected length 8
[  158.867787][ T9718] SELinux: failed to load policy
[  158.877951][ T9720] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  158.922652][ T9725] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  158.937758][ T9734] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  158.954118][ T9739] SELinux:  policydb string length 4360 does not match expected length 8
[  158.962852][ T9739] SELinux: failed to load policy
[  159.038499][ T9743] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:47:26 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9081200005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:26 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x7a00)

15:47:26 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:26 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
r1 = socket$key(0xf, 0x3, 0x2)
vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000180)="f4a38ebe8a8e5e03a4f7f6515191303cfde71ca0f01e835164f1dcde8d5149dacd5d5d74b1de3213a5ca6aea9a91fc6aa465ab07a2339b7fcab726f8f284017296eb916d9c937376d282a62fe27d46", 0x4f}, {&(0x7f00000002c0)="9aa0640ab0d33277cdfa11f1c468a23066c3b1084b45e77819f06a3b327c169161aeb12872f6f07373a10e1c1e3202dd76c8f092f0cf5d84e59160fb182ed058ad096b2e5c8c52580593a726b26dc6f9088c29be2832a74dd8ed9675fc2580ea6ed2ddc67b0bc9d9085dede45368f29814930fc8f7b5f81078e9dd5dcca0d001de5397f59e97ef999e96ecfdd35698b8f2b2680efff4b092614ca2", 0x9b}], 0x2, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
creat(&(0x7f0000000040)='./bus\x00', 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8400fffffffb)
sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0)
syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00')
r2 = socket(0x0, 0x2, 0x0)
getsockopt$inet6_buf(r2, 0x29, 0x1a6, &(0x7f0000000080)=""/4, &(0x7f0000000140)=0x4)
socket(0x10, 0x4, 0x0)
pipe(&(0x7f0000000000))
setresgid(0x0, 0x0, 0x0)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00')
sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}]}, 0x2c}}, 0x0)
sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x58, r4, 0x200, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xa46}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004}, 0x4800)
sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170)

15:47:26 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xe, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:26 executing program 4:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x94fe92986df27bf3})
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00')
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = dup(r6)
r8 = socket$unix(0x1, 0x2, 0x0)
r9 = fcntl$dupfd(r8, 0x0, r8)
ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200)
write$P9_RREADDIR(r9, &(0x7f0000000300)={0x103, 0x29, 0x1, {0xff, [{{0x10, 0x1, 0x5}, 0x3, 0x40, 0x7, './file0'}, {{0x80, 0x2, 0x4}, 0x7, 0x80, 0x7, './file0'}, {{0x8, 0x0, 0x3}, 0x4d2, 0x0, 0x7, './file0'}, {{0x4, 0x1, 0x6}, 0x1ff, 0x2, 0x7, './file0'}, {{0x1, 0x3, 0x2}, 0x2, 0x9e, 0x7, './file0'}, {{0x80, 0x0, 0x4}, 0x40000000, 0x0, 0x7, './file0'}, {{0x4, 0x0, 0x1}, 0x1, 0x8, 0x7, './file0'}, {{0x20, 0x2, 0x3}, 0x100000001, 0x7, 0x7, './file0'}]}}, 0x103)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000002c0)={0x7, 0x0, 0x0, 0x171a, 0x0, "7c93d49ecfa850b2"})
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103c56c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)
sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '&)\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x10, 0x1, 'eth1keyring\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x10)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0)
epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84)
connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e)

15:47:26 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x8004)

15:47:26 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9082500005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  159.394936][ T9760] SELinux:  policydb string length 4616 does not match expected length 8
[  159.397748][ T9759] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  159.403981][ T9760] SELinux: failed to load policy
15:47:26 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xff03)

[  159.446636][ T9758] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  159.523158][ T9778] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
15:47:27 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x1000000)

[  159.601603][ T9795] SELinux:  policydb string length 9480 does not match expected length 8
[  159.628147][ T9788] EXT4-fs (loop4): Unrecognized mount option "" or missing value
[  159.637129][ T9795] SELinux: failed to load policy
15:47:27 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:27 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9084800005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:27 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  159.644871][ T9788] EXT4-fs (loop4): failed to parse options in superblock: 
[  159.654925][ T9788] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
15:47:27 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x2000000)

