7712] kmem_cache_alloc+0x5b/0x310 [ 1044.738576] ? mark_held_locks+0x9e/0xe0 [ 1044.739441] create_object.isra.0+0x3a/0xa30 [ 1044.740374] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1044.741461] kmem_cache_alloc_trace+0x151/0x320 [ 1044.742450] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1044.743496] __list_lru_init+0x44d/0x890 [ 1044.744368] alloc_super+0x8b8/0xa90 [ 1044.745159] sget_fc+0x110/0x860 [ 1044.745873] ? set_anon_super+0xc0/0xc0 [ 1044.746717] ? shmem_put_link+0x120/0x120 [ 1044.747598] get_tree_nodev+0x24/0x1d0 [ 1044.748437] vfs_get_tree+0x8e/0x300 [ 1044.749230] path_mount+0x1490/0x21e0 [ 1044.750044] ? strncpy_from_user+0x9e/0x470 [ 1044.750959] ? finish_automount+0xa90/0xa90 [ 1044.751877] ? getname_flags.part.0+0x1dd/0x4f0 [ 1044.752871] __x64_sys_mount+0x282/0x300 [ 1044.753730] ? copy_mnt_ns+0xa00/0xa00 [ 1044.754562] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1044.755667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1044.756774] do_syscall_64+0x33/0x40 [ 1044.757561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1044.758642] RIP: 0033:0x7f749eb7204a [ 1044.759427] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1044.763345] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1044.764998] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1044.765915] FAULT_INJECTION: forcing a failure. [ 1044.765915] name failslab, interval 1, probability 0, space 0, times 0 [ 1044.766517] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1044.766530] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1044.766542] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1044.766554] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1044.775928] SELinux: duplicate or incompatible mount options [ 1044.776482] CPU: 1 PID: 7502 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1044.776502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1044.780844] Call Trace: [ 1044.781392] dump_stack+0x107/0x167 [ 1044.782159] should_fail.cold+0x5/0xa [ 1044.782965] ? create_object.isra.0+0x3a/0xa30 [ 1044.783931] should_failslab+0x5/0x20 [ 1044.784736] kmem_cache_alloc+0x5b/0x310 [ 1044.785601] create_object.isra.0+0x3a/0xa30 [ 1044.786521] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1044.787596] kmem_cache_alloc+0x159/0x310 [ 1044.788486] dup_fd+0x89/0xe40 [ 1044.789164] ? audit_filter_inodes+0x40/0x40 [ 1044.790116] ? security_task_alloc+0xe6/0x260 [ 1044.791071] copy_process+0x197c/0x78b0 [ 1044.791923] ? SOFTIRQ_verbose+0x10/0x10 [ 1044.792796] ? __lockdep_reset_lock+0x180/0x180 [ 1044.793776] ? mark_lock+0xf5/0x2df0 [ 1044.794593] ? __cleanup_sighand+0xb0/0xb0 [ 1044.795511] ? _copy_from_user+0xfb/0x1b0 [ 1044.796419] kernel_clone+0xe7/0x980 [ 1044.797208] ? __lockdep_reset_lock+0x180/0x180 [ 1044.798200] ? create_io_thread+0xf0/0xf0 [ 1044.799095] ? ksys_write+0x21a/0x260 [ 1044.799909] ? lock_downgrade+0x6d0/0x6d0 [ 1044.800794] __do_sys_clone3+0x1e5/0x320 [ 1044.801654] ? __do_sys_clone+0x110/0x110 [ 1044.802560] ? rcu_read_lock_any_held+0x75/0xa0 [ 1044.803543] ? vfs_write+0x354/0xb10 [ 1044.804348] ? fput_many+0x2f/0x1a0 [ 1044.805120] ? ksys_write+0x1a9/0x260 [ 1044.805935] ? __ia32_sys_read+0xb0/0xb0 [ 1044.806800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1044.807918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1044.809020] ? trace_hardirqs_on+0x5b/0x180 [ 1044.809947] do_syscall_64+0x33/0x40 [ 1044.810751] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1044.811857] RIP: 0033:0x7fa1817f7b19 [ 1044.812661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1044.816622] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1044.818253] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1044.819807] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1044.821361] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1044.822912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1044.824470] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1044.838070] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:19:33 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:19:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 15:19:33 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000001fc0)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002140)=[{{&(0x7f00000000c0), 0x6e, &(0x7f0000000040), 0x0, &(0x7f0000000140)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}}, {{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f0000002040)=""/244, 0xf4}, {&(0x7f0000000340)=""/137, 0x89}], 0x2, &(0x7f0000000240)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{&(0x7f0000000500)=@abs, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000580)=""/242, 0xf2}], 0x1, &(0x7f00000006c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x160}}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000840)=""/13, 0xd}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/91, 0x5b}], 0x3, &(0x7f0000001940)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000001980)=@abs, 0x6e, &(0x7f0000001e00)=[{&(0x7f0000000440)=""/108, 0x6c}, {&(0x7f0000001a80)=""/123, 0x7b}, {&(0x7f0000001b00)=""/155, 0x9b}, {&(0x7f0000001bc0)=""/76, 0x4c}, {&(0x7f0000001c40)=""/181, 0xb5}, {&(0x7f0000001d00)}, {&(0x7f0000001d40)=""/165, 0xa5}], 0x7}}], 0x5, 0x40000000, &(0x7f0000002000)={r1, r2+60000000}) bind$802154_dgram(r3, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa2}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) [ 1044.907840] SELinux: duplicate or incompatible mount options [ 1044.922694] SELinux: duplicate or incompatible mount options 15:19:33 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 79) [ 1045.024764] FAULT_INJECTION: forcing a failure. [ 1045.024764] name failslab, interval 1, probability 0, space 0, times 0 [ 1045.027171] CPU: 0 PID: 7514 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1045.028633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1045.030384] Call Trace: [ 1045.030950] dump_stack+0x107/0x167 [ 1045.031745] should_fail.cold+0x5/0xa [ 1045.032555] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1045.033629] should_failslab+0x5/0x20 [ 1045.034440] kmem_cache_alloc_trace+0x55/0x320 [ 1045.035405] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1045.036503] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1045.037552] __list_lru_init+0x44d/0x890 [ 1045.038422] alloc_super+0x8b8/0xa90 [ 1045.039225] sget_fc+0x110/0x860 [ 1045.039952] ? set_anon_super+0xc0/0xc0 [ 1045.040810] ? shmem_put_link+0x120/0x120 [ 1045.041684] get_tree_nodev+0x24/0x1d0 [ 1045.042520] vfs_get_tree+0x8e/0x300 [ 1045.043307] path_mount+0x1490/0x21e0 [ 1045.044132] ? strncpy_from_user+0x9e/0x470 [ 1045.045049] ? finish_automount+0xa90/0xa90 [ 1045.045965] ? getname_flags.part.0+0x1dd/0x4f0 [ 1045.046964] __x64_sys_mount+0x282/0x300 [ 1045.047835] ? copy_mnt_ns+0xa00/0xa00 [ 1045.048671] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1045.049779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1045.050880] do_syscall_64+0x33/0x40 [ 1045.051674] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1045.052772] RIP: 0033:0x7f749eb7204a [ 1045.053562] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1045.057484] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1045.059135] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1045.060667] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1045.062192] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1045.063717] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1045.065230] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 15:19:47 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:19:47 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x300, 0x0}}], 0x324, 0x0) 15:19:47 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x300, 0x0}}], 0x324, 0x0) 15:19:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) clone3(&(0x7f0000000340)={0x220000200, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0xe}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) 15:19:47 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000040)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) 15:19:47 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1058.312102] SELinux: duplicate or incompatible mount options 15:19:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 15:19:47 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 80) [ 1058.316007] SELinux: duplicate or incompatible mount options [ 1058.334933] FAULT_INJECTION: forcing a failure. [ 1058.334933] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.336600] CPU: 0 PID: 7534 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1058.337540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1058.338684] Call Trace: [ 1058.339052] dump_stack+0x107/0x167 [ 1058.339557] should_fail.cold+0x5/0xa [ 1058.339846] FAULT_INJECTION: forcing a failure. [ 1058.339846] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.340109] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1058.343340] should_failslab+0x5/0x20 [ 1058.343881] kmem_cache_alloc_trace+0x55/0x320 [ 1058.344505] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1058.345202] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1058.345884] __list_lru_init+0x44d/0x890 [ 1058.346445] alloc_super+0x8b8/0xa90 [ 1058.346965] sget_fc+0x110/0x860 [ 1058.347433] ? set_anon_super+0xc0/0xc0 [ 1058.347983] ? shmem_put_link+0x120/0x120 [ 1058.348542] get_tree_nodev+0x24/0x1d0 [ 1058.349073] vfs_get_tree+0x8e/0x300 [ 1058.349579] path_mount+0x1490/0x21e0 [ 1058.350105] ? strncpy_from_user+0x9e/0x470 [ 1058.350692] ? finish_automount+0xa90/0xa90 [ 1058.351281] ? getname_flags.part.0+0x1dd/0x4f0 [ 1058.351931] __x64_sys_mount+0x282/0x300 [ 1058.352485] ? copy_mnt_ns+0xa00/0xa00 [ 1058.353022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.353735] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1058.354435] do_syscall_64+0x33/0x40 [ 1058.354940] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1058.355638] RIP: 0033:0x7f749eb7204a [ 1058.356150] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1058.358658] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1058.359690] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1058.360666] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1058.361633] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1058.362598] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1058.363562] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1058.364563] CPU: 1 PID: 7531 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1058.366101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1058.367967] Call Trace: [ 1058.368567] dump_stack+0x107/0x167 [ 1058.369389] should_fail.cold+0x5/0xa [ 1058.370249] ? alloc_fdtable+0x9e/0x2c0 [ 1058.371143] should_failslab+0x5/0x20 [ 1058.372007] kmem_cache_alloc_trace+0x55/0x320 [ 1058.373026] ? rwlock_bug.part.0+0x90/0x90 [ 1058.373979] alloc_fdtable+0x9e/0x2c0 [ 1058.374840] dup_fd+0x92d/0xe40 [ 1058.375598] copy_process+0x197c/0x78b0 [ 1058.376487] ? SOFTIRQ_verbose+0x10/0x10 [ 1058.377393] ? __lockdep_reset_lock+0x180/0x180 [ 1058.378423] ? mark_lock+0xf5/0x2df0 [ 1058.379278] ? __cleanup_sighand+0xb0/0xb0 [ 1058.380255] ? _copy_from_user+0xfb/0x1b0 [ 1058.381188] kernel_clone+0xe7/0x980 [ 1058.382014] ? __lockdep_reset_lock+0x180/0x180 [ 1058.383048] ? create_io_thread+0xf0/0xf0 [ 1058.384000] ? ksys_write+0x21a/0x260 [ 1058.384853] ? lock_downgrade+0x6d0/0x6d0 [ 1058.385784] __do_sys_clone3+0x1e5/0x320 [ 1058.386696] ? __do_sys_clone+0x110/0x110 [ 1058.387644] ? rcu_read_lock_any_held+0x75/0xa0 [ 1058.388690] ? vfs_write+0x354/0xb10 [ 1058.389523] ? fput_many+0x2f/0x1a0 [ 1058.390337] ? ksys_write+0x1a9/0x260 [ 1058.391191] ? __ia32_sys_read+0xb0/0xb0 [ 1058.392112] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.393279] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1058.394418] ? trace_hardirqs_on+0x5b/0x180 [ 1058.395377] do_syscall_64+0x33/0x40 [ 1058.396215] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1058.397350] RIP: 0033:0x7fa1817f7b19 [ 1058.398174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1058.402247] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1058.403946] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1058.405523] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1058.407101] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1058.408685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1058.410247] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:19:47 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x159e, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1058.435254] SELinux: duplicate or incompatible mount options [ 1058.436082] cgroup: fork rejected by pids controller in /syz1 [ 1058.441174] SELinux: duplicate or incompatible mount options 15:19:47 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:19:47 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) [ 1058.529232] SELinux: duplicate or incompatible mount options 15:19:47 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 81) [ 1058.537792] SELinux: duplicate or incompatible mount options 15:19:47 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:19:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) clone3(&(0x7f0000000340)={0x220000200, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0xe}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) [ 1058.587756] FAULT_INJECTION: forcing a failure. [ 1058.587756] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.589175] CPU: 0 PID: 7550 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1058.589994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1058.590982] Call Trace: [ 1058.591304] dump_stack+0x107/0x167 [ 1058.591744] should_fail.cold+0x5/0xa [ 1058.592210] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1058.592816] should_failslab+0x5/0x20 [ 1058.593270] kmem_cache_alloc_trace+0x55/0x320 [ 1058.593817] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1058.594425] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1058.595030] __list_lru_init+0x44d/0x890 [ 1058.595538] alloc_super+0x8b8/0xa90 [ 1058.596006] sget_fc+0x110/0x860 [ 1058.596422] ? set_anon_super+0xc0/0xc0 [ 1058.596910] ? shmem_put_link+0x120/0x120 [ 1058.597423] get_tree_nodev+0x24/0x1d0 [ 1058.597903] vfs_get_tree+0x8e/0x300 [ 1058.598359] path_mount+0x1490/0x21e0 [ 1058.598834] ? strncpy_from_user+0x9e/0x470 [ 1058.599375] ? finish_automount+0xa90/0xa90 [ 1058.599912] ? getname_flags.part.0+0x1dd/0x4f0 [ 1058.600492] __x64_sys_mount+0x282/0x300 [ 1058.600987] ? copy_mnt_ns+0xa00/0xa00 [ 1058.601469] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.602110] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1058.602742] do_syscall_64+0x33/0x40 [ 1058.603198] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1058.603828] RIP: 0033:0x7f749eb7204a [ 1058.604289] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1058.606521] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1058.607448] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1058.608316] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1058.609181] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1058.610047] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1058.610912] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 15:19:47 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:19:47 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r0, &(0x7f0000000040)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x3, 0xfffe}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x0) [ 1058.662283] SELinux: duplicate or incompatible mount options [ 1058.666014] SELinux: duplicate or incompatible mount options 15:19:47 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x9e15, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1058.755256] SELinux: duplicate or incompatible mount options [ 1058.761118] SELinux: duplicate or incompatible mount options 15:19:47 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x500, 0x0}}], 0x324, 0x0) 15:20:03 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x500, 0x0}}], 0x324, 0x0) [ 1074.828963] SELinux: duplicate or incompatible mount options [ 1074.835289] SELinux: duplicate or incompatible mount options [ 1074.835449] FAULT_INJECTION: forcing a failure. [ 1074.835449] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.839921] CPU: 1 PID: 7677 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1074.842067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1074.844513] Call Trace: [ 1074.845289] dump_stack+0x107/0x167 [ 1074.846403] should_fail.cold+0x5/0xa [ 1074.847560] ? create_object.isra.0+0x3a/0xa30 [ 1074.848941] should_failslab+0x5/0x20 [ 1074.850108] kmem_cache_alloc+0x5b/0x310 [ 1074.851345] ? mark_held_locks+0x9e/0xe0 [ 1074.852622] create_object.isra.0+0x3a/0xa30 [ 1074.853952] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1074.855478] kmem_cache_alloc_trace+0x151/0x320 [ 1074.856918] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1074.858420] __list_lru_init+0x44d/0x890 [ 1074.859674] alloc_super+0x8b8/0xa90 [ 1074.860797] sget_fc+0x110/0x860 [ 1074.861822] ? set_anon_super+0xc0/0xc0 [ 1074.863009] ? shmem_put_link+0x120/0x120 [ 1074.864256] get_tree_nodev+0x24/0x1d0 [ 1074.865264] vfs_get_tree+0x8e/0x300 [ 1074.866210] path_mount+0x1490/0x21e0 [ 1074.867199] ? strncpy_from_user+0x9e/0x470 [ 1074.868307] ? finish_automount+0xa90/0xa90 [ 1074.869392] ? getname_flags.part.0+0x1dd/0x4f0 [ 1074.870568] __x64_sys_mount+0x282/0x300 [ 1074.871579] ? copy_mnt_ns+0xa00/0xa00 [ 1074.872577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1074.873885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1074.875182] do_syscall_64+0x33/0x40 [ 1074.876138] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1074.877399] RIP: 0033:0x7f749eb7204a [ 1074.878345] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1074.882932] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1074.884863] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1074.886658] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 15:20:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000340)={0x220000200, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0xe}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) 15:20:03 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x600, 0x0}}], 0x324, 0x0) 15:20:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:20:03 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:03 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 82) 15:20:03 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r1, &(0x7f0000000080)={0x24, @long={0x3, 0x1}}, 0x14) sendmmsg$sock(r1, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x40080}, 0x48010) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) getpeername(r3, 0x0, &(0x7f0000000600)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r3, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x44, r2, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x101}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x44040004}, 0x4) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x100, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x60}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x8081) r4 = dup(r0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r7, @ANYBLOB='\b\x00?\x00\x00@'], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r6, 0xa12, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x25}, @val={0x8}, @val={0xc, 0x99, {0x7f, 0x79}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040), &(0x7f00000000c0)=0x10) 15:20:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 15:20:03 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1074.888492] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1074.890775] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1074.892632] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1074.927518] FAULT_INJECTION: forcing a failure. [ 1074.927518] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.930518] CPU: 1 PID: 7686 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1074.932282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1074.934385] Call Trace: [ 1074.935071] dump_stack+0x107/0x167 [ 1074.936019] should_fail.cold+0x5/0xa [ 1074.936512] SELinux: duplicate or incompatible mount options [ 1074.936989] ? create_object.isra.0+0x3a/0xa30 [ 1074.937013] should_failslab+0x5/0x20 [ 1074.940204] kmem_cache_alloc+0x5b/0x310 [ 1074.941244] create_object.isra.0+0x3a/0xa30 [ 1074.942356] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1074.943642] kmem_cache_alloc_trace+0x151/0x320 [ 1074.944799] ? rwlock_bug.part.0+0x90/0x90 [ 1074.945882] alloc_fdtable+0x9e/0x2c0 [ 1074.946850] dup_fd+0x92d/0xe40 [ 1074.946910] SELinux: duplicate or incompatible mount options [ 1074.947708] copy_process+0x197c/0x78b0 [ 1074.947737] ? SOFTIRQ_verbose+0x10/0x10 [ 1074.950807] ? __lockdep_reset_lock+0x180/0x180 [ 1074.951972] ? mark_lock+0xf5/0x2df0 [ 1074.952962] ? __cleanup_sighand+0xb0/0xb0 [ 1074.954036] ? _copy_from_user+0xfb/0x1b0 [ 1074.955084] kernel_clone+0xe7/0x980 [ 1074.956021] ? __lockdep_reset_lock+0x180/0x180 [ 1074.957196] ? create_io_thread+0xf0/0xf0 [ 1074.958262] ? ksys_write+0x21a/0x260 [ 1074.959207] ? lock_downgrade+0x6d0/0x6d0 [ 1074.960266] __do_sys_clone3+0x1e5/0x320 [ 1074.961282] ? __do_sys_clone+0x110/0x110 [ 1074.962346] ? rcu_read_lock_any_held+0x75/0xa0 [ 1074.963509] ? vfs_write+0x354/0xb10 [ 1074.964447] ? fput_many+0x2f/0x1a0 [ 1074.965357] ? ksys_write+0x1a9/0x260 [ 1074.966300] ? __ia32_sys_read+0xb0/0xb0 [ 1074.967314] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1074.968626] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1074.969906] ? trace_hardirqs_on+0x5b/0x180 [ 1074.970983] do_syscall_64+0x33/0x40 [ 1074.971917] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1074.973204] RIP: 0033:0x7fa1817f7b19 [ 1074.974116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1074.978452] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1074.980187] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1074.981797] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1074.983406] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1074.985024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1074.986629] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:20:03 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xe0ffff, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1075.092697] SELinux: duplicate or incompatible mount options [ 1075.101224] SELinux: duplicate or incompatible mount options 15:20:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000340)={0x220000200, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0xe}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) 15:20:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x11, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:20:04 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:04 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x2) getsockopt$sock_int(r1, 0x1, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) [ 1075.228916] SELinux: duplicate or incompatible mount options [ 1075.233870] SELinux: duplicate or incompatible mount options 15:20:04 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000340)={0x220000200, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0xe}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) [ 1075.345463] SELinux: duplicate or incompatible mount options [ 1075.352587] SELinux: duplicate or incompatible mount options [ 1075.380900] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:20:19 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:20:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 15:20:19 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x700, 0x0}}], 0x324, 0x0) 15:20:19 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x600, 0x0}}], 0x324, 0x0) 15:20:19 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:19 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 83) 15:20:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(0x0, 0x0) 15:20:19 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) bind$802154_dgram(r0, &(0x7f0000000040)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) [ 1090.222159] FAULT_INJECTION: forcing a failure. [ 1090.222159] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.224019] CPU: 1 PID: 7931 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1090.225118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1090.226428] Call Trace: [ 1090.226852] dump_stack+0x107/0x167 [ 1090.227438] should_fail.cold+0x5/0xa [ 1090.228050] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1090.228860] should_failslab+0x5/0x20 [ 1090.229467] kmem_cache_alloc_trace+0x55/0x320 [ 1090.230196] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1090.231004] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1090.231791] FAULT_INJECTION: forcing a failure. [ 1090.231791] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.231804] __list_lru_init+0x44d/0x890 [ 1090.231829] alloc_super+0x8b8/0xa90 [ 1090.235503] sget_fc+0x110/0x860 [ 1090.236042] ? set_anon_super+0xc0/0xc0 [ 1090.236677] ? shmem_put_link+0x120/0x120 [ 1090.237331] get_tree_nodev+0x24/0x1d0 [ 1090.237942] vfs_get_tree+0x8e/0x300 [ 1090.238534] path_mount+0x1490/0x21e0 [ 1090.239139] ? strncpy_from_user+0x9e/0x470 [ 1090.239817] ? finish_automount+0xa90/0xa90 [ 1090.240522] ? getname_flags.part.0+0x1dd/0x4f0 [ 1090.241256] __x64_sys_mount+0x282/0x300 [ 1090.241888] ? copy_mnt_ns+0xa00/0xa00 [ 1090.242511] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1090.243345] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1090.244179] do_syscall_64+0x33/0x40 [ 1090.244766] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1090.245575] RIP: 0033:0x7f749eb7204a [ 1090.246155] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.249744] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1090.251773] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1090.253192] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1090.254363] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1090.255544] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1090.256723] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1090.257931] CPU: 0 PID: 7921 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1090.259460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1090.261279] Call Trace: [ 1090.261870] dump_stack+0x107/0x167 [ 1090.262681] should_fail.cold+0x5/0xa [ 1090.263521] ? kvmalloc_node+0x119/0x170 [ 1090.264423] should_failslab+0x5/0x20 [ 1090.265261] __kmalloc_node+0x76/0x420 [ 1090.266131] kvmalloc_node+0x119/0x170 [ 1090.266993] alloc_fdtable+0xed/0x2c0 [ 1090.267837] dup_fd+0x92d/0xe40 [ 1090.268611] copy_process+0x197c/0x78b0 [ 1090.269484] ? SOFTIRQ_verbose+0x10/0x10 [ 1090.270388] ? __lockdep_reset_lock+0x180/0x180 [ 1090.271460] ? __cleanup_sighand+0xb0/0xb0 [ 1090.272446] ? _copy_from_user+0xfb/0x1b0 [ 1090.273374] kernel_clone+0xe7/0x980 [ 1090.274192] ? __lockdep_reset_lock+0x180/0x180 [ 1090.275214] ? create_io_thread+0xf0/0xf0 [ 1090.276152] ? ksys_write+0x21a/0x260 [ 1090.277001] ? lock_downgrade+0x6d0/0x6d0 [ 1090.277923] __do_sys_clone3+0x1e5/0x320 [ 1090.278816] ? __do_sys_clone+0x110/0x110 [ 1090.279767] ? rcu_read_lock_any_held+0x75/0xa0 [ 1090.280792] ? vfs_write+0x354/0xb10 [ 1090.281618] ? fput_many+0x2f/0x1a0 [ 1090.282418] ? ksys_write+0x1a9/0x260 [ 1090.283255] ? __ia32_sys_read+0xb0/0xb0 [ 1090.284155] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1090.285319] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1090.286444] ? trace_hardirqs_on+0x5b/0x180 15:20:19 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = gettid() fcntl$lock(r1, 0x25, &(0x7f00000000c0)={0x2, 0x4, 0x10001, 0x9, r2}) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r1, &(0x7f0000000080)={0x24, @long}, 0x14) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r3, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r3, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r3, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) connect$802154_dgram(r3, &(0x7f0000000180), 0x14) sendmmsg$sock(r1, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) connect$802154_dgram(r4, &(0x7f0000000140), 0x14) [ 1090.287396] do_syscall_64+0x33/0x40 [ 1090.288422] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1090.289541] RIP: 0033:0x7fa1817f7b19 [ 1090.290356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.294355] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1090.296024] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1090.297585] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1090.299136] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1090.300698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1090.302260] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1090.312514] SELinux: duplicate or incompatible mount options [ 1090.318662] SELinux: duplicate or incompatible mount options 15:20:19 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(0x0, 0x0) 15:20:19 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1090.472367] SELinux: duplicate or incompatible mount options [ 1090.481681] SELinux: duplicate or incompatible mount options 15:20:19 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 84) 15:20:19 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(0x0, 0x0) [ 1090.578183] FAULT_INJECTION: forcing a failure. [ 1090.578183] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.580921] CPU: 0 PID: 8047 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1090.582492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1090.584395] Call Trace: [ 1090.585004] dump_stack+0x107/0x167 [ 1090.585838] should_fail.cold+0x5/0xa [ 1090.586727] ? create_object.isra.0+0x3a/0xa30 [ 1090.587772] should_failslab+0x5/0x20 [ 1090.588669] kmem_cache_alloc+0x5b/0x310 [ 1090.589610] ? mark_held_locks+0x9e/0xe0 [ 1090.590559] create_object.isra.0+0x3a/0xa30 [ 1090.591555] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1090.592768] kmem_cache_alloc_trace+0x151/0x320 [ 1090.593886] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1090.594962] __list_lru_init+0x44d/0x890 [ 1090.595924] alloc_super+0x8b8/0xa90 [ 1090.596820] sget_fc+0x110/0x860 [ 1090.597621] ? set_anon_super+0xc0/0xc0 [ 1090.598566] ? shmem_put_link+0x120/0x120 [ 1090.599542] get_tree_nodev+0x24/0x1d0 [ 1090.600456] vfs_get_tree+0x8e/0x300 [ 1090.601333] path_mount+0x1490/0x21e0 [ 1090.602243] ? strncpy_from_user+0x9e/0x470 [ 1090.603264] ? finish_automount+0xa90/0xa90 [ 1090.604276] ? getname_flags.part.0+0x1dd/0x4f0 [ 1090.605318] __x64_sys_mount+0x282/0x300 [ 1090.606273] ? copy_mnt_ns+0xa00/0xa00 [ 1090.607219] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1090.608464] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1090.609699] do_syscall_64+0x33/0x40 [ 1090.610545] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1090.611629] RIP: 0033:0x7f749eb7204a [ 1090.612533] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.616916] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1090.618660] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1090.620298] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1090.621975] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1090.623693] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1090.625234] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1090.653974] SELinux: duplicate or incompatible mount options [ 1090.661510] SELinux: duplicate or incompatible mount options 15:20:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) [ 1090.728701] FAULT_INJECTION: forcing a failure. [ 1090.728701] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.730619] CPU: 1 PID: 8153 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1090.731725] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1090.733070] Call Trace: [ 1090.733508] dump_stack+0x107/0x167 [ 1090.734101] should_fail.cold+0x5/0xa [ 1090.734726] ? create_object.isra.0+0x3a/0xa30 [ 1090.735461] should_failslab+0x5/0x20 [ 1090.736076] kmem_cache_alloc+0x5b/0x310 [ 1090.736755] create_object.isra.0+0x3a/0xa30 [ 1090.737466] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1090.738291] __kmalloc_node+0x1ae/0x420 [ 1090.738942] kvmalloc_node+0x119/0x170 [ 1090.739575] alloc_fdtable+0xed/0x2c0 [ 1090.740201] dup_fd+0x92d/0xe40 [ 1090.740755] copy_process+0x197c/0x78b0 [ 1090.741403] ? SOFTIRQ_verbose+0x10/0x10 [ 1090.742061] ? __lockdep_reset_lock+0x180/0x180 [ 1090.742809] ? mark_lock+0xf5/0x2df0 [ 1090.743430] ? __cleanup_sighand+0xb0/0xb0 [ 1090.744133] ? _copy_from_user+0xfb/0x1b0 [ 1090.744813] kernel_clone+0xe7/0x980 [ 1090.745419] ? __lockdep_reset_lock+0x180/0x180 [ 1090.746171] ? create_io_thread+0xf0/0xf0 [ 1090.746862] ? ksys_write+0x21a/0x260 [ 1090.747490] ? lock_downgrade+0x6d0/0x6d0 [ 1090.748167] __do_sys_clone3+0x1e5/0x320 [ 1090.748834] ? __do_sys_clone+0x110/0x110 [ 1090.749528] ? rcu_read_lock_any_held+0x75/0xa0 [ 1090.750283] ? vfs_write+0x354/0xb10 [ 1090.750889] ? fput_many+0x2f/0x1a0 [ 1090.751476] ? ksys_write+0x1a9/0x260 [ 1090.752092] ? __ia32_sys_read+0xb0/0xb0 [ 1090.752759] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1090.753607] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1090.754436] ? trace_hardirqs_on+0x5b/0x180 [ 1090.755137] do_syscall_64+0x33/0x40 [ 1090.755742] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1090.756580] RIP: 0033:0x7fa1817f7b19 [ 1090.757187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.760183] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1090.761430] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1090.762600] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1090.763754] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1090.764909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1090.766065] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1090.771104] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:20:19 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0xe}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) [ 1090.816947] SELinux: duplicate or incompatible mount options [ 1090.822569] SELinux: duplicate or incompatible mount options 15:20:35 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:20:35 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @none={0x0, 0x1}}, 0x14) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r1, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r1, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) bind$802154_dgram(r1, &(0x7f0000000380)={0x24, @long}, 0x14) sendmmsg$sock(r0, &(0x7f0000000bc0)=[{{&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x3c}, 0x1f, 0x4}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)="b7635f154fe8de62dd9505e2db2a850bebfddd8ce58da60989927259fa22a69893452277fb81dad4b30ee61c06fe793ed33891fa1b99fc11b2b34dd7737cb71d8c559ac6f28453ccdc048d1e996d42acedd694b1d4afb47622e9cd70f880a5e0b6c8675f01d1b111403fdbcb6e9dcb6dd040994c1b2713187c5d6a97f4eb992e28b61ffc04fdeedbfbc8a21e172ec99d80521ba914867cb69de6c7cd292583257e5d187ef5b4c3a0bb4836cd661e85af794962e4bc7bbdf2341c96df893c5e45e8389aca97c2c66fb23ce275", 0xcc}, {&(0x7f0000000040)="a66f836410a8f5e9853626aa5ae96e5697f7b83792005ea168cba1a8edfed73616bc", 0x22}, {&(0x7f0000000240)="d4aabc1768880ed4", 0x8}, {&(0x7f0000000280)="b002a5b4acacfeb66113", 0xa}, {&(0x7f00000002c0)="0ab39c2cbc42dc49887cdb213a0f872af636340643511d3b49d8c1af5241af1b3a476601751f120c1bdc619d96037f030cfab6776f5148a0c417b2fce00794768775", 0x42}, {&(0x7f0000000340)="3b4962db5a44", 0x6}, {&(0x7f0000000380)}], 0x7, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0x20}}], 0x18}}, {{&(0x7f0000000480)=@x25, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)="29efbadd89686c6f9a37c87bce9c92bc37b9077664127bdac7654ff9d9982b3ff3dd3da613c4b2aaa1e3c7803e8d162364749e2f475d5acf016b0b19c12109a7c8c671089a412deb60b73e777d55964c6f39630cbbbcbaec39869fd3ded03dc55517b4e80fd998efb8852dc5045d7904b20bdff1cd4792f5ddfdcfa9e27e9171f9c2800b2aac41dd0468cf59f30e164acfcdd69c26bc9fe829563e0a1b61c417f77e8deb380f0cc9913c", 0xaa}], 0x1, &(0x7f0000000600)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x30}}, {{&(0x7f0000000640)=@ethernet={0x300, @random="bd077a1a3d5c"}, 0x80, &(0x7f0000000800)=[{&(0x7f00000006c0)="01870fce2eb1f7d709628b205e49deff2f81104158bb6650994bbabc22451a6f78bd3e1ebf0d6cf7d65669c26029fb3a213f2442bc35dd5584e946444d46ae97d59b0cfb0bf2997180ac77ec79189cd04c14e35c8032d86d054905777de7d49fd8fa59cf514a", 0x66}, {&(0x7f0000000740)="0c0f462355d989b9a1ae877f8fd9689c13defda1f61942ebf262ba3f", 0x1c}, {&(0x7f0000000780)="d6e4cd04b6e4096ad3bbd7f37dcdd3e514d787cbb34ed0e41c8c43a1325efb9ae2ce0eac7ae397760ba41496772098892060057dbfb00626592c9bf948163981e2385dda5d73d4e9a59d227ce0b627b5cfd1d2394379622bbc", 0x59}], 0x3, &(0x7f0000000840)=[@txtime={{0x18, 0x1, 0x3d, 0xe61}}], 0x18}}, {{&(0x7f0000000880)=@phonet={0x23, 0x2, 0x5, 0x81}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000900)="44551a88104ec5fa74c8bfb3da08d592c0d1d465a3830818ec3420962109e21e3dfe9a97afd81526dcf632cc4466aef14461112aa840af171814a1d9167568a526b8dc47e971614ae4da50c6b2a3cf52836b5d3a3a36975e73cc80ad1357c1b63b63bb7c3b485f8db58b0b846757eacf695fbc3cfca3d5e2a6cf047cf6", 0x7d}, {&(0x7f0000000980)="9e425c1841d40bad16c51cc5b6d5a82a1bc2b6de0fd4b1ab3253afbda19612afb53124e19898bf796b92348c5dfa40f0b74061a558f5b2cf7ab893a5b880b36ddb087fbadab60bc1bcbc362e5bbda69cd55d55d2f53bce72e3793151a4276bf33a30c9c6014ebf895766097ec0a4c077817afd209f3f32888e445023bca56a7545154f6b16287f7bf8e262b2073c0b704a1af24045af37ee50b2d2da149f20cd104dbc0c75b04d99556ce9cb0574fd80ed309b2f4d57c887416fb042db7164fb7977b6b24396eaeb34684d", 0xcb}, {&(0x7f0000000a80)="a201d9e4bf576227cec08189e0b7c73ab39e80356234449cc1b7bdbdaa7fdc9468030ef6c90c1586031cb0faa67bfd2495098e77ccb313520c9742cfca3f9d352ca688d31fb29d2b1a50fb5c74b49a51e1a3350e5b275ebc4b9e254bf07f", 0x5e}, {&(0x7f0000000b00)="6f2fe80a92e6e19e36f65267d36458541042027442c26404f8f3d0911d5e5a2e3aec6ae2e857ed950862b3d679194e1f61db4f5aaea9da09d328c7839b2560fe5f710804afdbd9d68b3da637ed9a4ce861a9df7598026e4edf0371dcc72f61ba01ec65aed98b772dfd3ba9e8890c33d805b9615373237e0d11", 0x79}], 0x4}}], 0x4, 0x404c014) 15:20:35 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x700, 0x0}}], 0x324, 0x0) 15:20:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 15:20:35 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:35 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 85) 15:20:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), {0xe}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) 15:20:35 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x900, 0x0}}], 0x324, 0x0) [ 1106.894704] SELinux: duplicate or incompatible mount options [ 1106.898892] SELinux: duplicate or incompatible mount options [ 1106.929343] FAULT_INJECTION: forcing a failure. [ 1106.929343] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.931839] CPU: 1 PID: 8180 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1106.933297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1106.935045] Call Trace: [ 1106.935629] dump_stack+0x107/0x167 [ 1106.936498] should_fail.cold+0x5/0xa [ 1106.937420] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1106.937860] FAULT_INJECTION: forcing a failure. [ 1106.937860] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.938629] should_failslab+0x5/0x20 [ 1106.938657] kmem_cache_alloc_trace+0x55/0x320 [ 1106.938680] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1106.938712] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1106.945367] __list_lru_init+0x44d/0x890 [ 1106.946340] alloc_super+0x8b8/0xa90 [ 1106.947242] sget_fc+0x110/0x860 [ 1106.948046] ? set_anon_super+0xc0/0xc0 [ 1106.949020] ? shmem_put_link+0x120/0x120 [ 1106.950003] get_tree_nodev+0x24/0x1d0 [ 1106.950929] vfs_get_tree+0x8e/0x300 [ 1106.951821] path_mount+0x1490/0x21e0 [ 1106.952755] ? strncpy_from_user+0x9e/0x470 [ 1106.953820] ? finish_automount+0xa90/0xa90 [ 1106.954893] ? getname_flags.part.0+0x1dd/0x4f0 [ 1106.956058] __x64_sys_mount+0x282/0x300 [ 1106.957069] ? copy_mnt_ns+0xa00/0xa00 [ 1106.958017] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1106.959167] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1106.960305] do_syscall_64+0x33/0x40 [ 1106.961152] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1106.962260] RIP: 0033:0x7f749eb7204a [ 1106.963070] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.967077] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1106.968744] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1106.970318] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1106.971873] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1106.973434] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1106.974987] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1106.976595] CPU: 0 PID: 8184 