[  159.727854][ T9813] SELinux:  policydb string length 18440 does not match expected length 8
[  159.745273][ T9788] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
15:47:27 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9084c00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  159.769075][ T9788] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  159.791743][ T9788] EXT4-fs (loop4): mounted filesystem without journal. Opts: ; ,errors=continue
[  159.851797][ T9833] SELinux:  policydb string length 19464 does not match expected length 8
15:47:27 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9086000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:27 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x3000000)

15:47:27 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:27 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x11, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:27 executing program 4:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x94fe92986df27bf3})
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00')
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = dup(r6)
r8 = socket$unix(0x1, 0x2, 0x0)
r9 = fcntl$dupfd(r8, 0x0, r8)
ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200)
write$P9_RREADDIR(r9, &(0x7f0000000300)={0x103, 0x29, 0x1, {0xff, [{{0x10, 0x1, 0x5}, 0x3, 0x40, 0x7, './file0'}, {{0x80, 0x2, 0x4}, 0x7, 0x80, 0x7, './file0'}, {{0x8, 0x0, 0x3}, 0x4d2, 0x0, 0x7, './file0'}, {{0x4, 0x1, 0x6}, 0x1ff, 0x2, 0x7, './file0'}, {{0x1, 0x3, 0x2}, 0x2, 0x9e, 0x7, './file0'}, {{0x80, 0x0, 0x4}, 0x40000000, 0x0, 0x7, './file0'}, {{0x4, 0x0, 0x1}, 0x1, 0x8, 0x7, './file0'}, {{0x20, 0x2, 0x3}, 0x100000001, 0x7, 0x7, './file0'}]}}, 0x103)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000002c0)={0x7, 0x0, 0x0, 0x171a, 0x0, "7c93d49ecfa850b2"})
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103c56c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)
sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '&)\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x10, 0x1, 'eth1keyring\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x10)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0)
epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84)
connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e)

15:47:27 executing program 3:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
r5 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_STATION(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000226f17889f", @ANYRES16=r4, @ANYBLOB="2b0f0000000000000000110000000800120100000000"], 0x1c}}, 0x0)
sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r4, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_batadv\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x448e95e9c3724a06)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
write$UHID_CREATE(r1, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000340)=""/264, 0x108, 0x3, 0x52, 0x50000000, 0x1000, 0x9}}, 0x120)

15:47:27 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9086800005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:27 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x4000000)

15:47:27 executing program 3:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
r1 = getpgrp(r0)
ptrace$cont(0x20, r1, 0xdbc, 0xd1f3)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000040))
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  160.317907][ T9855] SELinux:  policydb string length 24584 does not match expected length 8
15:47:27 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x10)
bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x8000000025dfdbfb}, 0xc)
r1 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x8000000025dfdbfb}, 0xc)
dup3(r0, r1, 0x0)

15:47:27 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9086c00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:27 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x5000000)

[  160.477688][ T9884] SELinux:  policydb string length 26632 does not match expected length 8
15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9087400005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:28 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:28 executing program 3:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = accept$inet(r3, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r5 = gettid()
tkill(r5, 0x3c)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r6=>r5, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)='@]!@\x00', 0xffffffffffffffff}, 0x30)
ioprio_get$pid(0x2, r6)
epoll_create(0x401)

[  160.530811][ T9896] SELinux:  policydb string length 27656 does not match expected length 8
[  160.588793][ T9906] SELinux:  policydb string length 29704 does not match expected length 8
15:47:28 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x12, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:28 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x6000000)