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1106.978102] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1106.979898] Call Trace: [ 1106.980507] dump_stack+0x107/0x167 [ 1106.981333] should_fail.cold+0x5/0xa [ 1106.982168] ? kvmalloc_node+0x119/0x170 [ 1106.983054] should_failslab+0x5/0x20 [ 1106.983899] __kmalloc_node+0x76/0x420 [ 1106.984762] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1106.985873] kvmalloc_node+0x119/0x170 [ 1106.986727] alloc_fdtable+0x159/0x2c0 [ 1106.987585] dup_fd+0x92d/0xe40 [ 1106.988339] copy_process+0x197c/0x78b0 [ 1106.989212] ? SOFTIRQ_verbose+0x10/0x10 [ 1106.990108] ? __lockdep_reset_lock+0x180/0x180 [ 1106.991169] ? __cleanup_sighand+0xb0/0xb0 [ 1106.992137] ? _copy_from_user+0xfb/0x1b0 [ 1106.993066] kernel_clone+0xe7/0x980 [ 1106.993876] ? __lockdep_reset_lock+0x180/0x180 [ 1106.994889] ? create_io_thread+0xf0/0xf0 [ 1106.995819] ? ksys_write+0x21a/0x260 [ 1106.996664] ? lock_downgrade+0x6d0/0x6d0 [ 1106.997573] __do_sys_clone3+0x1e5/0x320 [ 1106.998460] ? __do_sys_clone+0x110/0x110 [ 1106.999400] ? rcu_read_lock_any_held+0x75/0xa0 [ 1107.000413] ? vfs_write+0x354/0xb10 [ 1107.001231] ? fput_many+0x2f/0x1a0 [ 1107.002025] ? ksys_write+0x1a9/0x260 [ 1107.002858] ? __ia32_sys_read+0xb0/0xb0 [ 1107.003751] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1107.004900] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1107.006021] ? trace_hardirqs_on+0x5b/0x180 [ 1107.006970] do_syscall_64+0x33/0x40 [ 1107.007782] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1107.008903] RIP: 0033:0x7fa1817f7b19 [ 1107.009710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.013679] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1107.015332] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1107.016884] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1107.018433] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1107.019990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1107.021549] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:20:35 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1107.123094] SELinux: duplicate or incompatible mount options [ 1107.125348] SELinux: duplicate or incompatible mount options 15:20:35 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 86) 15:20:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:20:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000180), {0xe}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) 15:20:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1107.217143] FAULT_INJECTION: forcing a failure. [ 1107.217143] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.219627] CPU: 0 PID: 8291 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1107.221089] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1107.222838] Call Trace: [ 1107.223406] dump_stack+0x107/0x167 [ 1107.224187] should_fail.cold+0x5/0xa [ 1107.225016] ? create_object.isra.0+0x3a/0xa30 [ 1107.225982] should_failslab+0x5/0x20 [ 1107.226795] kmem_cache_alloc+0x5b/0x310 [ 1107.227668] create_object.isra.0+0x3a/0xa30 [ 1107.228608] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1107.229693] kmem_cache_alloc_trace+0x151/0x320 [ 1107.230695] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1107.231742] __list_lru_init+0x44d/0x890 [ 1107.232630] alloc_super+0x8b8/0xa90 [ 1107.233425] sget_fc+0x110/0x860 [ 1107.234150] ? set_anon_super+0xc0/0xc0 [ 1107.235000] ? shmem_put_link+0x120/0x120 [ 1107.235888] get_tree_nodev+0x24/0x1d0 [ 1107.236727] vfs_get_tree+0x8e/0x300 [ 1107.237523] path_mount+0x1490/0x21e0 [ 1107.238342] ? strncpy_from_user+0x9e/0x470 [ 1107.239255] ? finish_automount+0xa90/0xa90 [ 1107.240171] ? getname_flags.part.0+0x1dd/0x4f0 [ 1107.241182] __x64_sys_mount+0x282/0x300 [ 1107.242046] ? copy_mnt_ns+0xa00/0xa00 [ 1107.242882] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1107.243996] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1107.245105] do_syscall_64+0x33/0x40 [ 1107.245897] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1107.246989] RIP: 0033:0x7f749eb7204a [ 1107.247779] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.251704] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1107.253335] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1107.254858] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1107.256373] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1107.257892] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1107.259407] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1107.295317] SELinux: duplicate or incompatible mount options [ 1107.309666] SELinux: duplicate or incompatible mount options 15:20:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) 15:20:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1107.393135] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1107.481256] SELinux: duplicate or incompatible mount options 15:20:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0xe}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) [ 1107.489593] SELinux: duplicate or incompatible mount options [ 1107.504794] FAULT_INJECTION: forcing a failure. [ 1107.504794] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.507114] CPU: 1 PID: 8402 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1107.508513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1107.510213] Call Trace: [ 1107.510761] dump_stack+0x107/0x167 [ 1107.511507] should_fail.cold+0x5/0xa [ 1107.512292] ? create_object.isra.0+0x3a/0xa30 [ 1107.513228] should_failslab+0x5/0x20 [ 1107.514011] kmem_cache_alloc+0x5b/0x310 [ 1107.514846] create_object.isra.0+0x3a/0xa30 [ 1107.515741] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1107.516786] __kmalloc_node+0x1ae/0x420 [ 1107.517609] kvmalloc_node+0x119/0x170 [ 1107.518400] alloc_fdtable+0x159/0x2c0 [ 1107.519182] dup_fd+0x92d/0xe40 [ 1107.519867] copy_process+0x197c/0x78b0 [ 1107.520677] ? SOFTIRQ_verbose+0x10/0x10 [ 1107.521506] ? __lockdep_reset_lock+0x180/0x180 [ 1107.522438] ? mark_lock+0xf5/0x2df0 [ 1107.523223] ? __cleanup_sighand+0xb0/0xb0 [ 1107.524107] ? _copy_from_user+0xfb/0x1b0 [ 1107.524958] kernel_clone+0xe7/0x980 [ 1107.525710] ? __lockdep_reset_lock+0x180/0x180 [ 1107.526652] ? create_io_thread+0xf0/0xf0 [ 1107.527492] ? ksys_write+0x21a/0x260 [ 1107.528256] ? lock_downgrade+0x6d0/0x6d0 [ 1107.529104] __do_sys_clone3+0x1e5/0x320 [ 1107.529920] ? __do_sys_clone+0x110/0x110 [ 1107.530772] ? rcu_read_lock_any_held+0x75/0xa0 [ 1107.531704] ? vfs_write+0x354/0xb10 [ 1107.532460] ? fput_many+0x2f/0x1a0 [ 1107.533197] ? ksys_write+0x1a9/0x260 [ 1107.533972] ? __ia32_sys_read+0xb0/0xb0 [ 1107.534796] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1107.535857] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1107.536902] ? trace_hardirqs_on+0x5b/0x180 [ 1107.537783] do_syscall_64+0x33/0x40 [ 1107.538540] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1107.539577] RIP: 0033:0x7fa1817f7b19 [ 1107.540328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.544025] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1107.545555] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1107.546987] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1107.548421] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1107.549851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1107.551273] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:20:52 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 87) 15:20:52 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x9e150000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:52 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x900, 0x0}}], 0x324, 0x0) 15:20:52 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xa00, 0x0}}], 0x324, 0x0) 15:20:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) 15:20:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) 15:20:52 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, &(0x7f0000000040)) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) 15:20:52 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1123.788825] SELinux: duplicate or incompatible mount options [ 1123.793122] FAULT_INJECTION: forcing a failure. [ 1123.793122] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.795552] CPU: 0 PID: 8423 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1123.797025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1123.798755] Call Trace: [ 1123.799319] dump_stack+0x107/0x167 [ 1123.800084] should_fail.cold+0x5/0xa [ 1123.800901] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1123.801966] should_failslab+0x5/0x20 [ 1123.802502] SELinux: duplicate or incompatible mount options [ 1123.802769] kmem_cache_alloc_trace+0x55/0x320 [ 1123.802795] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1123.806087] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1123.807126] __list_lru_init+0x44d/0x890 [ 1123.807987] alloc_super+0x8b8/0xa90 [ 1123.808781] sget_fc+0x110/0x860 [ 1123.809492] ? set_anon_super+0xc0/0xc0 [ 1123.810334] ? shmem_put_link+0x120/0x120 [ 1123.811208] get_tree_nodev+0x24/0x1d0 [ 1123.812034] vfs_get_tree+0x8e/0x300 [ 1123.812823] path_mount+0x1490/0x21e0 [ 1123.813632] ? strncpy_from_user+0x9e/0x470 [ 1123.814542] ? finish_automount+0xa90/0xa90 [ 1123.815449] ? getname_flags.part.0+0x1dd/0x4f0 [ 1123.816440] __x64_sys_mount+0x282/0x300 [ 1123.817303] ? copy_mnt_ns+0xa00/0xa00 [ 1123.818123] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1123.819219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1123.820314] do_syscall_64+0x33/0x40 [ 1123.821103] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1123.822184] RIP: 0033:0x7f749eb7204a [ 1123.822972] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1123.826835] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1123.828438] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1123.829949] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1123.831448] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1123.832972] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1123.834471] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1123.847376] FAULT_INJECTION: forcing a failure. [ 1123.847376] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.849858] CPU: 0 PID: 8429 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1123.851306] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1123.853082] Call Trace: [ 1123.853648] dump_stack+0x107/0x167 [ 1123.854433] should_fail.cold+0x5/0xa [ 1123.855262] ? copy_fs_struct+0x45/0x340 [ 1123.856133] should_failslab+0x5/0x20 [ 1123.856960] kmem_cache_alloc+0x5b/0x310 [ 1123.857850] copy_fs_struct+0x45/0x340 [ 1123.858690] copy_process+0x34b5/0x78b0 [ 1123.859533] ? SOFTIRQ_verbose+0x10/0x10 [ 1123.860407] ? __lockdep_reset_lock+0x180/0x180 [ 1123.861456] ? __cleanup_sighand+0xb0/0xb0 [ 1123.862399] ? _copy_from_user+0xfb/0x1b0 [ 1123.863297] kernel_clone+0xe7/0x980 [ 1123.864090] ? __lockdep_reset_lock+0x180/0x180 [ 1123.865094] ? create_io_thread+0xf0/0xf0 [ 1123.866004] ? ksys_write+0x21a/0x260 [ 1123.866822] ? lock_downgrade+0x6d0/0x6d0 [ 1123.867715] __do_sys_clone3+0x1e5/0x320 [ 1123.868592] ? __do_sys_clone+0x110/0x110 [ 1123.869522] ? rcu_read_lock_any_held+0x75/0xa0 [ 1123.870512] ? vfs_write+0x354/0xb10 [ 1123.871308] ? fput_many+0x2f/0x1a0 [ 1123.872083] ? ksys_write+0x1a9/0x260 [ 1123.872907] ? __ia32_sys_read+0xb0/0xb0 [ 1123.873783] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1123.874902] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1123.875995] ? trace_hardirqs_on+0x5b/0x180 [ 1123.876937] do_syscall_64+0x33/0x40 [ 1123.877728] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1123.878820] RIP: 0033:0x7fa1817f7b19 [ 1123.879613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1123.883503] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1123.885119] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1123.886628] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1123.888134] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1123.889656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1123.891163] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:20:52 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f00000000c0)={0x24, @long={0x3, 0xffff, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x40047211, &(0x7f0000000040)) 15:20:52 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:20:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) [ 1124.029699] SELinux: duplicate or incompatible mount options [ 1124.034080] SELinux: duplicate or incompatible mount options 15:20:52 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 88) 15:20:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 15:20:52 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1124.130106] FAULT_INJECTION: forcing a failure. [ 1124.130106] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.132578] CPU: 0 PID: 8541 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1124.134020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.135763] Call Trace: [ 1124.136322] dump_stack+0x107/0x167 [ 1124.137101] should_fail.cold+0x5/0xa [ 1124.137907] ? create_object.isra.0+0x3a/0xa30 [ 1124.138865] should_failslab+0x5/0x20 [ 1124.139665] kmem_cache_alloc+0x5b/0x310 [ 1124.140534] create_object.isra.0+0x3a/0xa30 [ 1124.141457] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1124.142540] kmem_cache_alloc_trace+0x151/0x320 [ 1124.143530] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1124.144585] __list_lru_init+0x44d/0x890 [ 1124.145447] alloc_super+0x8b8/0xa90 [ 1124.146239] sget_fc+0x110/0x860 [ 1124.146965] ? set_anon_super+0xc0/0xc0 [ 1124.147812] ? shmem_put_link+0x120/0x120 [ 1124.148692] get_tree_nodev+0x24/0x1d0 [ 1124.149522] vfs_get_tree+0x8e/0x300 [ 1124.150317] path_mount+0x1490/0x21e0 [ 1124.151130] ? strncpy_from_user+0x9e/0x470 [ 1124.152037] ? finish_automount+0xa90/0xa90 [ 1124.152956] ? getname_flags.part.0+0x1dd/0x4f0 [ 1124.153948] __x64_sys_mount+0x282/0x300 [ 1124.154799] ? copy_mnt_ns+0xa00/0xa00 [ 1124.155635] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1124.156754] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1124.157838] do_syscall_64+0x33/0x40 [ 1124.158620] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1124.159502] FAULT_INJECTION: forcing a failure. [ 1124.159502] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.159696] RIP: 0033:0x7f749eb7204a [ 1124.159726] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1124.166734] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1124.168338] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1124.169851] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1124.171362] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1124.172875] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1124.174382] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1124.175931] CPU: 1 PID: 8548 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1124.177413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.179181] Call Trace: [ 1124.179754] dump_stack+0x107/0x167 [ 1124.180541] should_fail.cold+0x5/0xa [ 1124.181355] ? create_object.isra.0+0x3a/0xa30 [ 1124.182329] should_failslab+0x5/0x20 [ 1124.183140] kmem_cache_alloc+0x5b/0x310 [ 1124.184008] create_object.isra.0+0x3a/0xa30 [ 1124.184938] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1124.186012] kmem_cache_alloc+0x159/0x310 [ 1124.186900] copy_fs_struct+0x45/0x340 [ 1124.187733] copy_process+0x34b5/0x78b0 [ 1124.188587] ? SOFTIRQ_verbose+0x10/0x10 [ 1124.189455] ? __lockdep_reset_lock+0x180/0x180 [ 1124.190432] ? mark_lock+0xf5/0x2df0 [ 1124.191247] ? __cleanup_sighand+0xb0/0xb0 [ 1124.192169] ? _copy_from_user+0xfb/0x1b0 [ 1124.193075] kernel_clone+0xe7/0x980 [ 1124.193866] ? __lockdep_reset_lock+0x180/0x180 [ 1124.194856] ? create_io_thread+0xf0/0xf0 [ 1124.195760] ? ksys_write+0x21a/0x260 [ 1124.196577] ? lock_downgrade+0x6d0/0x6d0 [ 1124.197463] __do_sys_clone3+0x1e5/0x320 [ 1124.198319] ? __do_sys_clone+0x110/0x110 [ 1124.199220] ? rcu_read_lock_any_held+0x75/0xa0 [ 1124.200206] ? vfs_write+0x354/0xb10 [ 1124.201006] ? fput_many+0x2f/0x1a0 [ 1124.201775] ? ksys_write+0x1a9/0x260 [ 1124.202579] ? __ia32_sys_read+0xb0/0xb0 [ 1124.203447] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1124.204568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1124.205662] ? trace_hardirqs_on+0x5b/0x180 [ 1124.206581] do_syscall_64+0x33/0x40 [ 1124.207372] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1124.208467] RIP: 0033:0x7fa1817f7b19 [ 1124.209266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1124.213184] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1124.214810] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1124.216321] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1124.217847] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1124.219366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1124.220898] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1124.311096] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:21:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:21:07 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:21:07 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xa00, 0x0}}], 0x324, 0x0) 15:21:07 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xb00, 0x0}}], 0x324, 0x0) 15:21:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1, {r0}}, 0x58) [ 1138.750737] SELinux: duplicate or incompatible mount options [ 1138.766756] FAULT_INJECTION: forcing a failure. [ 1138.766756] name failslab, interval 1, probability 0, space 0, times 0 [ 1138.768671] CPU: 1 PID: 8667 Comm: syz-executor.2 Not tainted 5.10.246 #1 15:21:07 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 89) 15:21:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 15:21:07 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r1, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r1, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r2, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r2, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r2, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) connect$802154_dgram(r2, &(0x7f00000000c0), 0x14) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sync_file_range(r3, 0x2, 0xea, 0x0) [ 1138.769808] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1138.771385] Call Trace: [ 1138.771812] dump_stack+0x107/0x167 [ 1138.772414] should_fail.cold+0x5/0xa [ 1138.773051] ? copy_process+0x1ae7/0x78b0 [ 1138.773723] should_failslab+0x5/0x20 [ 1138.774330] kmem_cache_alloc+0x5b/0x310 [ 1138.774994] ? _raw_spin_unlock+0x1a/0x30 [ 1138.775679] copy_process+0x1ae7/0x78b0 [ 1138.776337] ? SOFTIRQ_verbose+0x10/0x10 [ 1138.777011] ? __lockdep_reset_lock+0x180/0x180 [ 1138.777740] ? mark_lock+0xf5/0x2df0 [ 1138.778365] ? __cleanup_sighand+0xb0/0xb0 [ 1138.779091] ? _copy_from_user+0xfb/0x1b0 [ 1138.779770] kernel_clone+0xe7/0x980 [ 1138.780387] ? __lockdep_reset_lock+0x180/0x180 [ 1138.781192] ? create_io_thread+0xf0/0xf0 [ 1138.781872] ? ksys_write+0x21a/0x260 [ 1138.782498] ? lock_downgrade+0x6d0/0x6d0 [ 1138.783187] __do_sys_clone3+0x1e5/0x320 [ 1138.783853] ? __do_sys_clone+0x110/0x110 [ 1138.784422] SELinux: duplicate or incompatible mount options [ 1138.784556] ? rcu_read_lock_any_held+0x75/0xa0 [ 1138.786583] ? vfs_write+0x354/0xb10 [ 1138.787202] ? fput_many+0x2f/0x1a0 [ 1138.787780] ? ksys_write+0x1a9/0x260 [ 1138.788413] ? __ia32_sys_read+0xb0/0xb0 [ 1138.789124] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1138.789993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1138.790833] ? trace_hardirqs_on+0x5b/0x180 [ 1138.791537] do_syscall_64+0x33/0x40 [ 1138.792150] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1138.793012] RIP: 0033:0x7fa1817f7b19 [ 1138.793621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1138.796581] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1138.797822] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1138.798926] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1138.800015] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1138.801156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1138.802244] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1138.810165] FAULT_INJECTION: forcing a failure. [ 1138.810165] name failslab, interval 1, probability 0, space 0, times 0 [ 1138.812071] CPU: 1 PID: 8668 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1138.813201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1138.814470] Call Trace: [ 1138.814869] dump_stack+0x107/0x167 [ 1138.815438] should_fail.cold+0x5/0xa [ 1138.816039] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1138.816851] should_failslab+0x5/0x20 [ 1138.817477] kmem_cache_alloc_trace+0x55/0x320 [ 1138.818207] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1138.819019] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1138.819801] __list_lru_init+0x44d/0x890 [ 1138.820469] alloc_super+0x8b8/0xa90 [ 1138.821079] sget_fc+0x110/0x860 [ 1138.821611] ? set_anon_super+0xc0/0xc0 [ 1138.822257] ? shmem_put_link+0x120/0x120 [ 1138.822905] get_tree_nodev+0x24/0x1d0 [ 1138.823525] vfs_get_tree+0x8e/0x300 [ 1138.824137] path_mount+0x1490/0x21e0 [ 1138.824743] ? strncpy_from_user+0x9e/0x470 [ 1138.825456] ? finish_automount+0xa90/0xa90 [ 1138.826130] ? getname_flags.part.0+0x1dd/0x4f0 [ 1138.826857] __x64_sys_mount+0x282/0x300 [ 1138.827486] ? copy_mnt_ns+0xa00/0xa00 [ 1138.828098] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1138.828901] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1138.829694] do_syscall_64+0x33/0x40 [ 1138.830271] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1138.831066] RIP: 0033:0x7f749eb7204a [ 1138.831646] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1138.834636] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1138.835865] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1138.837030] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1138.838171] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1138.839314] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1138.840481] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 15:21:07 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xffffe000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1138.944837] SELinux: duplicate or incompatible mount options [ 1138.955289] SELinux: duplicate or incompatible mount options 15:21:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 15:21:07 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1139.050149] FAULT_INJECTION: forcing a failure. [ 1139.050149] name failslab, interval 1, probability 0, space 0, times 0 [ 1139.052074] CPU: 1 PID: 8717 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1139.053198] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1139.054762] Call Trace: [ 1139.055303] dump_stack+0x107/0x167 [ 1139.056042] should_fail.cold+0x5/0xa [ 1139.056844] ? create_object.isra.0+0x3a/0xa30 [ 1139.057772] should_failslab+0x5/0x20 [ 1139.058440] kmem_cache_alloc+0x5b/0x310 [ 1139.059110] create_object.isra.0+0x3a/0xa30 [ 1139.059819] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1139.060654] kmem_cache_alloc+0x159/0x310 [ 1139.061351] copy_process+0x1ae7/0x78b0 [ 1139.062021] ? SOFTIRQ_verbose+0x10/0x10 [ 1139.062675] ? __lockdep_reset_lock+0x180/0x180 [ 1139.063426] ? mark_lock+0xf5/0x2df0 [ 1139.064062] ? __cleanup_sighand+0xb0/0xb0 [ 1139.064769] ? _copy_from_user+0xfb/0x1b0 [ 1139.065452] kernel_clone+0xe7/0x980 [ 1139.066049] ? __lockdep_reset_lock+0x180/0x180 [ 1139.066799] ? create_io_thread+0xf0/0xf0 [ 1139.067496] ? ksys_write+0x21a/0x260 [ 1139.068112] ? lock_downgrade+0x6d0/0x6d0 [ 1139.068784] __do_sys_clone3+0x1e5/0x320 [ 1139.069455] ? __do_sys_clone+0x110/0x110 [ 1139.070165] ? rcu_read_lock_any_held+0x75/0xa0 [ 1139.070915] ? vfs_write+0x354/0xb10 [ 1139.071547] ? fput_many+0x2f/0x1a0 [ 1139.072150] ? ksys_write+0x1a9/0x260 [ 1139.072770] ? __ia32_sys_read+0xb0/0xb0 [ 1139.073438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1139.074299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1139.075145] ? trace_hardirqs_on+0x5b/0x180 [ 1139.075857] do_syscall_64+0x33/0x40 [ 1139.076470] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1139.077299] RIP: 0033:0x7fa1817f7b19 [ 1139.077920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1139.080913] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1139.082165] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1139.083343] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1139.084499] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1139.085680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1139.086873] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:21:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) [ 1139.108973] SELinux: duplicate or incompatible mount options 15:21:07 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 90) [ 1139.126045] SELinux: duplicate or incompatible mount options [ 1139.230833] FAULT_INJECTION: forcing a failure. [ 1139.230833] name failslab, interval 1, probability 0, space 0, times 0 [ 1139.232765] CPU: 1 PID: 8786 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1139.233848] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1139.235163] Call Trace: [ 1139.235599] dump_stack+0x107/0x167 [ 1139.236197] should_fail.cold+0x5/0xa [ 1139.236837] ? create_object.isra.0+0x3a/0xa30 [ 1139.237575] should_failslab+0x5/0x20 [ 1139.238191] kmem_cache_alloc+0x5b/0x310 [ 1139.238854] ? mark_held_locks+0x9e/0xe0 [ 1139.239526] create_object.isra.0+0x3a/0xa30 [ 1139.240238] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1139.241070] kmem_cache_alloc_trace+0x151/0x320 [ 1139.241835] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1139.242643] __list_lru_init+0x44d/0x890 [ 1139.243319] alloc_super+0x8b8/0xa90 [ 1139.243937] sget_fc+0x110/0x860 [ 1139.244494] ? set_anon_super+0xc0/0xc0 [ 1139.245153] ? shmem_put_link+0x120/0x120 [ 1139.245815] get_tree_nodev+0x24/0x1d0 [ 1139.246443] vfs_get_tree+0x8e/0x300 [ 1139.247046] path_mount+0x1490/0x21e0 [ 1139.247668] ? strncpy_from_user+0x9e/0x470 [ 1139.248369] ? finish_automount+0xa90/0xa90 [ 1139.249082] ? getname_flags.part.0+0x1dd/0x4f0 [ 1139.249845] __x64_sys_mount+0x282/0x300 [ 1139.250479] ? copy_mnt_ns+0xa00/0xa00 [ 1139.251114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1139.251962] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1139.252807] do_syscall_64+0x33/0x40 [ 1139.253417] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1139.254242] RIP: 0033:0x7f749eb7204a [ 1139.254860] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1139.257846] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1139.259086] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1139.260232] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1139.261389] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1139.262529] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1139.263691] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1139.337289] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:21:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:21:22 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r1, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r1, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) connect$802154_dgram(r1, &(0x7f0000000040)={0x24, @none={0x0, 0x1}}, 0x14) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) fcntl$lock(r2, 0x24, &(0x7f0000000140)={0x1, 0x4, 0x81, 0x7ff, 0xffffffffffffffff}) connect$802154_dgram(r0, &(0x7f00000000c0)={0x24, @none={0x0, 0x3}}, 0x14) 15:21:22 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xb00, 0x0}}], 0x324, 0x0) 15:21:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) 15:21:22 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 91) 15:21:22 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xc00, 0x0}}], 0x324, 0x0) 15:21:22 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:21:22 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1153.894979] SELinux: duplicate or incompatible mount options [ 1153.899005] SELinux: duplicate or incompatible mount options [ 1153.936157] FAULT_INJECTION: forcing a failure. [ 1153.936157] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.936620] FAULT_INJECTION: forcing a failure. [ 1153.936620] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.939130] CPU: 1 PID: 8810 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1153.943025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1153.945075] Call Trace: [ 1153.945740] dump_stack+0x107/0x167 [ 1153.946642] should_fail.cold+0x5/0xa [ 1153.947589] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1153.948811] should_failslab+0x5/0x20 [ 1153.949748] kmem_cache_alloc_trace+0x55/0x320 [ 1153.950867] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1153.952104] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1153.953310] __list_lru_init+0x44d/0x890 [ 1153.954332] alloc_super+0x8b8/0xa90 [ 1153.955262] sget_fc+0x110/0x860 [ 1153.956082] ? set_anon_super+0xc0/0xc0 [ 1153.957063] ? shmem_put_link+0x120/0x120 [ 1153.958094] get_tree_nodev+0x24/0x1d0 [ 1153.959066] vfs_get_tree+0x8e/0x300 [ 1153.959980] path_mount+0x1490/0x21e0 [ 1153.960919] ? strncpy_from_user+0x9e/0x470 [ 1153.961968] ? finish_automount+0xa90/0xa90 [ 1153.963039] ? getname_flags.part.0+0x1dd/0x4f0 [ 1153.964195] __x64_sys_mount+0x282/0x300 [ 1153.965204] ? copy_mnt_ns+0xa00/0xa00 [ 1153.966176] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1153.967455] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1153.968682] do_syscall_64+0x33/0x40 [ 1153.969610] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1153.970856] RIP: 0033:0x7f749eb7204a [ 1153.971757] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1153.976195] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1153.978023] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1153.979783] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1153.981505] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1153.983264] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1153.984991] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1153.986766] CPU: 0 PID: 8809 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1153.988209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1153.989908] Call Trace: [ 1153.990461] dump_stack+0x107/0x167 [ 1153.991218] should_fail.cold+0x5/0xa [ 1153.991997] ? copy_process+0x1c65/0x78b0 [ 1153.992886] should_failslab+0x5/0x20 [ 1153.993674] kmem_cache_alloc+0x5b/0x310 [ 1153.994497] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1153.995575] copy_process+0x1c65/0x78b0 [ 1153.996390] ? SOFTIRQ_verbose+0x10/0x10 [ 1153.997240] ? __lockdep_reset_lock+0x180/0x180 [ 1153.998266] ? __cleanup_sighand+0xb0/0xb0 [ 1153.999176] ? _copy_from_user+0xfb/0x1b0 [ 1154.000048] kernel_clone+0xe7/0x980 [ 1154.000810] ? __lockdep_reset_lock+0x180/0x180 [ 1154.001759] ? create_io_thread+0xf0/0xf0 [ 1154.002645] ? ksys_write+0x21a/0x260 [ 1154.003429] ? lock_downgrade+0x6d0/0x6d0 [ 1154.004292] __do_sys_clone3+0x1e5/0x320 [ 1154.005144] ? __do_sys_clone+0x110/0x110 [ 1154.006040] ? rcu_read_lock_any_held+0x75/0xa0 [ 1154.006988] ? vfs_write+0x354/0xb10 [ 1154.007766] ? fput_many+0x2f/0x1a0 [ 1154.008510] ? ksys_write+0x1a9/0x260 [ 1154.009312] ? __ia32_sys_read+0xb0/0xb0 [ 1154.010158] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1154.011233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1154.012288] ? trace_hardirqs_on+0x5b/0x180 [ 1154.013192] do_syscall_64+0x33/0x40 [ 1154.013960] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1154.015003] RIP: 0033:0x7fa1817f7b19 [ 1154.015762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1154.019517] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1154.021070] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1154.022534] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1154.023981] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1154.025431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1154.026877] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:21:22 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1154.147249] SELinux: duplicate or incompatible mount options [ 1154.154212] SELinux: duplicate or incompatible mount options 15:21:23 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x200000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:21:23 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 92) 15:21:23 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:21:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1154.301876] SELinux: duplicate or incompatible mount options [ 1154.307591] SELinux: duplicate or incompatible mount options [ 1154.326043] FAULT_INJECTION: forcing a failure. [ 1154.326043] name failslab, interval 1, probability 0, space 0, times 0 [ 1154.328495] CPU: 0 PID: 8922 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1154.330022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1154.331741] Call Trace: [ 1154.332293] dump_stack+0x107/0x167 [ 1154.333080] should_fail.cold+0x5/0xa [ 1154.333872] ? create_object.isra.0+0x3a/0xa30 [ 1154.334823] should_failslab+0x5/0x20 [ 1154.335613] kmem_cache_alloc+0x5b/0x310 [ 1154.336450] ? mark_held_locks+0x9e/0xe0 [ 1154.337372] create_object.isra.0+0x3a/0xa30 [ 1154.338289] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1154.339401] kmem_cache_alloc_trace+0x151/0x320 [ 1154.340439] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1154.341536] __list_lru_init+0x44d/0x890 [ 1154.342390] alloc_super+0x8b8/0xa90 [ 1154.343182] sget_fc+0x110/0x860 [ 1154.343887] ? set_anon_super+0xc0/0xc0 [ 1154.344735] ? shmem_put_link+0x120/0x120 [ 1154.345630] get_tree_nodev+0x24/0x1d0 [ 1154.346448] vfs_get_tree+0x8e/0x300 [ 1154.347227] path_mount+0x1490/0x21e0 [ 1154.348028] ? strncpy_from_user+0x9e/0x470 [ 1154.348969] ? finish_automount+0xa90/0xa90 [ 1154.349871] ? getname_flags.part.0+0x1dd/0x4f0 [ 1154.350858] __x64_sys_mount+0x282/0x300 [ 1154.351707] ? copy_mnt_ns+0xa00/0xa00 [ 1154.352531] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1154.353662] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1154.354741] do_syscall_64+0x33/0x40 [ 1154.355519] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1154.356590] RIP: 0033:0x7f749eb7204a [ 1154.357391] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1154.361210] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1154.362801] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1154.364357] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1154.365901] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1154.367383] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1154.368886] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 15:21:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:21:23 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1154.462816] SELinux: duplicate or incompatible mount options [ 1154.465193] SELinux: duplicate or incompatible mount options [ 1154.556728] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:21:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 93) 15:21:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1171.475123] SELinux: duplicate or incompatible mount options 15:21:40 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x700, 0x0}}], 0x324, 0x0) [ 1171.498794] SELinux: duplicate or incompatible mount options [ 1171.514733] FAULT_INJECTION: forcing a failure. [ 1171.514733] name failslab, interval 1, probability 0, space 0, times 0 [ 1171.517268] CPU: 1 PID: 9048 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1171.518793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1171.520646] Call Trace: [ 1171.521258] dump_stack+0x107/0x167 [ 1171.522074] should_fail.cold+0x5/0xa 15:21:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0ff1f, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:21:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) 15:21:40 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd_index=0x2, 0x60b, 0x0, 0x8, 0x4, 0x1}, 0x2) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x2, 0x0, r1, 0x0, &(0x7f00000000c0)="2971435647a7ba6aa693c51e4f7115e7d0ede3e164cf9b4b037082d1f48d04c59265cd051eca7d5e8ed51a7ed28800f335ea7660798e696951afc2af85dd680f9808b600c045", 0x46, 0x40000120, 0x1}, 0x8) 15:21:40 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xc00, 0x0}}], 0x324, 0x0) 15:21:40 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xd00, 0x0}}], 0x324, 0x0) [ 1171.522923] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1171.524243] should_failslab+0x5/0x20 [ 1171.525120] kmem_cache_alloc_trace+0x55/0x320 [ 1171.526136] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1171.527288] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1171.528406] __list_lru_init+0x44d/0x890 [ 1171.529346] alloc_super+0x8b8/0xa90 [ 1171.530195] sget_fc+0x110/0x860 [ 1171.530962] ? set_anon_super+0xc0/0xc0 [ 1171.531873] ? shmem_put_link+0x120/0x120 [ 1171.532810] get_tree_nodev+0x24/0x1d0 [ 1171.533702] vfs_get_tree+0x8e/0x300 [ 1171.534544] path_mount+0x1490/0x21e0 [ 1171.535392] ? strncpy_from_user+0x9e/0x470 [ 1171.536368] ? finish_automount+0xa90/0xa90 [ 1171.537357] ? getname_flags.part.0+0x1dd/0x4f0 [ 1171.537898] FAULT_INJECTION: forcing a failure. [ 1171.537898] name failslab, interval 1, probability 0, space 0, times 0 [ 1171.538428] __x64_sys_mount+0x282/0x300 [ 1171.538450] ? copy_mnt_ns+0xa00/0xa00 [ 1171.538482] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1171.538516] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1171.544923] do_syscall_64+0x33/0x40 [ 1171.545771] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1171.546920] RIP: 0033:0x7f749eb7204a [ 1171.547755] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1171.551872] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1171.553581] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1171.555183] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1171.556777] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1171.558342] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1171.559884] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1171.561472] CPU: 0 PID: 9066 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1171.562948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1171.564722] Call Trace: [ 1171.565305] dump_stack+0x107/0x167 [ 1171.566089] should_fail.cold+0x5/0xa [ 1171.566917] ? create_object.isra.0+0x3a/0xa30 [ 1171.567898] should_failslab+0x5/0x20 [ 1171.568717] kmem_cache_alloc+0x5b/0x310 [ 1171.569615] create_object.isra.0+0x3a/0xa30 [ 1171.570552] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1171.571657] kmem_cache_alloc+0x159/0x310 [ 1171.572550] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1171.573694] copy_process+0x1c65/0x78b0 [ 1171.574549] ? SOFTIRQ_verbose+0x10/0x10 [ 1171.575428] ? __lockdep_reset_lock+0x180/0x180 [ 1171.576475] ? __cleanup_sighand+0xb0/0xb0 [ 1171.577429] ? _copy_from_user+0xfb/0x1b0 [ 1171.578336] kernel_clone+0xe7/0x980 [ 1171.579139] ? __lockdep_reset_lock+0x180/0x180 [ 1171.580135] ? create_io_thread+0xf0/0xf0 [ 1171.581069] ? ksys_write+0x21a/0x260 [ 1171.581890] ? lock_downgrade+0x6d0/0x6d0 [ 1171.582792] __do_sys_clone3+0x1e5/0x320 [ 1171.583665] ? __do_sys_clone+0x110/0x110 [ 1171.584597] ? rcu_read_lock_any_held+0x75/0xa0 [ 1171.585596] ? vfs_write+0x354/0xb10 [ 1171.586401] ? fput_many+0x2f/0x1a0 [ 1171.587183] ? ksys_write+0x1a9/0x260 [ 1171.588003] ? __ia32_sys_read+0xb0/0xb0 [ 1171.588885] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1171.590009] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1171.591111] ? trace_hardirqs_on+0x5b/0x180 [ 1171.592050] do_syscall_64+0x33/0x40 [ 1171.592863] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1171.593962] RIP: 0033:0x7fa1817f7b19 [ 1171.594766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1171.598682] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1171.600306] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1171.601842] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1171.603379] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1171.604900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1171.606431] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:21:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1171.704096] SELinux: duplicate or incompatible mount options [ 1171.716586] SELinux: duplicate or incompatible mount options 15:21:40 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r1, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r1, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r2, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r2, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r2, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) connect$802154_dgram(r2, &(0x7f0000005e80)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r3, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="000000000020000006fffffec40498f08f1622a4e9e00000000000000000b2ec327e0000", @ANYRES32], 