15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9087a00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:28 executing program 4:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x94fe92986df27bf3})
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00')
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = dup(r6)
r8 = socket$unix(0x1, 0x2, 0x0)
r9 = fcntl$dupfd(r8, 0x0, r8)
ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200)
write$P9_RREADDIR(r9, &(0x7f0000000300)={0x103, 0x29, 0x1, {0xff, [{{0x10, 0x1, 0x5}, 0x3, 0x40, 0x7, './file0'}, {{0x80, 0x2, 0x4}, 0x7, 0x80, 0x7, './file0'}, {{0x8, 0x0, 0x3}, 0x4d2, 0x0, 0x7, './file0'}, {{0x4, 0x1, 0x6}, 0x1ff, 0x2, 0x7, './file0'}, {{0x1, 0x3, 0x2}, 0x2, 0x9e, 0x7, './file0'}, {{0x80, 0x0, 0x4}, 0x40000000, 0x0, 0x7, './file0'}, {{0x4, 0x0, 0x1}, 0x1, 0x8, 0x7, './file0'}, {{0x20, 0x2, 0x3}, 0x100000001, 0x7, 0x7, './file0'}]}}, 0x103)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000002c0)={0x7, 0x0, 0x0, 0x171a, 0x0, "7c93d49ecfa850b2"})
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103c56c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)
sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '&)\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x10, 0x1, 'eth1keyring\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x10)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0)
epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84)
connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e)

15:47:28 executing program 3:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0'])
chdir(&(0x7f00000002c0)='./bus\x00')
open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
fcntl$dupfd(r0, 0x0, r0)
getpeername$unix(r0, &(0x7f00000001c0), &(0x7f00000000c0)=0x6e)
r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
flistxattr(r1, 0x0, 0x0)

15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080003005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:28 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x7000000)

[  160.681423][ T9921] SELinux:  policydb string length 31240 does not match expected length 8
15:47:28 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x8000000)

15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080005005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:28 executing program 3:
prlimit64(0x0, 0xe, 0x0, 0x0)
r0 = getpid()
sched_setattr(r0, 0x0, 0x0)
socket$inet6(0xa, 0x0, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB], 0x7}, 0x1, 0x0, 0x0, 0x4}, 0x0)
dup(0xffffffffffffffff)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1a1, 0x0)
setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000000)={0x4, @empty, 0x0, 0x3, 'lc\x00', 0x0, 0x4, 0xdc}, 0x2c)
bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x5, 0x8000, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xa]}, 0x3c)
unshare(0x40000000)

[  160.766267][ T9946] SELinux:  policydb string length 196616 does not match expected length 8
[  160.803142][ T9948] overlayfs: filesystem on './file0' not supported as upperdir
15:47:28 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:28 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x22, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  160.861110][ T9951] EXT4-fs (loop4): Unrecognized mount option "" or missing value
[  160.870031][ T9951] EXT4-fs (loop4): failed to parse options in superblock: 
[  160.880151][ T9964] SELinux:  policydb string length 327688 does not match expected length 8
15:47:28 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x9000000)

15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080006005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  160.916127][ T9951] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  160.957249][ T9951] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  160.978467][ T9981] SELinux:  policydb string length 393224 does not match expected length 8
[  160.982659][ T9951] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock
15:47:28 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xa000000)