0x38}}], 0x1, 0x0) sendmmsg$sock(r1, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="541d73657cead13e3bd6408da1a2f16ee43b9ffb60599c1d7c298cd6b1a18bb848a690012f99a8fa6b89860eeb85", 0x2e}, {&(0x7f0000000100)="f9c31bc4f51a504c0857e97121276b707f1f3433", 0x14}, {&(0x7f0000000140)="0f444d535734d1005f8a12c9557a6f27fbf59f319dba4c12b69dd4887405c2520c1e98d657782da0fba3", 0x2a}], 0x3}}, {{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000240)="08ff7dcf679bb8df0101e9e112d04cab73ef8fae68c0fa9e8586bf1a82f80d636d691f3b48b1ebbbde37d70a4a20aeb8df66045dda9f227f0a6830c9999d5f9cbbb51ab8b105e87268ec3a8993fb422bfa6c43ab028621d553a0bfc2b8da", 0x5e}], 0x1, &(0x7f0000000300)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0xa21d}}, @timestamping={{0x14, 0x1, 0x25, 0xb9}}], 0x48}}, {{&(0x7f0000000380)=@can, 0x80, &(0x7f0000001600)=[{&(0x7f0000000400)="030efd3e0f19957cddecae98229caa30e3ba525fccc53f02947c318a86459ce8a8cdbd4e87247f24dbb54ab976c8134e9af19aa7dc9ec11f42724959532826220438f622569b9d0cbe7f00050cc7f86a56925ffb37ab25f6fe002f03c96b97dcd1fbba78f9ae2c04a87e7859df1833b37c05a768914b39cd7b1e5dd167af7e4aa54605e69d7c85728918a399a91f1e07", 0x90}, {&(0x7f00000004c0)="8196255a03d74e445b3be41a8bbc40db1ab128f18fc7fe17544603ac3b1cfdf4cafd23775e89843c36f94c2c233d5d26633823cb46f6a5be92815211f05f06016974d33824ac4b9455a561425d674be0bdffb8c1307fe4ba1c70f4468639", 0x5e}, {&(0x7f0000000540)="4f3bc4b4661522b7352b52ac033671d459da88dc0274da2d767a6479ad23c1bca3324ff82cf01702760b58adcbd1d7ab16203d844d21e2f8186f8fc22512d59b6b14cde1", 0x44}, {&(0x7f00000005c0)="417b092cc78e14ff43ad92441dd34c1bbc0fe98ae5cecc57f667566f6ad7", 0x1e}, {&(0x7f0000000600)="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", 0x1000}], 0x5, &(0x7f0000001680)=[@timestamping={{0x14, 0x1, 0x25, 0xfffff01c}}], 0x18}}, {{&(0x7f00000016c0)=@l2tp={0x2, 0x0, @broadcast, 0x4}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001740)="c48c42ff51679ed3ebe43942b24a79090c6e53aef040344f60cbb778e2a935943fe3a5e9cadb564ed12a0a33b71bba95960a078703d98ce417cfe5630eff657ec92a5f19771331ca3f524ede3bb3100496d6195ff2b47fae505759aefe605c717133f2676e55f2bbd9a6370a9426b69ae1630cb74cfebc06280d8b9ae2ae772eddb967b4a9305024774f947c02fb2f0940b8aabd46480c904b325799544927cd801802833488c900a899b50fc88582ee2ffc", 0xb2}, {&(0x7f0000001800)="4f335e745fe9aef96465c69d040261c68b3e40625fffa7a0dace0eb8bb4207e4f477316849e542d01b286a2b2b4a51d14dd2f1dce36e20a6f6d9d0d196e0837791091171fedc395c7979521f03372ae094e569d8a42abd1694", 0x59}, {&(0x7f0000001880)="e553774939859d711ad6a6bb7936895cb70d0fcc978943faf113c5f5de31bc1f4d8cb4558880a375f674eaa8f62d2fadf5bc6da1d420ed626bfb29f33d8c0aa242b107ad6b3cf84f4fcc203be90ab4d88810fb4a7b354d2ea63d806d741fbe3cf0a35f55aca1a9cb4ec150b8748acc2dbf092cef", 0x74}, {&(0x7f0000001900)="e4dd703fd967db", 0x7}, {&(0x7f0000001940)="c8426bf31fcd095c04e6043515600ccaaa18b44febfbcab82c53e7fb63da047621396a8271855f0a88c57e096ffbc04d287dfdbd3871c97cafb2da48b0a198312f4322af0a57f75b06c4307a317facc20abe17456c1b0e61c432815c32efdb55ad088070f84e2a5efb56ed4a530157c93062b50dd557accecdca05910a1cb39400fd1a2bd9b04c7fe95486ee8ca8f535b0de626cead5", 0x96}, {&(0x7f0000001a00)="544662a445e839917185f16fc7887d6075f983ea361fc153f61d704ada9f71f256a0ec9e35b0ad2ce35605e37620c44e7dc31ff05197e542036f4b3e28dd88917f6bb5f317232b36003c7fcb9518e51e1f29a2095ea2e2d96d3babfb72d4d581786b720a21d735470c067c1bfcd7c9417e3e3ee6a48f9bb03f559dbd5e20583b4099153aac36252a9ccd34fd3b5223662ab4436dd50df6de908e5d3e4a2c97151ceb35a3515ecd04757bbac3617f55", 0xaf}, {&(0x7f0000001ac0)="51778d5bffe6d97473d481a78bd708bf608371375680510623d5b84d65fa197ca82ab307ded9e1904a70a0e8e06dc3db703983fe943a89b2e86c4ab7967cc62f6b57a821b6f5c688586b3b104c26892e54fc4464383c95d3d99e531f196f8070", 0x60}], 0x7, &(0x7f0000001bc0)=[@txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x200}}], 0x48}}, {{&(0x7f0000001c40)=@caif, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001cc0)="ab4ecf193fbd38e8d70c783c6ebb1b4a826411682a6537eb5c8b3df4e9b042b32f4cf8a23e4fce303b0297c5c3c5872cab13fe5b5f29ab2e962ff6bb4f716949c02a6e99a1b81693a2e9e127697e67d2f335bccb4988e641a35dab92960dadec787629a4c912344621751802812ce18fa4d49fd401aac5b156333d", 0x7b}], 0x1, &(0x7f0000001d80)=[@mark={{0x14, 0x1, 0x24, 0x7fffffff}}], 0x18}}, {{&(0x7f0000001dc0)=@in6={0xa, 0x4e23, 0x1, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x11}}, 0x6}, 0x80, &(0x7f0000004180)=[{&(0x7f0000001e40)="35a0f11f9f7079b9e115e0822e2a2817446302d0d0ab70a5eccd4b6bf9d027113846ea5a35c66748560fdf0cf0da50f9187692b06296161157035fd3a9076ff654da3ff5acb4e44cf0dca25ea8261e3b0bd3b7a60daaa64d8b51c0d4ab84fe62fad85d7f2f89a546b1e0da36f35238", 0x6f}, {&(0x7f0000001ec0)="52edbb3b059e08529e111f9ae8cabff828ca1edcf20875ae9de7278860a2c0f4078c4b42e7a2a497e8927eeafe25b49f4195efe25b9f60", 0x37}, {&(0x7f0000001f00)="52654377f9eec49d8943b650b654ac1de06d284512a9e9ba74963e6ce32c1dbcec3e6b475df4e3979a11ffafce77a932a48c9f1f91df38a3dbdf1a65533f9b96d80658730070c85c98727f6ed32ee0df464ed46398f08af1603519ec0bf17782f6b4667e3c699e2d71c3d7a46e2583b5902508b9a5a1a14cfc67c08d9021719cc9c7d49c8df20a4cda8bdef9a8a8866d67efc1296e8b4a1457ed6e1fd1b787d10bff87c0fc77aff84312affec89906566586ff00cc5544588fed186a29fb8b43d33fbf8814e344a736c5066c751c", 0xce}, {&(0x7f0000002000)="a948ff6d4aa38efd07618ecd5d4fe27657d77d9d98977bea374b7279e47b6e585a13c36118d7533742e0ee0e77eaa35f7e2fc9acdb22fc6e6a8eaa6f7a56cb073a3d50f0355d80b9d4c51a611f7e1254cccab482079399", 0x57}, {&(0x7f0000002080)="8a65856a6c8a1d796dde22b7a81fc7bd13ad29d6d2ded222ce154d2faa0c249f45d4ece053ad6ca9425527d946c46b65b52b9f7769c687f2320e2a86979e4dae9016afbb8ab63cd5dc963eebca0f0067ab4442272d7b417c3bf6d6a8aae5e94e8d1e062242ad31c1c948edb3b28bca1fcef4e45f39928b3114f601cb28f2045f4b5da677160ded6ebc61ee974f68bdcc9114a91b35808e9e4364ce251403ff92053774678513fa50f7cfff3e7a6e9d0e5d7c5528275da7a3607500fb05251418b8922c30f8", 0xc5}, {&(0x7f0000002180)="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", 0x1000}, {&(0x7f0000003180)="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", 0x1000}], 0x7, &(0x7f0000004200)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x43a}}], 0x30}}, {{&(0x7f0000004240)=@llc={0x1a, 0x30e, 0xc0, 0xc0, 0xe0, 0x20, @random="2bbd67691f96"}, 0x80, &(0x7f00000054c0)=[{&(0x7f00000042c0)="b55a60be8944f3c42393817ec5fadf6603b729df59edb3a548327b688badcc663a1ebb1e23e7238402c0ad835771edaf3510598a9a79f4afe01e8f5414c33da2b80702d59979e342192c7ceaa7200ffcf6c47082c19e1cd9d428fa35d8671fbe2422090e37ba223cca9b5356583eec60e66d1e87651698778ad2b98a0f9edaffb5b2fa3d0e24117fd75171051d66ba7920cd027cbc", 0x95}, {&(0x7f0000004380)="6033737f17d6accc263a92386f2be542c9ed142217c3e58d2b333d1926fc99406f394d0779781a981cea33c96e116e1b5ce12de653f2fc52bca47247249fa225222d795260d5896a6c336b62d5d166a77357aa5209fb8a3280423beb27af1b79bd850fa93f9052274ee8f09aa1b6f30c9f32eed2477528b86ef713b20988ea1840d5dc44a11cf733275886cec283daf0bacbbaeb9ae06cff6ee7a66b151a1e5e2b711bb39dde34fdb25628ff012119aa1c", 0xb1}, {&(0x7f0000004440)="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", 0x1000}, {&(0x7f0000005440)="41b2b5851856098f472113fa20c666aba098936f59fadd085def850df2aa8b5790b2ac3c28b5cd84671eb56a4b32d598e36cfda5d16e1e376ab5f5bc3c603c1a2093fd5c6428388d80f4aaa1c94323544dfa44e8a51b5f5d53212bf051a601e59dd9244e571bd0c7ea782a530158cf97a5e9cdec1e6bf549a941b8b50d3c8812", 0x80}], 0x4, &(0x7f0000005500)=[@txtime={{0x18, 0x1, 0x3d, 0x1ff}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x30}}, {{&(0x7f0000005540)=@nl=@unspec, 0x80, &(0x7f0000005600)=[{&(0x7f00000055c0)="286c9a5f11a8ca5396920b176bc89e5c7f5651751e2768040dbed8054c239a7344", 0x21}], 0x1, &(0x7f0000005640)=[@txtime={{0x18, 0x1, 0x3d, 0x8a77}}, @mark={{0x14, 0x1, 0x24, 0xc8ce}}, @txtime={{0x18}}], 0x48}}, {{&(0x7f00000056c0)=@can, 0x80, &(0x7f0000005b80), 0x0, &(0x7f0000005c00)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0xf32a}}], 0x30}}], 0x9, 0x24000000) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000040)=0x3, 0x4) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) 15:21:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:21:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1171.953208] SELinux: duplicate or incompatible mount options 15:21:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 94) [ 1171.960991] SELinux: duplicate or incompatible mount options [ 1172.018934] FAULT_INJECTION: forcing a failure. [ 1172.018934] name failslab, interval 1, probability 0, space 0, times 0 [ 1172.021423] CPU: 0 PID: 9168 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1172.022864] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1172.024631] Call Trace: [ 1172.025212] dump_stack+0x107/0x167 [ 1172.026008] should_fail.cold+0x5/0xa [ 1172.026822] ? create_object.isra.0+0x3a/0xa30 [ 1172.027804] should_failslab+0x5/0x20 [ 1172.028629] kmem_cache_alloc+0x5b/0x310 [ 1172.029500] ? mark_held_locks+0x9e/0xe0 [ 1172.030373] create_object.isra.0+0x3a/0xa30 [ 1172.031312] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1172.032397] kmem_cache_alloc_trace+0x151/0x320 [ 1172.033405] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1172.034452] __list_lru_init+0x44d/0x890 [ 1172.035334] alloc_super+0x8b8/0xa90 [ 1172.036143] sget_fc+0x110/0x860 [ 1172.036870] ? set_anon_super+0xc0/0xc0 [ 1172.037732] ? shmem_put_link+0x120/0x120 [ 1172.038610] get_tree_nodev+0x24/0x1d0 [ 1172.039444] vfs_get_tree+0x8e/0x300 [ 1172.040234] path_mount+0x1490/0x21e0 [ 1172.041063] ? strncpy_from_user+0x9e/0x470 [ 1172.041988] ? finish_automount+0xa90/0xa90 [ 1172.042911] ? getname_flags.part.0+0x1dd/0x4f0 [ 1172.043917] __x64_sys_mount+0x282/0x300 [ 1172.044785] ? copy_mnt_ns+0xa00/0xa00 [ 1172.045626] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1172.046746] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1172.047847] do_syscall_64+0x33/0x40 [ 1172.048641] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1172.049740] RIP: 0033:0x7f749eb7204a [ 1172.050531] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1172.054458] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1172.056080] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1172.057596] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1172.059117] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1172.060619] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1172.062141] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 15:21:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:21:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) [ 1172.116720] SELinux: duplicate or incompatible mount options [ 1172.120084] SELinux: duplicate or incompatible mount options 15:21:41 executing program 0: timer_delete(0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) 15:21:41 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1172.183979] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1172.245590] FAULT_INJECTION: forcing a failure. [ 1172.245590] name failslab, interval 1, probability 0, space 0, times 0 [ 1172.248010] CPU: 1 PID: 9274 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1172.249441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1172.251173] Call Trace: [ 1172.251702] SELinux: duplicate or incompatible mount options [ 1172.252932] dump_stack+0x107/0x167 [ 1172.253705] should_fail.cold+0x5/0xa [ 1172.254505] ? copy_process+0x2514/0x78b0 [ 1172.254710] SELinux: duplicate or incompatible mount options [ 1172.255371] should_failslab+0x5/0x20 [ 1172.255396] kmem_cache_alloc+0x5b/0x310 [ 1172.255425] copy_process+0x2514/0x78b0 [ 1172.255454] ? SOFTIRQ_verbose+0x10/0x10 [ 1172.259974] ? __lockdep_reset_lock+0x180/0x180 [ 1172.260947] ? mark_lock+0xf5/0x2df0 [ 1172.261762] ? __cleanup_sighand+0xb0/0xb0 [ 1172.262671] ? _copy_from_user+0xfb/0x1b0 [ 1172.263546] kernel_clone+0xe7/0x980 [ 1172.264325] ? __lockdep_reset_lock+0x180/0x180 [ 1172.265306] ? create_io_thread+0xf0/0xf0 [ 1172.266189] ? ksys_write+0x21a/0x260 [ 1172.266995] ? lock_downgrade+0x6d0/0x6d0 [ 1172.267870] __do_sys_clone3+0x1e5/0x320 [ 1172.268722] ? __do_sys_clone+0x110/0x110 [ 1172.269625] ? rcu_read_lock_any_held+0x75/0xa0 [ 1172.270597] ? vfs_write+0x354/0xb10 [ 1172.271383] ? fput_many+0x2f/0x1a0 [ 1172.272147] ? ksys_write+0x1a9/0x260 [ 1172.272946] ? __ia32_sys_read+0xb0/0xb0 [ 1172.273813] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1172.274917] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1172.275993] ? trace_hardirqs_on+0x5b/0x180 [ 1172.276906] do_syscall_64+0x33/0x40 [ 1172.277699] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1172.278779] RIP: 0033:0x7fa1817f7b19 15:21:41 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 95) [ 1172.279564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1172.283631] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1172.285250] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1172.286750] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1172.288248] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1172.289760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1172.291266] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1172.376229] FAULT_INJECTION: forcing a failure. [ 1172.376229] name failslab, interval 1, probability 0, space 0, times 0 [ 1172.378627] CPU: 1 PID: 9281 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1172.380070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1172.381813] Call Trace: [ 1172.382367] dump_stack+0x107/0x167 [ 1172.383138] should_fail.cold+0x5/0xa [ 1172.383941] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1172.385001] should_failslab+0x5/0x20 [ 1172.385821] kmem_cache_alloc_trace+0x55/0x320 [ 1172.386776] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1172.387846] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1172.388879] __list_lru_init+0x44d/0x890 [ 1172.389750] alloc_super+0x8b8/0xa90 [ 1172.390538] sget_fc+0x110/0x860 [ 1172.391251] ? set_anon_super+0xc0/0xc0 [ 1172.392093] ? shmem_put_link+0x120/0x120 [ 1172.392963] get_tree_nodev+0x24/0x1d0 [ 1172.393792] vfs_get_tree+0x8e/0x300 [ 1172.394585] path_mount+0x1490/0x21e0 [ 1172.395393] ? strncpy_from_user+0x9e/0x470 [ 1172.396298] ? finish_automount+0xa90/0xa90 [ 1172.397216] ? getname_flags.part.0+0x1dd/0x4f0 [ 1172.398205] __x64_sys_mount+0x282/0x300 [ 1172.399055] ? copy_mnt_ns+0xa00/0xa00 [ 1172.399877] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1172.400982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1172.402083] do_syscall_64+0x33/0x40 [ 1172.402868] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1172.403941] RIP: 0033:0x7f749eb7204a [ 1172.404722] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1172.408588] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1172.410201] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1172.411695] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1172.413203] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1172.414699] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1172.416196] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 15:21:55 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xe00, 0x0}}], 0x324, 0x0) 15:21:55 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000140)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @none={0x0, 0x2}}, 0x14) connect$802154_dgram(r1, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r1, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x1c) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f0000000040)={0x7, 'caif0\x00', {0x7}, 0x400}) 15:21:55 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:21:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1186.868690] SELinux: duplicate or incompatible mount options 15:21:55 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x700, 0x0}}], 0x324, 0x0) 15:21:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) 15:21:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 96) 15:21:55 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xd00, 0x0}}], 0x324, 0x0) [ 1186.898710] SELinux: duplicate or incompatible mount options [ 1186.911368] FAULT_INJECTION: forcing a failure. [ 1186.911368] name failslab, interval 1, probability 0, space 0, times 0 [ 1186.913816] CPU: 1 PID: 9300 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1186.915278] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1186.915477] Unsupported ieee802154 address type: 0 [ 1186.917010] Call Trace: [ 1186.917037] dump_stack+0x107/0x167 [ 1186.917063] should_fail.cold+0x5/0xa [ 1186.920184] ? create_object.isra.0+0x3a/0xa30 [ 1186.921146] should_failslab+0x5/0x20 [ 1186.921951] kmem_cache_alloc+0x5b/0x310 [ 1186.922811] create_object.isra.0+0x3a/0xa30 [ 1186.923738] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1186.924815] kmem_cache_alloc+0x159/0x310 [ 1186.925714] copy_process+0x2514/0x78b0 [ 1186.926563] ? SOFTIRQ_verbose+0x10/0x10 [ 1186.927422] ? __lockdep_reset_lock+0x180/0x180 [ 1186.928401] ? mark_lock+0xf5/0x2df0 [ 1186.929219] ? __cleanup_sighand+0xb0/0xb0 [ 1186.930137] ? _copy_from_user+0xfb/0x1b0 [ 1186.931020] kernel_clone+0xe7/0x980 [ 1186.931806] ? __lockdep_reset_lock+0x180/0x180 [ 1186.932788] ? create_io_thread+0xf0/0xf0 [ 1186.933696] ? ksys_write+0x21a/0x260 [ 1186.934506] ? lock_downgrade+0x6d0/0x6d0 [ 1186.935389] __do_sys_clone3+0x1e5/0x320 [ 1186.936249] ? __do_sys_clone+0x110/0x110 [ 1186.937155] ? rcu_read_lock_any_held+0x75/0xa0 [ 1186.938144] ? vfs_write+0x354/0xb10 [ 1186.938938] ? fput_many+0x2f/0x1a0 [ 1186.939703] ? ksys_write+0x1a9/0x260 [ 1186.940213] Unsupported ieee802154 address type: 0 [ 1186.940509] ? __ia32_sys_read+0xb0/0xb0 [ 1186.940535] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1186.940556] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1186.940579] ? trace_hardirqs_on+0x5b/0x180 [ 1186.945501] do_syscall_64+0x33/0x40 [ 1186.946289] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1186.947384] RIP: 0033:0x7fa1817f7b19 [ 1186.948167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1186.952070] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1186.953688] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1186.955193] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1186.956699] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1186.958216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1186.959742] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1186.965664] FAULT_INJECTION: forcing a failure. [ 1186.965664] name failslab, interval 1, probability 0, space 0, times 0 [ 1186.968071] CPU: 1 PID: 9301 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1186.969544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1186.971305] Call Trace: [ 1186.971871] dump_stack+0x107/0x167 [ 1186.972646] should_fail.cold+0x5/0xa [ 1186.973467] ? create_object.isra.0+0x3a/0xa30 [ 1186.974437] should_failslab+0x5/0x20 [ 1186.975240] kmem_cache_alloc+0x5b/0x310 [ 1186.976097] ? mark_held_locks+0x9e/0xe0 [ 1186.976968] create_object.isra.0+0x3a/0xa30 [ 1186.977916] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1186.979000] kmem_cache_alloc_trace+0x151/0x320 [ 1186.980001] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1186.981045] __list_lru_init+0x44d/0x890 [ 1186.981922] alloc_super+0x8b8/0xa90 [ 1186.982715] sget_fc+0x110/0x860 [ 1186.983438] ? set_anon_super+0xc0/0xc0 [ 1186.984288] ? shmem_put_link+0x120/0x120 [ 1186.985172] get_tree_nodev+0x24/0x1d0 [ 1186.986008] vfs_get_tree+0x8e/0x300 [ 1186.986794] path_mount+0x1490/0x21e0 [ 1186.987605] ? strncpy_from_user+0x9e/0x470 [ 1186.988519] ? finish_automount+0xa90/0xa90 [ 1186.989440] ? getname_flags.part.0+0x1dd/0x4f0 [ 1186.990441] __x64_sys_mount+0x282/0x300 [ 1186.991298] ? copy_mnt_ns+0xa00/0xa00 [ 1186.992128] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1186.993249] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1186.994352] do_syscall_64+0x33/0x40 [ 1186.995143] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1186.996233] RIP: 0033:0x7f749eb7204a [ 1186.997020] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1187.000967] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1187.002588] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1187.004106] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1187.005627] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1187.007143] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1187.008665] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1187.030347] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:21:55 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:21:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 97) 15:21:55 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000000040)=0x5, 0x4) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0202}}}, 0x14) [ 1187.130444] SELinux: duplicate or incompatible mount options [ 1187.133828] SELinux: duplicate or incompatible mount options 15:21:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) [ 1187.184680] FAULT_INJECTION: forcing a failure. [ 1187.184680] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.187015] CPU: 0 PID: 9352 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1187.188431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1187.190150] Call Trace: [ 1187.190704] dump_stack+0x107/0x167 [ 1187.191461] should_fail.cold+0x5/0xa [ 1187.192245] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1187.193296] should_failslab+0x5/0x20 [ 1187.194076] kmem_cache_alloc_trace+0x55/0x320 [ 1187.195007] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1187.196047] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1187.197069] __list_lru_init+0x44d/0x890 [ 1187.197918] alloc_super+0x8b8/0xa90 [ 1187.198687] sget_fc+0x110/0x860 [ 1187.199378] ? set_anon_super+0xc0/0xc0 [ 1187.200204] ? shmem_put_link+0x120/0x120 [ 1187.201044] get_tree_nodev+0x24/0x1d0 [ 1187.201842] vfs_get_tree+0x8e/0x300 [ 1187.202590] path_mount+0x1490/0x21e0 [ 1187.203373] ? strncpy_from_user+0x9e/0x470 [ 1187.204243] ? finish_automount+0xa90/0xa90 [ 1187.205112] ? getname_flags.part.0+0x1dd/0x4f0 [ 1187.206079] __x64_sys_mount+0x282/0x300 [ 1187.206899] ? copy_mnt_ns+0xa00/0xa00 [ 1187.207698] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1187.208766] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1187.209830] do_syscall_64+0x33/0x40 [ 1187.210584] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1187.211625] RIP: 0033:0x7f749eb7204a [ 1187.212382] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1187.216095] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1187.217639] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1187.219082] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1187.220527] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1187.221975] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1187.223419] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 15:21:56 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:21:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 15:21:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1187.328085] SELinux: duplicate or incompatible mount options [ 1187.332470] FAULT_INJECTION: forcing a failure. [ 1187.332470] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1187.334974] CPU: 0 PID: 9417 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1187.336284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1187.337879] Call Trace: [ 1187.338394] dump_stack+0x107/0x167 [ 1187.339102] should_fail.cold+0x5/0xa [ 1187.339846] __alloc_pages_nodemask+0x182/0x600 [ 1187.340760] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1187.341959] alloc_pages_current+0x187/0x280 [ 1187.342808] __get_free_pages+0xc/0xa0 [ 1187.343560] pgd_alloc+0x84/0x4e0 [ 1187.344227] ? pgd_page_get_mm+0x40/0x40 [ 1187.345008] ? lockdep_init_map_type+0x2c7/0x780 [ 1187.345926] ? lockdep_init_map_type+0x2c7/0x780 [ 1187.346862] mm_init+0x670/0xab0 [ 1187.347520] copy_process+0x257b/0x78b0 [ 1187.348282] ? SOFTIRQ_verbose+0x10/0x10 [ 1187.349068] ? __lockdep_reset_lock+0x180/0x180 [ 1187.350020] ? __cleanup_sighand+0xb0/0xb0 [ 1187.350870] ? _copy_from_user+0xfb/0x1b0 [ 1187.351684] kernel_clone+0xe7/0x980 [ 1187.352396] ? __lockdep_reset_lock+0x180/0x180 [ 1187.353300] ? create_io_thread+0xf0/0xf0 [ 1187.354124] ? ksys_write+0x21a/0x260 [ 1187.354853] ? lock_downgrade+0x6d0/0x6d0 [ 1187.355667] __do_sys_clone3+0x1e5/0x320 [ 1187.356438] ? __do_sys_clone+0x110/0x110 [ 1187.357267] ? rcu_read_lock_any_held+0x75/0xa0 [ 1187.358138] ? vfs_write+0x354/0xb10 [ 1187.358847] ? fput_many+0x2f/0x1a0 [ 1187.359539] ? ksys_write+0x1a9/0x260 [ 1187.360261] ? __ia32_sys_read+0xb0/0xb0 [ 1187.361041] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1187.362036] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1187.363013] ? trace_hardirqs_on+0x5b/0x180 [ 1187.363835] do_syscall_64+0x33/0x40 [ 1187.364544] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1187.365525] RIP: 0033:0x7fa1817f7b19 [ 1187.366232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1187.369702] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1187.371154] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1187.372503] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1187.373862] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1187.375220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1187.376348] FAULT_INJECTION: forcing a failure. [ 1187.376348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1187.376556] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1187.380736] SELinux: duplicate or incompatible mount options 15:21:56 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 98) [ 1187.381031] CPU: 1 PID: 9420 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1187.383807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1187.385757] Call Trace: [ 1187.386369] dump_stack+0x107/0x167 [ 1187.387219] should_fail.cold+0x5/0xa [ 1187.388116] _copy_from_user+0x2e/0x1b0 [ 1187.389054] copy_clone_args_from_user+0x147/0x790 [ 1187.390219] ? __lockdep_reset_lock+0x180/0x180 [ 1187.391301] ? sighand_ctor+0x40/0x40 [ 1187.392202] ? find_held_lock+0x2c/0x110 [ 1187.393151] ? ksys_write+0x21a/0x260 [ 1187.394052] ? lock_downgrade+0x6d0/0x6d0 [ 1187.395023] __do_sys_clone3+0x9d/0x320 [ 1187.395946] ? __do_sys_clone+0x110/0x110 [ 1187.396917] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1187.398044] ? wait_for_completion_io+0x270/0x270 [ 1187.399161] ? rcu_read_lock_any_held+0x75/0xa0 [ 1187.400224] ? vfs_write+0x354/0xb10 [ 1187.401077] ? fput_many+0x2f/0x1a0 [ 1187.401921] ? ksys_write+0x1a9/0x260 [ 1187.402795] ? __ia32_sys_read+0xb0/0xb0 [ 1187.403745] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1187.404944] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1187.406150] ? trace_hardirqs_on+0x5b/0x180 [ 1187.407149] do_syscall_64+0x33/0x40 [ 1187.408011] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1187.409187] RIP: 0033:0x7f8fbb637b19 [ 1187.410049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1187.414286] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1187.416025] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1187.417669] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1187.419296] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1187.420917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1187.422552] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1187.487194] FAULT_INJECTION: forcing a failure. [ 1187.487194] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.489813] CPU: 1 PID: 9427 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1187.491290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1187.493093] Call Trace: [ 1187.493681] dump_stack+0x107/0x167 [ 1187.494478] should_fail.cold+0x5/0xa [ 1187.495308] ? create_object.isra.0+0x3a/0xa30 [ 1187.496303] should_failslab+0x5/0x20 [ 1187.497127] kmem_cache_alloc+0x5b/0x310 [ 1187.498027] create_object.isra.0+0x3a/0xa30 [ 1187.498984] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1187.500087] kmem_cache_alloc_trace+0x151/0x320 [ 1187.501107] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1187.502179] __list_lru_init+0x44d/0x890 [ 1187.503073] alloc_super+0x8b8/0xa90 [ 1187.503887] sget_fc+0x110/0x860 [ 1187.504616] ? set_anon_super+0xc0/0xc0 [ 1187.505494] ? shmem_put_link+0x120/0x120 [ 1187.506384] get_tree_nodev+0x24/0x1d0 [ 1187.507225] vfs_get_tree+0x8e/0x300 [ 1187.508038] path_mount+0x1490/0x21e0 [ 1187.508860] ? strncpy_from_user+0x9e/0x470 [ 1187.509793] ? finish_automount+0xa90/0xa90 [ 1187.510721] ? getname_flags.part.0+0x1dd/0x4f0 [ 1187.511735] __x64_sys_mount+0x282/0x300 [ 1187.512596] ? copy_mnt_ns+0xa00/0xa00 [ 1187.513443] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1187.514567] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1187.515669] do_syscall_64+0x33/0x40 [ 1187.516461] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1187.517568] RIP: 0033:0x7f749eb7204a [ 1187.518381] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1187.522320] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1187.523951] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1187.525468] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1187.526976] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1187.528485] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1187.530021] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1187.629017] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:22:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 15:22:10 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xe00, 0x0}}], 0x324, 0x0) 15:22:10 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xf00, 0x0}}], 0x324, 0x0) 15:22:10 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 15:22:10 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 99) 15:22:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:22:10 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x700, 0x0}}], 0x324, 0x0) [ 1202.078669] FAULT_INJECTION: forcing a failure. [ 1202.078669] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.081381] CPU: 0 PID: 9545 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1202.082990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1202.084237] SELinux: duplicate or incompatible mount options [ 1202.084926] Call Trace: [ 1202.084959] dump_stack+0x107/0x167 [ 1202.084987] should_fail.cold+0x5/0xa [ 1202.085022] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1202.090043] should_failslab+0x5/0x20 [ 1202.090944] kmem_cache_alloc_trace+0x55/0x320 [ 1202.092012] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1202.093223] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1202.094416] __list_lru_init+0x44d/0x890 [ 1202.095391] alloc_super+0x8b8/0xa90 [ 1202.096014] SELinux: duplicate or incompatible mount options [ 1202.096293] sget_fc+0x110/0x860 [ 1202.096329] ? set_anon_super+0xc0/0xc0 [ 1202.099772] ? shmem_put_link+0x120/0x120 [ 1202.101004] get_tree_nodev+0x24/0x1d0 [ 1202.102196] vfs_get_tree+0x8e/0x300 [ 1202.103185] path_mount+0x1490/0x21e0 [ 1202.104116] ? strncpy_from_user+0x9e/0x470 [ 1202.105160] ? finish_automount+0xa90/0xa90 [ 1202.106226] ? getname_flags.part.0+0x1dd/0x4f0 [ 1202.107374] __x64_sys_mount+0x282/0x300 [ 1202.108380] ? copy_mnt_ns+0xa00/0xa00 [ 1202.109339] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1202.110736] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1202.112042] do_syscall_64+0x33/0x40 [ 1202.112946] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1202.114199] RIP: 0033:0x7f749eb7204a [ 1202.115100] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1202.119562] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1202.121545] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1202.123260] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1202.124974] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1202.126713] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1202.128419] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1202.148774] FAULT_INJECTION: forcing a failure. [ 1202.148774] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.151957] CPU: 0 PID: 9547 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1202.153605] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1202.155556] Call Trace: [ 1202.156183] dump_stack+0x107/0x167 [ 1202.157060] should_fail.cold+0x5/0xa [ 1202.157992] ? vm_area_dup+0x78/0x290 [ 1202.158926] should_failslab+0x5/0x20 [ 1202.159840] kmem_cache_alloc+0x5b/0x310 [ 1202.160845] vm_area_dup+0x78/0x290 [ 1202.161759] ? __lock_acquire+0xbb1/0x5b00 [ 1202.162809] ? perf_trace_lock+0xac/0x490 [ 1202.163782] ? SOFTIRQ_verbose+0x10/0x10 [ 1202.164760] ? __lockdep_reset_lock+0x180/0x180 [ 1202.165896] ? vm_area_alloc+0x110/0x110 [ 1202.166855] ? find_held_lock+0x2c/0x110 [ 1202.167837] ? get_mm_exe_file+0x139/0x310 [ 1202.168848] ? lock_downgrade+0x6d0/0x6d0 [ 1202.169856] ? down_write_nested+0xe4/0x160 15:22:11 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1202.170870] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1202.172252] ? get_mm_exe_file+0x162/0x310 [ 1202.173260] copy_process+0x298b/0x78b0 [ 1202.174216] ? SOFTIRQ_verbose+0x10/0x10 [ 1202.175259] ? __cleanup_sighand+0xb0/0xb0 [ 1202.176330] ? _copy_from_user+0xfb/0x1b0 [ 1202.177350] kernel_clone+0xe7/0x980 [ 1202.178226] ? __lockdep_reset_lock+0x180/0x180 [ 1202.179334] ? create_io_thread+0xf0/0xf0 [ 1202.180354] ? ksys_write+0x21a/0x260 [ 1202.181243] ? lock_downgrade+0x6d0/0x6d0 [ 1202.182244] __do_sys_clone3+0x1e5/0x320 [ 1202.183194] ? __do_sys_clone+0x110/0x110 [ 1202.184211] ? rcu_read_lock_any_held+0x75/0xa0 [ 1202.185318] ? vfs_write+0x354/0xb10 [ 1202.186193] ? fput_many+0x2f/0x1a0 [ 1202.187049] ? ksys_write+0x1a9/0x260 [ 1202.187937] ? __ia32_sys_read+0xb0/0xb0 [ 1202.188909] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1202.190141] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1202.191352] ? trace_hardirqs_on+0x5b/0x180 [ 1202.192385] do_syscall_64+0x33/0x40 [ 1202.193241] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1202.194447] RIP: 0033:0x7fa1817f7b19 [ 1202.195309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1202.199599] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1202.201680] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1202.203563] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1202.205477] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1202.207381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1202.209242] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1202.214019] FAULT_INJECTION: forcing a failure. [ 1202.214019] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.217072] CPU: 0 PID: 9549 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1202.218878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1202.221089] Call Trace: [ 1202.221798] dump_stack+0x107/0x167 [ 1202.222643] should_fail.cold+0x5/0xa [ 1202.223505] ? copy_process+0x3305/0x78b0 [ 1202.224446] should_failslab+0x5/0x20 [ 1202.225308] kmem_cache_alloc_node+0x55/0x330 [ 1202.226346] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1202.227539] copy_process+0x3305/0x78b0 [ 1202.228427] ? SOFTIRQ_verbose+0x10/0x10 [ 1202.229365] ? __lockdep_reset_lock+0x180/0x180 [ 1202.230435] ? mark_lock+0xf5/0x2df0 [ 1202.231272] ? lock_acquire+0x197/0x470 [ 1202.232162] ? find_held_lock+0x2c/0x110 [ 1202.233086] ? __cleanup_sighand+0xb0/0xb0 [ 1202.234081] ? _copy_from_user+0xfb/0x1b0 [ 1202.235009] kernel_clone+0xe7/0x980 [ 1202.235838] ? __lockdep_reset_lock+0x180/0x180 [ 1202.236889] ? create_io_thread+0xf0/0xf0 [ 1202.237907] ? ksys_write+0x21a/0x260 [ 1202.238772] ? lock_downgrade+0x6d0/0x6d0 [ 1202.239752] __do_sys_clone3+0x1e5/0x320 [ 1202.240662] ? __do_sys_clone+0x110/0x110 [ 1202.241619] ? rcu_read_lock_any_held+0x75/0xa0 [ 1202.242651] ? vfs_write+0x354/0xb10 [ 1202.243519] ? fput_many+0x2f/0x1a0 [ 1202.244357] ? ksys_write+0x1a9/0x260 [ 1202.245190] ? __ia32_sys_read+0xb0/0xb0 [ 1202.246120] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1202.247291] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1202.248449] ? trace_hardirqs_on+0x5b/0x180 [ 1202.249409] do_syscall_64+0x33/0x40 [ 1202.250239] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1202.251386] RIP: 0033:0x7f8fbb637b19 [ 1202.252193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1202.256228] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1202.257925] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1202.259490] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1202.261043] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1202.262629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1202.264179] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1202.283108] SELinux: duplicate or incompatible mount options [ 1202.292407] SELinux: duplicate or incompatible mount options 15:22:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:22:11 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x9e15000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 15:22:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) 15:22:11 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 100) [ 1202.492229] FAULT_INJECTION: forcing a failure. [ 1202.492229] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.495110] CPU: 0 PID: 9711 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1202.496737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1202.498612] Call Trace: [ 1202.499203] dump_stack+0x107/0x167 [ 1202.500021] should_fail.cold+0x5/0xa [ 1202.500866] ? create_object.isra.0+0x3a/0xa30 [ 1202.501880] should_failslab+0x5/0x20 [ 1202.502753] kmem_cache_alloc+0x5b/0x310 [ 1202.503686] create_object.isra.0+0x3a/0xa30 [ 1202.504649] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1202.505787] kmem_cache_alloc_node+0x169/0x330 [ 1202.506806] copy_process+0x3305/0x78b0 [ 1202.507869] ? SOFTIRQ_verbose+0x10/0x10 [ 1202.509025] ? __lockdep_reset_lock+0x180/0x180 [ 1202.510370] ? lock_acquire+0x197/0x470 [ 1202.511473] ? find_held_lock+0x2c/0x110 [ 1202.511561] FAULT_INJECTION: forcing a failure. [ 1202.511561] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.512421] ? __cleanup_sighand+0xb0/0xb0 [ 1202.515775] ? _copy_from_user+0xfb/0x1b0 [ 1202.516714] kernel_clone+0xe7/0x980 [ 1202.517564] ? __lockdep_reset_lock+0x180/0x180 [ 1202.518602] ? create_io_thread+0xf0/0xf0 [ 1202.519564] ? ksys_write+0x21a/0x260 [ 1202.520417] ? lock_downgrade+0x6d0/0x6d0 [ 1202.521346] __do_sys_clone3+0x1e5/0x320 [ 1202.522253] ? __do_sys_clone+0x110/0x110 [ 1202.523219] ? rcu_read_lock_any_held+0x75/0xa0 [ 1202.524255] ? vfs_write+0x354/0xb10 [ 1202.525096] ? fput_many+0x2f/0x1a0 [ 1202.525911] ? ksys_write+0x1a9/0x260 [ 1202.526751] ? __ia32_sys_read+0xb0/0xb0 [ 1202.527662] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1202.528829] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1202.529964] ? trace_hardirqs_on+0x5b/0x180 [ 1202.530920] do_syscall_64+0x33/0x40 [ 1202.531753] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1202.532877] RIP: 0033:0x7f8fbb637b19 [ 1202.533712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1202.537731] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1202.539399] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1202.540942] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1202.542502] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1202.544045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1202.545616] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1202.547203] CPU: 1 PID: 9723 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 1202.548715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1202.550511] Call Trace: [ 1202.551082] dump_stack+0x107/0x167 [ 1202.551862] should_fail.cold+0x5/0xa [ 1202.552686] ? create_object.isra.0+0x3a/0xa30 [ 1202.553679] should_failslab+0x5/0x20 [ 1202.554491] kmem_cache_alloc+0x5b/0x310 [ 1202.555358] create_object.isra.0+0x3a/0xa30 [ 1202.556285] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1202.557366] kmem_cache_alloc_trace+0x151/0x320 [ 1202.558391] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1202.559442] __list_lru_init+0x44d/0x890 [ 1202.560311] alloc_super+0x8b8/0xa90 [ 1202.561111] sget_fc+0x110/0x860 [ 1202.561861] ? set_anon_super+0xc0/0xc0 [ 1202.562711] ? shmem_put_link+0x120/0x120 [ 1202.563583] get_tree_nodev+0x24/0x1d0 [ 1202.564403] vfs_get_tree+0x8e/0x300 [ 1202.565194] path_mount+0x1490/0x21e0 [ 1202.566044] ? strncpy_from_user+0x9e/0x470 [ 1202.566970] ? finish_automount+0xa90/0xa90 [ 1202.567889] ? getname_flags.part.0+0x1dd/0x4f0 [ 1202.568917] __x64_sys_mount+0x282/0x300 [ 1202.569826] ? copy_mnt_ns+0xa00/0xa00 [ 1202.570667] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1202.571790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1202.572143] SELinux: duplicate or incompatible mount options [ 1202.572894] do_syscall_64+0x33/0x40 [ 1202.572928] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1202.576048] RIP: 