[  160.999126][ T9951] EXT4-fs (loop4): mounted filesystem without journal. Opts: ; ,errors=continue
15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080007005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:28 executing program 3:
write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000800001900800000e00000010000000000000062c0a486beb56de128b9d0ea8f7acd362e24a37103de9564da8d13318dccc5d9ee8de46719cf70bd2293f44a16208ecbff64fd7837339235588e75c74be9c25dc60f34e6488cb2d1c5da18089436ce86d3d5b71523415f3f1db5e82cab7fc78d887f2528001b2e5656c6896dc5ee6c10eee904f2ebd9ed4c6ad8c95965d4d009c2b8d409032f136a067392f4e1ee2cb441d95f12db1d1fd0a200fc5c8657b45c1be1dcbb4138d2d2cd642f33f41cd704cce8b2805a02cd3bc0668146ceb4d1023e55f3b6f7cf4a0e83cffcb820aff7ccdeead03370b815391cad8854078cd0", @ANYRES32=r1, @ANYBLOB="fb2824ff00000000000007c6f6ba72d9001d00000000000000cf0000ff000000000044fd027a30e75d1884a988ad922c0b847e3970378cf14e398f88a745fca07adf35c245c49b6f0220875dc5f7af309e04"])
ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000580)=""/120)
r2 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r2, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
fcntl$setpipe(r4, 0x407, 0x0)
write(r4, &(0x7f0000000340), 0x41395527)
vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc050, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setattr(r0, &(0x7f00000002c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0)
socket(0x1, 0x5, 0x0)
ioctl(r2, 0x10001, &(0x7f00000004c0)="ad606acc0d87a67c5a60fba8d845096adfb8ac205fb51fed76e83ac995468a131395210368de04091a9bf63458446bad7fad2cf00d936398313b85facdfef163713f55612f5d56153f60ca9aeee47fd56bc85e090e162a")
r5 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4)
writev(r5, &(0x7f0000000300)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3)
sendto$inet(r5, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
getsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000380), &(0x7f00000003c0)=0x4)
pipe(&(0x7f0000000240))
pipe(&(0x7f0000000000)={<r6=>0xffffffffffffffff})
write$UHID_DESTROY(r6, &(0x7f0000000640), 0x4)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)

15:47:28 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xb000000)

15:47:28 executing program 4:
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000000)=0x400, 0x4)
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000014001680100001800c00030000000000000000001400030073797a5f74756e400000000000000000"], 0x3}}, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TIOCL_GETKMSGREDIRECT(r2, 0x541c, &(0x7f0000000100))
r3 = socket$unix(0x1, 0x2, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
timerfd_settime(r6, 0x1, &(0x7f0000000140), &(0x7f0000000180))
fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, <r7=>0x0})
sched_getaffinity(r7, 0x8, &(0x7f00000000c0))

15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080009005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:28 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x25, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  161.080413][T10003] SELinux:  policydb string length 458760 does not match expected length 8
15:47:28 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xc000000)

[  161.174897][T10024] SELinux:  policydb string length 589832 does not match expected length 8
15:47:28 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000a005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000b005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:28 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xd000000)

[  161.355275][T10041] SELinux:  policydb string length 655368 does not match expected length 8
15:47:28 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000c005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:28 executing program 4:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000001c0)=r2)
ioctl$KDDELIO(r0, 0x4b35, 0x8)
r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
writev(r4, &(0x7f0000000600), 0x0)
writev(r4, &(0x7f0000000440)=[{&(0x7f0000000140)='=', 0x1}], 0x1)
r5 = socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x1, 0xff, 0x1ff}, &(0x7f0000000180)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)}, 0x0)
inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x80000000)
r6 = socket$unix(0x1, 0x2, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f0000000280)={0x58a, 0x1f})
r8 = inotify_init()
inotify_add_watch(r8, &(0x7f00000000c0)='./file0\x00', 0x80000000)
write$9p(r0, &(0x7f0000001400)="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", 0x600)
r9 = socket$unix(0x1, 0x2, 0x0)
r10 = fcntl$dupfd(r9, 0x0, r9)
ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200)
r11 = open(&(0x7f00000000c0)='./file0\x00', 0x80420, 0x104)
r12 = syz_genetlink_get_family_id$fou(&(0x7f0000000780)='fou\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000280)={@rand_addr, <r13=>0x0}, &(0x7f0000000400)=0x14)
sendmsg$FOU_CMD_ADD(r11, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000580)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="e60127bd7000fbdbdf25010000000400050008000b005d0e378bdbbf2d74cf61237510083baa58eca9c3c6313d807e27bf70fe8fb6c9757ae838becd576a8815a2dc189c9bf34ce45c3f6dd2fb096fd8ff6faa8aedaea9c99a1cdd75", @ANYRES32=r13, @ANYBLOB="05000200f6ff000014000900ff02000000000000000000000000000108000600ac1414aa"], 0x44}, 0x1, 0x0, 0x0, 0x4000181}, 0x24000001)
sendmsg$FOU_CMD_GET(r10, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x88, r12, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}, @FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr="b58c053e9e8ca42fdd76048b5b7a07a6"}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={[], [], @empty}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x87}]}, 0x88}, 0x1, 0x0, 0x0, 0x4008002}, 0x20040014)
sendfile(r0, r3, 0x0, 0x1c500)
r14 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r14, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)
write$binfmt_misc(r14, &(0x7f0000000240)=ANY=[@ANYBLOB="73797a31c2e82e410e1ac53eb2ee4c3f2f00000000"], 0x15)