0033:0x7f749eb7204a [ 1202.576843] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1202.580761] RSP: 002b:00007f749c0e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1202.582400] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f749eb7204a [ 1202.583910] RDX: 0000000020000100 RSI: 0000000020000140 RDI: 0000000000000000 [ 1202.585431] RBP: 00007f749c0e6040 R08: 00007f749c0e6040 R09: 0000000020000100 [ 1202.586974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000100 [ 1202.588488] R13: 0000000020000140 R14: 00007f749c0e6000 R15: 0000000020000280 [ 1202.606700] SELinux: duplicate or incompatible mount options [ 1202.612129] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1202.652502] FAULT_INJECTION: forcing a failure. [ 1202.652502] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.654902] CPU: 0 PID: 9754 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1202.656287] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1202.657943] Call Trace: [ 1202.658489] dump_stack+0x107/0x167 [ 1202.659206] should_fail.cold+0x5/0xa [ 1202.659979] ? create_object.isra.0+0x3a/0xa30 [ 1202.660884] should_failslab+0x5/0x20 [ 1202.661653] kmem_cache_alloc+0x5b/0x310 [ 1202.662477] create_object.isra.0+0x3a/0xa30 [ 1202.663353] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1202.664464] kmem_cache_alloc+0x159/0x310 [ 1202.665514] vm_area_dup+0x78/0x290 [ 1202.666452] ? __lock_acquire+0xbb1/0x5b00 [ 1202.667568] ? perf_trace_lock+0xac/0x490 [ 1202.668604] ? SOFTIRQ_verbose+0x10/0x10 [ 1202.669652] ? __lockdep_reset_lock+0x180/0x180 [ 1202.670834] ? vm_area_alloc+0x110/0x110 [ 1202.671828] ? find_held_lock+0x2c/0x110 [ 1202.672850] ? get_mm_exe_file+0x139/0x310 [ 1202.673911] ? lock_downgrade+0x6d0/0x6d0 [ 1202.674940] ? down_write_nested+0xe4/0x160 [ 1202.676001] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1202.677260] ? get_mm_exe_file+0x162/0x310 [ 1202.678321] copy_process+0x298b/0x78b0 [ 1202.679298] ? SOFTIRQ_verbose+0x10/0x10 [ 1202.680386] ? __cleanup_sighand+0xb0/0xb0 [ 1202.681501] ? _copy_from_user+0xfb/0x1b0 [ 1202.682561] kernel_clone+0xe7/0x980 [ 1202.683461] ? __lockdep_reset_lock+0x180/0x180 15:22:11 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1202.684620] ? create_io_thread+0xf0/0xf0 [ 1202.685807] ? ksys_write+0x21a/0x260 [ 1202.686743] ? lock_downgrade+0x6d0/0x6d0 [ 1202.687789] __do_sys_clone3+0x1e5/0x320 [ 1202.688806] ? __do_sys_clone+0x110/0x110 [ 1202.689814] ? rcu_read_lock_any_held+0x75/0xa0 [ 1202.690709] ? vfs_write+0x354/0xb10 [ 1202.691426] ? fput_many+0x2f/0x1a0 [ 1202.692118] ? ksys_write+0x1a9/0x260 [ 1202.692843] ? __ia32_sys_read+0xb0/0xb0 [ 1202.693634] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1202.694637] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1202.695612] ? trace_hardirqs_on+0x5b/0x180 [ 1202.696445] do_syscall_64+0x33/0x40 [ 1202.697154] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1202.698126] RIP: 0033:0x7fa1817f7b19 [ 1202.698854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1202.702351] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1202.703791] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1202.705132] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1202.706481] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1202.707839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1202.709182] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1202.725985] SELinux: duplicate or incompatible mount options [ 1202.729623] SELinux: duplicate or incompatible mount options 15:22:24 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:24 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1100, 0x0}}], 0x324, 0x0) 15:22:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 15:22:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) 15:22:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1ffff000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:22:24 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 15:22:24 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0xf00, 0x0}}], 0x324, 0x0) [ 1215.966138] FAULT_INJECTION: forcing a failure. [ 1215.966138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1215.969017] CPU: 1 PID: 9792 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1215.969267] FAULT_INJECTION: forcing a failure. [ 1215.969267] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1215.970736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1215.970746] Call Trace: [ 1215.970777] dump_stack+0x107/0x167 [ 1215.970806] should_fail.cold+0x5/0xa [ 1215.977554] _copy_from_user+0x2e/0x1b0 [ 1215.978501] copy_clone_args_from_user+0x147/0x790 [ 1215.979637] ? __lockdep_reset_lock+0x180/0x180 [ 1215.980705] ? sighand_ctor+0x40/0x40 [ 1215.981589] ? find_held_lock+0x2c/0x110 [ 1215.982552] ? ksys_write+0x21a/0x260 [ 1215.983429] ? lock_downgrade+0x6d0/0x6d0 [ 1215.984387] __do_sys_clone3+0x9d/0x320 [ 1215.985300] ? __do_sys_clone+0x110/0x110 [ 1215.986290] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1215.987400] ? wait_for_completion_io+0x270/0x270 [ 1215.988513] ? rcu_read_lock_any_held+0x75/0xa0 [ 1215.989579] ? vfs_write+0x354/0xb10 [ 1215.990467] ? fput_many+0x2f/0x1a0 [ 1215.991300] ? ksys_write+0x1a9/0x260 [ 1215.992176] ? __ia32_sys_read+0xb0/0xb0 [ 1215.993117] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1215.994351] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1215.995534] ? trace_hardirqs_on+0x5b/0x180 [ 1215.996530] do_syscall_64+0x33/0x40 [ 1215.997389] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1215.998597] RIP: 0033:0x7f4d52085b19 [ 1215.999458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.003721] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1216.005479] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1216.007129] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1216.008758] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1216.010417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1216.012053] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1216.013760] CPU: 0 PID: 9785 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1216.015303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1216.017118] Call Trace: [ 1216.017725] dump_stack+0x107/0x167 [ 1216.018534] should_fail.cold+0x5/0xa [ 1216.019385] __alloc_pages_nodemask+0x182/0x600 [ 1216.020406] ? lock_downgrade+0x6d0/0x6d0 [ 1216.021327] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1216.022665] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1216.023810] ? kmem_cache_alloc_node+0x2bc/0x330 [ 1216.024844] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.026014] copy_process+0x62b/0x78b0 [ 1216.026864] ? SOFTIRQ_verbose+0x10/0x10 [ 1216.027764] ? __lockdep_reset_lock+0x180/0x180 [ 1216.028799] ? lock_acquire+0x197/0x470 [ 1216.029686] ? find_held_lock+0x2c/0x110 [ 1216.030602] ? __cleanup_sighand+0xb0/0xb0 [ 1216.031571] ? _copy_from_user+0xfb/0x1b0 [ 1216.032500] kernel_clone+0xe7/0x980 [ 1216.033317] ? __lockdep_reset_lock+0x180/0x180 [ 1216.034352] ? create_io_thread+0xf0/0xf0 [ 1216.035287] ? ksys_write+0x21a/0x260 [ 1216.036126] ? lock_downgrade+0x6d0/0x6d0 [ 1216.037052] __do_sys_clone3+0x1e5/0x320 [ 1216.037952] ? __do_sys_clone+0x110/0x110 [ 1216.038901] ? rcu_read_lock_any_held+0x75/0xa0 [ 1216.039920] ? vfs_write+0x354/0xb10 [ 1216.040742] ? fput_many+0x2f/0x1a0 [ 1216.041539] ? ksys_write+0x1a9/0x260 [ 1216.042387] ? __ia32_sys_read+0xb0/0xb0 [ 1216.043298] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.044446] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1216.045573] ? trace_hardirqs_on+0x5b/0x180 [ 1216.046537] do_syscall_64+0x33/0x40 [ 1216.047356] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1216.048478] RIP: 0033:0x7f8fbb637b19 [ 1216.049297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.053309] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1216.054983] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1216.056542] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1216.058112] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1216.059669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1216.061230] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1216.075581] SELinux: duplicate or incompatible mount options [ 1216.081020] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1216.085019] FAULT_INJECTION: forcing a failure. [ 1216.085019] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.087524] CPU: 0 PID: 9882 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1216.089016] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1216.090832] Call Trace: [ 1216.091419] dump_stack+0x107/0x167 [ 1216.092227] should_fail.cold+0x5/0xa [ 1216.093067] ? copy_process+0x2514/0x78b0 [ 1216.093988] should_failslab+0x5/0x20 [ 1216.094823] kmem_cache_alloc+0x5b/0x310 [ 1216.095728] copy_process+0x2514/0x78b0 [ 1216.096597] ? SOFTIRQ_verbose+0x10/0x10 [ 1216.097496] ? __lockdep_reset_lock+0x180/0x180 [ 1216.098582] ? __cleanup_sighand+0xb0/0xb0 [ 1216.099550] ? _copy_from_user+0xfb/0x1b0 [ 1216.100476] kernel_clone+0xe7/0x980 [ 1216.101290] ? __lockdep_reset_lock+0x180/0x180 [ 1216.102324] ? create_io_thread+0xf0/0xf0 [ 1216.103258] ? ksys_write+0x21a/0x260 [ 1216.104098] ? lock_downgrade+0x6d0/0x6d0 [ 1216.105021] __do_sys_clone3+0x1e5/0x320 [ 1216.105923] ? __do_sys_clone+0x110/0x110 [ 1216.106872] ? rcu_read_lock_any_held+0x75/0xa0 [ 1216.107885] ? vfs_write+0x354/0xb10 [ 1216.108704] ? fput_many+0x2f/0x1a0 [ 1216.109501] ? ksys_write+0x1a9/0x260 [ 1216.110349] ? __ia32_sys_read+0xb0/0xb0 [ 1216.111253] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.112400] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1216.113520] ? trace_hardirqs_on+0x5b/0x180 [ 1216.114487] do_syscall_64+0x33/0x40 [ 1216.115303] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1216.116421] RIP: 0033:0x7fa1817f7b19 [ 1216.117237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.121242] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1216.122914] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1216.124473] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1216.126041] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1216.127617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1216.129165] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1216.136757] SELinux: duplicate or incompatible mount options 15:22:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:22:25 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1216.234192] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:22:25 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1200, 0x0}}], 0x324, 0x0) 15:22:25 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1216.272684] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:22:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 15:22:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) [ 1216.336203] SELinux: duplicate or incompatible mount options 15:22:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) [ 1216.354517] SELinux: duplicate or incompatible mount options 15:22:25 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1216.384371] FAULT_INJECTION: forcing a failure. [ 1216.384371] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.387174] CPU: 1 PID: 9906 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1216.388557] FAULT_INJECTION: forcing a failure. [ 1216.388557] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.388915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1216.388925] Call Trace: [ 1216.388963] dump_stack+0x107/0x167 [ 1216.394657] should_fail.cold+0x5/0xa [ 1216.395537] ? copy_process+0x3305/0x78b0 [ 1216.396419] should_failslab+0x5/0x20 [ 1216.397237] kmem_cache_alloc_node+0x55/0x330 [ 1216.398229] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.399351] copy_process+0x3305/0x78b0 [ 1216.400197] ? SOFTIRQ_verbose+0x10/0x10 [ 1216.401071] ? __lockdep_reset_lock+0x180/0x180 [ 1216.402085] ? mark_lock+0xf5/0x2df0 [ 1216.403030] ? lock_acquire+0x197/0x470 [ 1216.404057] ? find_held_lock+0x2c/0x110 [ 1216.405110] ? __cleanup_sighand+0xb0/0xb0 [ 1216.406223] ? _copy_from_user+0xfb/0x1b0 [ 1216.407292] kernel_clone+0xe7/0x980 [ 1216.408248] ? __lockdep_reset_lock+0x180/0x180 [ 1216.409436] ? create_io_thread+0xf0/0xf0 [ 1216.410536] ? ksys_write+0x21a/0x260 [ 1216.411356] ? lock_downgrade+0x6d0/0x6d0 [ 1216.412431] __do_sys_clone3+0x1e5/0x320 [ 1216.413475] ? __do_sys_clone+0x110/0x110 [ 1216.414413] ? rcu_read_lock_any_held+0x75/0xa0 [ 1216.415599] ? vfs_write+0x354/0xb10 [ 1216.416400] ? fput_many+0x2f/0x1a0 [ 1216.417177] ? ksys_write+0x1a9/0x260 [ 1216.418033] ? __ia32_sys_read+0xb0/0xb0 [ 1216.418909] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.420030] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1216.421123] ? trace_hardirqs_on+0x5b/0x180 [ 1216.422084] do_syscall_64+0x33/0x40 [ 1216.422891] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1216.423990] RIP: 0033:0x7f4d52085b19 [ 1216.424793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.428691] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1216.430347] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1216.431863] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1216.433382] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1216.434923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1216.436442] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1216.438027] CPU: 0 PID: 9907 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1216.439327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1216.440901] Call Trace: [ 1216.441412] dump_stack+0x107/0x167 [ 1216.442131] should_fail.cold+0x5/0xa [ 1216.442865] ? create_object.isra.0+0x3a/0xa30 [ 1216.443731] should_failslab+0x5/0x20 [ 1216.444460] kmem_cache_alloc+0x5b/0x310 [ 1216.445250] create_object.isra.0+0x3a/0xa30 [ 1216.446092] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1216.447064] kmem_cache_alloc+0x159/0x310 [ 1216.447868] vm_area_dup+0x78/0x290 [ 1216.448585] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1216.449467] ? lock_downgrade+0x6d0/0x6d0 [ 1216.450264] ? copy_page_range+0x24e9/0x3810 [ 1216.451120] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1216.451998] ? avc_has_extended_perms+0xf40/0xf40 [ 1216.452932] ? vm_area_alloc+0x110/0x110 [ 1216.453698] ? find_held_lock+0x2c/0x110 [ 1216.454487] ? selinux_vm_enough_memory+0x114/0x180 [ 1216.455442] ? selinux_sb_statfs+0x250/0x250 [ 1216.456284] ? percpu_counter_add_batch+0x8b/0x140 [ 1216.457225] ? __vm_enough_memory+0x184/0x360 [ 1216.458082] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1216.459071] copy_process+0x298b/0x78b0 [ 1216.459824] ? SOFTIRQ_verbose+0x10/0x10 [ 1216.460659] ? __cleanup_sighand+0xb0/0xb0 [ 1216.461504] ? _copy_from_user+0xfb/0x1b0 [ 1216.462328] kernel_clone+0xe7/0x980 [ 1216.463047] ? __lockdep_reset_lock+0x180/0x180 [ 1216.463950] ? create_io_thread+0xf0/0xf0 [ 1216.464773] ? ksys_write+0x21a/0x260 [ 1216.465513] ? lock_downgrade+0x6d0/0x6d0 [ 1216.466333] __do_sys_clone3+0x1e5/0x320 [ 1216.467116] ? __do_sys_clone+0x110/0x110 [ 1216.467952] ? rcu_read_lock_any_held+0x75/0xa0 [ 1216.468841] ? vfs_write+0x354/0xb10 [ 1216.469564] ? fput_many+0x2f/0x1a0 [ 1216.470271] ? ksys_write+0x1a9/0x260 [ 1216.470998] ? __ia32_sys_read+0xb0/0xb0 [ 1216.471784] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.472772] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1216.473757] ? trace_hardirqs_on+0x5b/0x180 [ 1216.474587] do_syscall_64+0x33/0x40 [ 1216.475298] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1216.476270] RIP: 0033:0x7fa1817f7b19 [ 1216.476980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.480461] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1216.481927] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1216.483276] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1216.484629] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1216.485987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1216.487327] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:22:25 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1216.532581] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1216.549323] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:22:25 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1216.637839] SELinux: duplicate or incompatible mount options [ 1216.643519] SELinux: duplicate or incompatible mount options [ 1216.647862] FAULT_INJECTION: forcing a failure. [ 1216.647862] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.650296] CPU: 1 PID: 10020 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1216.651698] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1216.653375] Call Trace: [ 1216.653953] dump_stack+0x107/0x167 [ 1216.654695] should_fail.cold+0x5/0xa [ 1216.655473] ? prepare_creds+0x25/0x5e0 [ 1216.655871] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1216.656284] should_failslab+0x5/0x20 [ 1216.658657] kmem_cache_alloc+0x5b/0x310 [ 1216.659488] ? lock_downgrade+0x6d0/0x6d0 [ 1216.660344] prepare_creds+0x25/0x5e0 [ 1216.661116] copy_creds+0x72/0x580 [ 1216.661878] copy_process+0xfef/0x78b0 [ 1216.662669] ? SOFTIRQ_verbose+0x10/0x10 [ 1216.663501] ? __lockdep_reset_lock+0x180/0x180 [ 1216.664439] ? mark_lock+0xf5/0x2df0 [ 1216.665206] ? lock_acquire+0x197/0x470 [ 1216.666037] ? find_held_lock+0x2c/0x110 [ 1216.666878] ? __cleanup_sighand+0xb0/0xb0 [ 1216.667755] ? _copy_from_user+0xfb/0x1b0 [ 1216.668778] kernel_clone+0xe7/0x980 [ 1216.669535] ? __lockdep_reset_lock+0x180/0x180 [ 1216.670506] ? create_io_thread+0xf0/0xf0 [ 1216.671372] ? ksys_write+0x21a/0x260 [ 1216.672142] ? lock_downgrade+0x6d0/0x6d0 [ 1216.672978] __do_sys_clone3+0x1e5/0x320 [ 1216.673841] ? __do_sys_clone+0x110/0x110 [ 1216.674696] ? rcu_read_lock_any_held+0x75/0xa0 [ 1216.674773] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1216.675622] ? vfs_write+0x354/0xb10 [ 1216.675651] ? fput_many+0x2f/0x1a0 [ 1216.678721] ? ksys_write+0x1a9/0x260 [ 1216.679487] ? __ia32_sys_read+0xb0/0xb0 [ 1216.680307] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.681359] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1216.682422] ? trace_hardirqs_on+0x5b/0x180 [ 1216.683294] do_syscall_64+0x33/0x40 [ 1216.684050] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1216.685079] RIP: 0033:0x7f8fbb637b19 [ 1216.685857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.689520] RSP: 002b:00007f8fb8b6b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1216.691069] RAX: ffffffffffffffda RBX: 00007f8fbb74b0e0 RCX: 00007f8fbb637b19 [ 1216.692491] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1216.693951] RBP: 00007f8fb8b6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1216.695362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1216.696782] R13: 00007ffe8662371f R14: 00007f8fb8b6b300 R15: 0000000000022000 15:22:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 15:22:25 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:22:25 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1216.783746] FAULT_INJECTION: forcing a failure. [ 1216.783746] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.784942] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1216.785935] CPU: 1 PID: 10124 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1216.788598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1216.790195] Call Trace: [ 1216.790697] dump_stack+0x107/0x167 [ 1216.791383] should_fail.cold+0x5/0xa [ 1216.792103] ? create_object.isra.0+0x3a/0xa30 [ 1216.792969] should_failslab+0x5/0x20 [ 1216.793721] kmem_cache_alloc+0x5b/0x310 [ 1216.794510] create_object.isra.0+0x3a/0xa30 [ 1216.795337] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1216.796300] kmem_cache_alloc_node+0x169/0x330 [ 1216.797160] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.798181] copy_process+0x3305/0x78b0 [ 1216.798918] ? SOFTIRQ_verbose+0x10/0x10 [ 1216.799681] ? __lockdep_reset_lock+0x180/0x180 [ 1216.800542] ? mark_lock+0xf5/0x2df0 [ 1216.801241] ? lock_acquire+0x197/0x470 [ 1216.802010] ? find_held_lock+0x2c/0x110 [ 1216.802652] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1216.802781] ? __cleanup_sighand+0xb0/0xb0 [ 1216.804971] ? _copy_from_user+0xfb/0x1b0 [ 1216.805778] kernel_clone+0xe7/0x980 [ 1216.806481] ? __lockdep_reset_lock+0x180/0x180 [ 1216.807343] ? create_io_thread+0xf0/0xf0 [ 1216.808124] ? ksys_write+0x21a/0x260 [ 1216.808830] ? lock_downgrade+0x6d0/0x6d0 [ 