[  161.456658][T10051] SELinux:  policydb string length 720904 does not match expected length 8
[  161.540379][T10068] SELinux:  policydb string length 786440 does not match expected length 8
[  161.617726][T10074] SELinux: ebitmap: truncated map
[  161.627442][T10074] SELinux:  policydb magic number 0x317a7973 does not match expected magic number 0xf97cff8c
[  161.845756][T10062] SELinux:  policydb magic number 0x317a7973 does not match expected magic number 0xf97cff8c
[  161.856373][T10062] sel_write_load: 17 callbacks suppressed
[  161.856375][T10062] SELinux: failed to load policy
15:47:29 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2e, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:29 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0xe000000)

15:47:29 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:29 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000d005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:29 executing program 4:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x25, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:29 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001})
r1 = socket$nl_route(0x10, 0x3, 0x0)
ustat(0x8, &(0x7f0000000100))
sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x35a, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b000000000097a5ca5aa31051000000000000"], 0x28}}, 0x0)
write$tun(r0, &(0x7f0000000400)={@void, @val, @ipv6=@icmpv6={0x0, 0x6, '/g0', 0x40, 0x3a, 0x0, @loopback={0x2}, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "a86282", 0x0, 0x0, 0x0, @ipv4={[], [], @loopback}, @mcast1, [@routing={0x6}], "fd3b0ba2dcabdd82"}}}}}, 0x72)

15:47:29 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x10000000)

15:47:29 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000e005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  162.066033][T10085] SELinux:  policydb string length 851976 does not match expected length 8
[  162.081765][T10085] SELinux: failed to load policy
[  162.103073][T10092] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
15:47:29 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:29 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x11000000)

[  162.151191][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
15:47:29 executing program 3:
clone(0x800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x600, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'macvlan1\x00'})

15:47:29 executing program 4:
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = open(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r0, 0xffffffffffffffff)
socket$nl_xfrm(0x10, 0x3, 0x6)
socket$key(0xf, 0x3, 0x2)
r1 = open(0x0, 0x0, 0x0)
ftruncate(r1, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet6(0xa, 0x803, 0x2)
connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x20000}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8)
sendmmsg(r2, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x8, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10)
pipe(&(0x7f0000000200))
socket$pptp(0x18, 0x1, 0x2)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)

15:47:29 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x48, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:29 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080011005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:29 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x12000000)

[  162.277521][T10118] SELinux:  policydb string length 917512 does not match expected length 8
[  162.286820][T10118] SELinux: failed to load policy
15:47:29 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xb, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:29 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/302], &(0x7f0000000140)='GPL\x00', 0x2, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64)
r0 = socket$unix(0x1, 0x2, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
fallocate(r3, 0x8, 0x80, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0x1c}}, 0x8000)
r5 = socket$unix(0x1, 0x2, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$nl_generic(0x10, 0x3, 0x10)
r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00')
sendmsg$SEG6_CMD_DUMPHMAC(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r8, 0x1}, 0x14}}, 0x0)
sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x54, r8, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xb8a}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040000}, 0x10)

[  162.410663][T10148] SELinux:  policydb string length 1114120 does not match expected length 8
15:47:29 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x25000000)

[  162.458178][T10148] SELinux: failed to load policy
15:47:29 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080012005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:29 executing program 3:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:30 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4c, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:30 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x40000000)

15:47:30 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080020005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  162.591761][T10186] SELinux:  policydb string length 1179656 does not match expected length 8
[  162.604835][T10186] SELinux: failed to load policy
[  162.652441][T10200] SELinux:  policydb string length 2097160 does not match expected length 8
[  162.661780][T10200] SELinux: failed to load policy
15:47:30 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xc, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:30 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x46030000)

15:47:30 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080025005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:30 executing program 3:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
gettid()
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, r0)
write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000580)={0x18}, 0x18)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
socket$key(0xf, 0x3, 0x2)
sendmsg$nl_xfrm(r1, 0x0, 0x0)
open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0)
socket$pppl2tp(0x18, 0x1, 0x1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
r3 = socket$inet6(0xa, 0x400000000803, 0x5f)
sendfile(r3, 0xffffffffffffffff, 0x0, 0x80081d00c0d0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0)
modify_ldt$write(0x1, &(0x7f0000000000)={0x7, 0x0, 0x4000, 0x1, 0x0, 0x1, 0x1, 0x1}, 0x10)
sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27)
fdatasync(r2)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r4 = socket$unix(0x1, 0x2, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$BLKRAGET(r5, 0x1263, &(0x7f0000000040))
pipe(0x0)

15:47:30 executing program 4:
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={[], [], @remote}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x8}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0)
sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x411040}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4010004}, 0xc0000)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x1, 0x0, 0x0, 0x0, 0x4c8e], [0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1b, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d9d], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff], [0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40000000]}, 0x45c)
link(&(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000240)='./file0\x00')
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x2000000000000}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0)
unlink(&(0x7f0000000040)='./file0\x00')

15:47:30 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x68, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:30 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x48000000)

15:47:30 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080040005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  162.829229][T10216] SELinux:  policydb string length 2424840 does not match expected length 8
[  162.852605][T10216] SELinux: failed to load policy
15:47:30 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x4c000000)

15:47:30 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080048005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  162.936995][T10241] SELinux:  policydb string length 4194312 does not match expected length 8
[  162.963342][T10241] SELinux: failed to load policy
15:47:30 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xd, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:30 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:30 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908004c005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:30 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x68000000)

[  163.153795][T10253] SELinux:  policydb string length 4718600 does not match expected length 8
[  163.174571][T10253] SELinux: failed to load policy
[  163.298521][T10275] SELinux:  policydb string length 4980744 does not match expected length 8
[  163.307614][T10275] SELinux: failed to load policy
[  163.312990][   T22] kauditd_printk_skb: 562 callbacks suppressed
[  163.312998][   T22] audit: type=1326 audit(1580485650.796:2644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  163.345570][   T22] audit: type=1326 audit(1580485650.796:2645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
15:47:30 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080060005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

[  163.378214][   T22] audit: type=1326 audit(1580485650.796:2646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  163.413266][   T22] audit: type=1326 audit(1580485650.796:2647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  163.450879][   T22] audit: type=1326 audit(1580485650.796:2648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
15:47:31 executing program 5:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xe, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

[  163.482243][   T22] audit: type=1326 audit(1580485650.796:2649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  163.510662][T10290] SELinux:  policydb string length 6291464 does not match expected length 8
[  163.512229][   T22] audit: type=1326 audit(1580485650.796:2650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  163.545533][   T22] audit: type=1326 audit(1580485650.796:2651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000
[  163.571353][   T22] audit: type=1326 audit(1580485650.796:2652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000
[  163.597503][   T22] audit: type=1326 audit(1580485650.796:2653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000
[  163.635299][T10292] EXT4-fs: 41 callbacks suppressed
[  163.635308][T10292] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000
[  163.635325][T10296] kasan: CONFIG_KASAN_INLINE enabled
[  163.654372][T10296] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  163.662546][T10296] general protection fault: 0000 [#1] PREEMPT SMP KASAN
[  163.669480][T10296] CPU: 0 PID: 10296 Comm: udevd Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0
[  163.678830][T10296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  163.688877][T10296] RIP: 0010:path_openat+0x324/0x3c00
[  163.694172][T10296] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00
[  163.713803][T10296] RSP: 0018:ffff8881c89874c0 EFLAGS: 00010247
[  163.719847][T10296] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881c89876e8
[  163.727800][T10296] RDX: ffff8881c7c7fdd8 RSI: 0000000000000000 RDI: 0000000000000004
[  163.735773][T10296] RBP: ffff8881c8987790 R08: ffffffff817828c1 R09: 0000000000000003
[  163.743733][T10296] R10: ffffed1039130e4b R11: 0000000000000004 R12: ffff8881c89877e8
[  163.751687][T10296] R13: ffff888194318100 R14: ffff8881c89879f0 R15: dffffc0000000000
[  163.759639][T10296] FS:  00007f5e50bf97a0(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000
[  163.768545][T10296] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  163.775110][T10296] CR2: 00007f5e505b6518 CR3: 00000001c0001003 CR4: 00000000001606f0
[  163.783064][T10296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  163.791019][T10296] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  163.798970][T10296] Call Trace:
[  163.802345][T10296]  ? stack_trace_save+0x1e0/0x1e0
[  163.807381][T10296]  ? is_bpf_text_address+0x2c8/0x2e0
[  163.812655][T10296]  ? stack_trace_save+0x1e0/0x1e0
[  163.817680][T10296]  ? do_filp_open+0x430/0x430
[  163.822340][T10296]  ? stack_trace_save+0x111/0x1e0
[  163.827411][T10296]  ? stack_trace_snprint+0x150/0x150
[  163.832676][T10296]  do_filp_open+0x1f7/0x430
[  163.837202][T10296]  ? vfs_tmpfile+0x230/0x230
[  163.841765][T10296]  ? load_elf_binary+0x1abd/0x3720
[  163.846926][T10296]  ? memset+0x31/0x40
[  163.850892][T10296]  ? rw_verify_area+0x360/0x360
[  163.855743][T10296]  do_open_execat+0x178/0x860
[  163.860402][T10296]  ? security_file_permission+0x241/0x350
[  163.866097][T10296]  ? open_exec+0x60/0x60
[  163.870343][T10296]  ? __should_failslab+0x11a/0x160
[  163.875436][T10296]  ? getname_kernel+0x59/0x2f0
[  163.880268][T10296]  ? getname_kernel+0x15d/0x2f0
[  163.885091][T10296]  ? memcpy+0x49/0x60
[  163.889047][T10296]  ? getname_kernel+0x214/0x2f0
[  163.893890][T10296]  open_exec+0x3d/0x60
[  163.897967][T10296]  load_elf_binary+0x1abd/0x3720
[  163.902917][T10296]  ? populate_vma_page_range+0x100/0x100
[  163.908546][T10296]  ? __kasan_check_write+0x14/0x20
[  163.913745][T10296]  ? _raw_read_unlock+0x12/0x30
[  163.918571][T10296]  ? load_script+0x184/0x970
[  163.923136][T10296]  ? bm_evict_inode+0xd0/0xd0
[  163.927787][T10296]  ? copy_strings+0x7e4/0x900
[  163.932445][T10296]  ? load_script+0x970/0x970
[  163.937019][T10296]  search_binary_handler+0x190/0x5e0
[  163.942287][T10296]  __do_execve_file+0x12a2/0x1c00
[  163.947296][T10296]  ? do_execve_file+0x40/0x40
[  163.952026][T10296]  ? getname_flags+0x214/0x640
[  163.956809][T10296]  __x64_sys_execve+0x94/0xb0
[  163.961472][T10296]  do_syscall_64+0xc0/0x100
[  163.965961][T10296]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  163.971844][T10296] RIP: 0033:0x7f5e502dd207
[  163.976259][T10296] Code: 77 19 f4 48 89 d7 44 89 c0 0f 05 48 3d 00 f0 ff ff 76 e0 f7 d8 64 41 89 01 eb d8 f7 d8 64 41 89 01 eb df b8 3b 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 f3 c3 48 8b 15 00 8c 2d 00 f7 d8 64 89 02
[  163.995970][T10296] RSP: 002b:00007fff9254f418 EFLAGS: 00000206 ORIG_RAX: 000000000000003b
[  164.004497][T10296] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f5e502dd207
[  164.012448][T10296] RDX: 0000000001c7aae0 RSI: 00007fff9254f510 RDI: 00007fff92550520
[  164.020401][T10296] RBP: 0000000000625500 R08: 000000000000019c R09: 000000000000019c
[  164.028520][T10296] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000001c7aae0
[  164.036486][T10296] R13: 0000000000000007 R14: 0000000001b1e030 R15: 0000000000000005
[  164.044445][T10296] Modules linked in:
15:47:31 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c)
sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0)
sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0)
socket(0x0, 0x0, 0x0)
socket(0x0, 0x0, 0x0)
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
getpid()
ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
write$selinux_user(r2, &(0x7f0000000080)={'system_u:object_r:ipmi_device_t:s0', 0x20, 'user_u\x00'}, 0x2a)
open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0)

15:47:31 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x6c000000)

15:47:31 executing program 1:
open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0)
mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x74, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0])

15:47:31 executing program 0:
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080068005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38)

15:47:31 executing program 4:
sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0)
r0 = creat(0x0, 0x10)
setresuid(0x0, 0x0, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0)
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0)
creat(&(0x7f0000000180)='./file0\x00', 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000402)
socket$inet6(0xa, 0x400000000803, 0x0)
close(0xffffffffffffffff)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfff}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0), 0x0, 0x2, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00')
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(0x0, 0x0, 0x0)
write$9p(0xffffffffffffffff, 0x0, 0x0)
unshare(0x40000000)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
fchdir(r1)
r2 = socket$unix(0x1, 0x2, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00')
r5 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB='\x00'/14], 0x3}, 0x1, 0x0, 0x0, 0x24000810}, 0x0)
sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="48fcffff74881523335b6f07950f347bb62e26602d7d48005abc94326f822653fbda43fe509a5ad45385ca1e4b62b0637a8fa9022d3998721e8fcbeaebfe764415e15fea3dc5a7cdb0ec0000de2cbe744c0db504fbbed75eea7e48e0e68f5329ece017022792454998112f4e29630110cf293efd6bb8eeb9fcdfb27cacd90574095a582c801fe5e5c3649a6b660059b109eb204e94836407846b00"/172, @ANYRES16=r4, @ANYBLOB="0008000000000014000100ff01000000000000000000000000000105000600070000000800004083693620e9a44ecee43bbf45e726d1cc620100000001000000dafbcaaf5369a21c6b79c23cf205a64768aab447c93668083f4eda5745cb3b00"/107], 0x48}, 0x1, 0x0, 0x0, 0x90}, 0x24000000)

[  164.049528][T10296] ---[ end trace 145f28c1257a2e39 ]---
[  164.055259][T10296] RIP: 0010:path_openat+0x324/0x3c00
[  164.061111][T10296] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00
[  164.083574][T10296] RSP: 0018:ffff8881c89874c0 EFLAGS: 00010247
[  164.090223][T10296] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881c89876e8
[  164.098759][T10296] RDX: ffff8881c7c7fdd8 RSI: 0000000000000000 RDI: 0000000000000004
[  164.107242][T10296] RBP: ffff8881c8987790 R08: ffffffff817828c1 R09: 0000000000000003
[  164.115416][T10296] R10: ffffed1039130e4b R11: 0000000000000004 R12: ffff8881c89877e8
[  164.124016][T10308] SELinux:  policydb string length 6815752 does not match expected length 8
[  164.124077][T10296] R13: ffff888194318100 R14: ffff8881c89879f0 R15: dffffc0000000000
[  164.141029][T10296] FS:  00007f5e50bf97a0(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000
15:47:31 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]})
socket$unix(0x1, 0x2, 0x74000000)

[  164.160558][T10296] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  164.167219][T10296] CR2: 00000000011fa9b8 CR3: 00000001c0001006 CR4: 00000000001606e0
[  164.177157][T10296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  164.185463][T10296] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  164.194060][T10296] Kernel panic - not syncing: Fatal exception
[  164.200904][T10296] Kernel Offset: disabled
[  164.205305][T10296] Rebooting in 86400 seconds..