1216.809604] __do_sys_clone3+0x1e5/0x320 [ 1216.810389] ? __do_sys_clone+0x110/0x110 [ 1216.811190] ? rcu_read_lock_any_held+0x75/0xa0 [ 1216.812050] ? vfs_write+0x354/0xb10 [ 1216.812744] ? fput_many+0x2f/0x1a0 [ 1216.813426] ? ksys_write+0x1a9/0x260 [ 1216.814155] ? __ia32_sys_read+0xb0/0xb0 [ 1216.814916] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.815893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1216.816844] ? trace_hardirqs_on+0x5b/0x180 [ 1216.817664] do_syscall_64+0x33/0x40 [ 1216.818374] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1216.819321] RIP: 0033:0x7f4d52085b19 [ 1216.820000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.823394] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1216.824787] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1216.826128] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1216.827440] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1216.828745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1216.830083] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1216.869992] SELinux: duplicate or incompatible mount options [ 1216.876917] SELinux: duplicate or incompatible mount options 15:22:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 15:22:41 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1100, 0x0}}], 0x324, 0x0) 15:22:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) 15:22:41 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:41 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) 15:22:41 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x100000800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:22:41 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1300, 0x0}}], 0x324, 0x0) [ 1232.681844] FAULT_INJECTION: forcing a failure. [ 1232.681844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1232.683491] CPU: 0 PID: 10242 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1232.684435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1232.685555] Call Trace: [ 1232.685928] dump_stack+0x107/0x167 [ 1232.686427] should_fail.cold+0x5/0xa [ 1232.686952] __alloc_pages_nodemask+0x182/0x600 [ 1232.687575] ? lock_downgrade+0x6d0/0x6d0 [ 1232.688143] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1232.688951] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1232.689657] ? kmem_cache_alloc_node+0x2bc/0x330 [ 1232.690323] copy_process+0x62b/0x78b0 [ 1232.690856] ? SOFTIRQ_verbose+0x10/0x10 [ 1232.691411] ? __lockdep_reset_lock+0x180/0x180 [ 1232.692057] ? lock_acquire+0x197/0x470 [ 1232.692613] ? find_held_lock+0x2c/0x110 [ 1232.693187] ? __cleanup_sighand+0xb0/0xb0 [ 1232.693810] ? _copy_from_user+0xfb/0x1b0 [ 1232.694401] kernel_clone+0xe7/0x980 [ 1232.694908] ? __lockdep_reset_lock+0x180/0x180 [ 1232.695543] ? create_io_thread+0xf0/0xf0 [ 1232.696128] ? ksys_write+0x21a/0x260 [ 1232.696653] ? lock_downgrade+0x6d0/0x6d0 [ 1232.697222] __do_sys_clone3+0x1e5/0x320 [ 1232.697778] ? __do_sys_clone+0x110/0x110 [ 1232.698375] ? rcu_read_lock_any_held+0x75/0xa0 [ 1232.699004] ? vfs_write+0x354/0xb10 [ 1232.699518] ? fput_many+0x2f/0x1a0 [ 1232.700022] ? ksys_write+0x1a9/0x260 [ 1232.700546] ? __ia32_sys_read+0xb0/0xb0 [ 1232.701103] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1232.701811] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1232.702519] ? trace_hardirqs_on+0x5b/0x180 [ 1232.703130] do_syscall_64+0x33/0x40 [ 1232.703635] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1232.704328] RIP: 0033:0x7f4d52085b19 [ 1232.704832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1232.705734] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1232.707299] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1232.707317] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1232.707326] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1232.707347] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1232.713693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1232.714665] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1232.718928] SELinux: duplicate or incompatible mount options [ 1232.725081] FAULT_INJECTION: forcing a failure. [ 1232.725081] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.726634] CPU: 0 PID: 10243 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1232.727547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1232.728632] Call Trace: [ 1232.728988] dump_stack+0x107/0x167 [ 1232.729483] should_fail.cold+0x5/0xa [ 1232.730006] ? anon_vma_clone+0xdc/0x590 [ 1232.730249] SELinux: duplicate or incompatible mount options [ 1232.730547] should_failslab+0x5/0x20 [ 1232.730564] kmem_cache_alloc+0x5b/0x310 [ 1232.730600] anon_vma_clone+0xdc/0x590 [ 1232.733565] anon_vma_fork+0x82/0x640 [ 1232.734088] ? __vm_enough_memory+0x184/0x360 [ 1232.734706] copy_process+0x72cd/0x78b0 [ 1232.735269] ? SOFTIRQ_verbose+0x10/0x10 [ 1232.735791] FAULT_INJECTION: forcing a failure. [ 1232.735791] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.735864] ? __cleanup_sighand+0xb0/0xb0 [ 1232.739193] ? _copy_from_user+0xfb/0x1b0 [ 1232.739762] kernel_clone+0xe7/0x980 [ 1232.740257] ? __lockdep_reset_lock+0x180/0x180 [ 1232.740876] ? create_io_thread+0xf0/0xf0 [ 1232.741444] ? ksys_write+0x21a/0x260 [ 1232.741963] ? lock_downgrade+0x6d0/0x6d0 [ 1232.742523] __do_sys_clone3+0x1e5/0x320 [ 1232.743071] ? __do_sys_clone+0x110/0x110 [ 1232.743654] ? rcu_read_lock_any_held+0x75/0xa0 [ 1232.744274] ? vfs_write+0x354/0xb10 [ 1232.744769] ? fput_many+0x2f/0x1a0 [ 1232.745262] ? ksys_write+0x1a9/0x260 [ 1232.745771] ? __ia32_sys_read+0xb0/0xb0 [ 1232.746333] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1232.747038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1232.747724] ? trace_hardirqs_on+0x5b/0x180 [ 1232.748295] do_syscall_64+0x33/0x40 [ 1232.748801] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1232.749485] RIP: 0033:0x7fa1817f7b19 [ 1232.749991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1232.752472] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1232.753486] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1232.754430] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1232.755381] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1232.756329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1232.757273] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1232.758258] CPU: 1 PID: 10254 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1232.760038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1232.762156] Call Trace: [ 1232.762837] dump_stack+0x107/0x167 [ 1232.763761] should_fail.cold+0x5/0xa [ 1232.764610] ? create_object.isra.0+0x3a/0xa30 [ 1232.765577] should_failslab+0x5/0x20 [ 1232.766416] kmem_cache_alloc+0x5b/0x310 [ 1232.767410] create_object.isra.0+0x3a/0xa30 [ 1232.768352] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1232.769520] kmem_cache_alloc+0x159/0x310 [ 1232.770447] prepare_creds+0x25/0x5e0 [ 1232.771272] copy_creds+0x72/0x580 [ 1232.772057] copy_process+0xfef/0x78b0 [ 1232.772908] ? SOFTIRQ_verbose+0x10/0x10 [ 1232.773753] ? __lockdep_reset_lock+0x180/0x180 [ 1232.774793] ? mark_lock+0xf5/0x2df0 [ 1232.775596] ? lock_acquire+0x197/0x470 [ 1232.776447] ? find_held_lock+0x2c/0x110 [ 1232.777320] ? __cleanup_sighand+0xb0/0xb0 [ 1232.778250] ? _copy_from_user+0xfb/0x1b0 [ 1232.779147] kernel_clone+0xe7/0x980 [ 1232.779946] ? __lockdep_reset_lock+0x180/0x180 [ 1232.780935] ? create_io_thread+0xf0/0xf0 [ 1232.781813] ? ksys_write+0x21a/0x260 [ 1232.782629] ? lock_downgrade+0x6d0/0x6d0 [ 1232.783508] __do_sys_clone3+0x1e5/0x320 [ 1232.784371] ? __do_sys_clone+0x110/0x110 [ 1232.785272] ? rcu_read_lock_any_held+0x75/0xa0 [ 1232.786267] ? vfs_write+0x354/0xb10 [ 1232.787061] ? fput_many+0x2f/0x1a0 [ 1232.787838] ? ksys_write+0x1a9/0x260 [ 1232.788650] ? __ia32_sys_read+0xb0/0xb0 [ 1232.789520] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1232.790651] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1232.791737] ? trace_hardirqs_on+0x5b/0x180 [ 1232.792626] do_syscall_64+0x33/0x40 [ 1232.793420] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1232.794527] RIP: 0033:0x7f8fbb637b19 [ 1232.795294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1232.799175] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1232.800729] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1232.802239] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1232.803759] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1232.805254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1232.806758] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1232.812150] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:22:41 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:41 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1b0be1f000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:22:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) 15:22:41 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1232.915814] SELinux: duplicate or incompatible mount options [ 1232.920716] SELinux: duplicate or incompatible mount options [ 1232.933534] FAULT_INJECTION: forcing a failure. [ 1232.933534] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.936206] CPU: 1 PID: 10361 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1232.937750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1232.939624] Call Trace: [ 1232.940225] dump_stack+0x107/0x167 [ 1232.941066] should_fail.cold+0x5/0xa [ 1232.941940] ? prepare_creds+0x25/0x5e0 [ 1232.942068] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1232.942827] should_failslab+0x5/0x20 [ 1232.942854] kmem_cache_alloc+0x5b/0x310 [ 1232.942882] ? lock_downgrade+0x6d0/0x6d0 [ 1232.946673] prepare_creds+0x25/0x5e0 [ 1232.947546] copy_creds+0x72/0x580 [ 1232.948367] copy_process+0xfef/0x78b0 [ 1232.949240] ? SOFTIRQ_verbose+0x10/0x10 [ 1232.950179] ? __lockdep_reset_lock+0x180/0x180 [ 1232.951224] ? mark_lock+0xf5/0x2df0 [ 1232.952074] ? lock_acquire+0x197/0x470 [ 1232.952965] ? find_held_lock+0x2c/0x110 [ 1232.953915] ? __cleanup_sighand+0xb0/0xb0 [ 1232.954894] ? _copy_from_user+0xfb/0x1b0 [ 1232.955840] kernel_clone+0xe7/0x980 [ 1232.956680] ? __lockdep_reset_lock+0x180/0x180 [ 1232.957723] ? create_io_thread+0xf0/0xf0 [ 1232.958677] ? ksys_write+0x21a/0x260 [ 1232.959505] ? lock_downgrade+0x6d0/0x6d0 [ 1232.960275] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1232.960449] __do_sys_clone3+0x1e5/0x320 [ 1232.960472] ? __do_sys_clone+0x110/0x110 [ 1232.963393] ? rcu_read_lock_any_held+0x75/0xa0 [ 1232.964442] ? vfs_write+0x354/0xb10 [ 1232.965285] ? fput_many+0x2f/0x1a0 [ 1232.966118] ? ksys_write+0x1a9/0x260 [ 1232.966949] ? __ia32_sys_read+0xb0/0xb0 [ 1232.967857] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1232.969008] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1232.970182] ? trace_hardirqs_on+0x5b/0x180 [ 1232.971163] do_syscall_64+0x33/0x40 [ 1232.972002] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1232.973162] RIP: 0033:0x7f4d52085b19 [ 1232.974006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1232.978109] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1232.979791] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1232.981384] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1232.982983] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1232.984528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1232.986132] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:22:41 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:41 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1233.025795] SELinux: duplicate or incompatible mount options 15:22:41 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1233.034189] SELinux: duplicate or incompatible mount options 15:22:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) [ 1233.082950] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1233.105890] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:22:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) [ 1233.144214] FAULT_INJECTION: forcing a failure. [ 1233.144214] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.145527] CPU: 0 PID: 10565 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1233.146327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1233.147283] Call Trace: [ 1233.147596] dump_stack+0x107/0x167 [ 1233.148027] should_fail.cold+0x5/0xa [ 1233.148479] ? create_object.isra.0+0x3a/0xa30 [ 1233.149016] should_failslab+0x5/0x20 [ 1233.149465] kmem_cache_alloc+0x5b/0x310 [ 1233.149968] create_object.isra.0+0x3a/0xa30 [ 1233.150476] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1233.151081] kmem_cache_alloc+0x159/0x310 [ 1233.151577] anon_vma_clone+0xdc/0x590 [ 1233.152050] anon_vma_fork+0x82/0x640 [ 1233.152500] ? __vm_enough_memory+0x184/0x360 [ 1233.153034] copy_process+0x72cd/0x78b0 [ 1233.153502] ? SOFTIRQ_verbose+0x10/0x10 [ 1233.154026] ? __cleanup_sighand+0xb0/0xb0 [ 1233.154542] ? _copy_from_user+0xfb/0x1b0 [ 1233.155032] kernel_clone+0xe7/0x980 [ 1233.155468] ? __lockdep_reset_lock+0x180/0x180 [ 1233.156014] ? create_io_thread+0xf0/0xf0 [ 1233.156520] ? ksys_write+0x21a/0x260 [ 1233.156970] ? lock_downgrade+0x6d0/0x6d0 [ 1233.157470] __do_sys_clone3+0x1e5/0x320 [ 1233.157957] ? __do_sys_clone+0x110/0x110 [ 1233.158472] ? rcu_read_lock_any_held+0x75/0xa0 [ 1233.159022] ? vfs_write+0x354/0xb10 [ 1233.159462] ? fput_many+0x2f/0x1a0 [ 1233.159912] ? ksys_write+0x1a9/0x260 [ 1233.160360] ? __ia32_sys_read+0xb0/0xb0 [ 1233.160847] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1233.161464] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1233.162081] ? trace_hardirqs_on+0x5b/0x180 [ 1233.162589] do_syscall_64+0x33/0x40 [ 1233.163023] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1233.163635] RIP: 0033:0x7fa1817f7b19 [ 1233.164077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.166235] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1233.167127] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1233.167964] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1233.168798] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1233.169637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1233.170489] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1233.183200] FAULT_INJECTION: forcing a failure. [ 1233.183200] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.185774] CPU: 1 PID: 10576 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1233.187280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1233.189143] Call Trace: [ 1233.189748] dump_stack+0x107/0x167 [ 1233.190586] should_fail.cold+0x5/0xa [ 1233.191447] ? security_prepare_creds+0x112/0x190 [ 1233.192524] should_failslab+0x5/0x20 [ 1233.193373] __kmalloc+0x72/0x390 [ 1233.194188] security_prepare_creds+0x112/0x190 [ 1233.195247] prepare_creds+0x452/0x5e0 [ 1233.196127] copy_creds+0x72/0x580 [ 1233.196960] copy_process+0xfef/0x78b0 [ 1233.197852] ? SOFTIRQ_verbose+0x10/0x10 [ 1233.198760] ? __lockdep_reset_lock+0x180/0x180 [ 1233.199806] ? mark_lock+0xf5/0x2df0 [ 1233.200635] ? lock_acquire+0x197/0x470 [ 1233.201531] ? find_held_lock+0x2c/0x110 [ 1233.202466] ? __cleanup_sighand+0xb0/0xb0 [ 1233.203421] ? _copy_from_user+0xfb/0x1b0 [ 1233.204364] kernel_clone+0xe7/0x980 [ 1233.205217] ? __lockdep_reset_lock+0x180/0x180 [ 1233.206287] ? create_io_thread+0xf0/0xf0 [ 1233.207241] ? ksys_write+0x21a/0x260 [ 1233.208096] ? lock_downgrade+0x6d0/0x6d0 [ 1233.209040] __do_sys_clone3+0x1e5/0x320 [ 1233.209958] ? __do_sys_clone+0x110/0x110 [ 1233.210915] ? rcu_read_lock_any_held+0x75/0xa0 [ 1233.211958] ? vfs_write+0x354/0xb10 [ 1233.212806] ? fput_many+0x2f/0x1a0 [ 1233.213615] ? ksys_write+0x1a9/0x260 [ 1233.214473] ? __ia32_sys_read+0xb0/0xb0 [ 1233.215397] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1233.216578] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1233.217738] ? trace_hardirqs_on+0x5b/0x180 [ 1233.218741] do_syscall_64+0x33/0x40 [ 1233.219572] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1233.220718] RIP: 0033:0x7f8fbb637b19 [ 1233.221551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.225613] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1233.227365] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1233.228975] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1233.230554] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1233.232077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1233.233606] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 15:22:56 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:56 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1200, 0x0}}], 0x324, 0x0) [ 1247.878238] SELinux: duplicate or incompatible mount options [ 1247.883748] SELinux: duplicate or incompatible mount options 15:22:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) 15:22:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) 15:22:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2a017d481000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:22:56 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1400, 0x0}}], 0x324, 0x0) 15:22:56 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:22:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) [ 1247.904987] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1247.908342] FAULT_INJECTION: forcing a failure. [ 1247.908342] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.909682] CPU: 0 PID: 10587 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1247.910485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1247.911448] Call Trace: [ 1247.911770] dump_stack+0x107/0x167 [ 1247.912198] should_fail.cold+0x5/0xa [ 1247.912667] ? anon_vma_fork+0xf1/0x640 [ 1247.913134] should_failslab+0x5/0x20 [ 1247.913580] kmem_cache_alloc+0x5b/0x310 [ 1247.914070] anon_vma_fork+0xf1/0x640 [ 1247.914522] ? __vm_enough_memory+0x184/0x360 [ 1247.915051] copy_process+0x72cd/0x78b0 [ 1247.915526] ? SOFTIRQ_verbose+0x10/0x10 [ 1247.916037] ? __cleanup_sighand+0xb0/0xb0 [ 1247.916553] ? _copy_from_user+0xfb/0x1b0 [ 1247.917046] kernel_clone+0xe7/0x980 [ 1247.917490] ? __lockdep_reset_lock+0x180/0x180 [ 1247.918040] ? create_io_thread+0xf0/0xf0 [ 1247.918529] ? ksys_write+0x21a/0x260 [ 1247.918966] ? lock_downgrade+0x6d0/0x6d0 [ 1247.919451] __do_sys_clone3+0x1e5/0x320 [ 1247.919920] ? __do_sys_clone+0x110/0x110 [ 1247.920420] ? rcu_read_lock_any_held+0x75/0xa0 [ 1247.920954] ? vfs_write+0x354/0xb10 [ 1247.921392] ? fput_many+0x2f/0x1a0 [ 1247.921438] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1247.921818] ? ksys_write+0x1a9/0x260 [ 1247.923836] ? __ia32_sys_read+0xb0/0xb0 [ 1247.924313] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1247.924934] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1247.925538] ? trace_hardirqs_on+0x5b/0x180 [ 1247.926050] do_syscall_64+0x33/0x40 [ 1247.926486] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1247.927072] RIP: 0033:0x7fa1817f7b19 [ 1247.927510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1247.929609] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1247.930529] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1247.931368] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1247.932223] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1247.933072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1247.933873] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:22:56 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1247.940619] FAULT_INJECTION: forcing a failure. [ 1247.940619] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.941968] CPU: 0 PID: 10596 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1247.942760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1247.943690] Call Trace: [ 1247.943987] dump_stack+0x107/0x167 [ 1247.944404] should_fail.cold+0x5/0xa [ 1247.944839] ? create_object.isra.0+0x3a/0xa30 [ 1247.945351] should_failslab+0x5/0x20 [ 1247.945792] kmem_cache_alloc+0x5b/0x310 [ 1247.946268] create_object.isra.0+0x3a/0xa30 [ 1247.946783] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1247.947361] kmem_cache_alloc+0x159/0x310 [ 1247.947844] prepare_creds+0x25/0x5e0 [ 1247.948280] copy_creds+0x72/0x580 [ 1247.948689] copy_process+0xfef/0x78b0 [ 1247.949131] ? SOFTIRQ_verbose+0x10/0x10 [ 1247.949595] ? __lockdep_reset_lock+0x180/0x180 [ 1247.950141] ? lock_acquire+0x197/0x470 [ 1247.950596] ? find_held_lock+0x2c/0x110 [ 1247.951080] ? __cleanup_sighand+0xb0/0xb0 [ 1247.951582] ? _copy_from_user+0xfb/0x1b0 [ 1247.952085] kernel_clone+0xe7/0x980 [ 1247.952512] ? __lockdep_reset_lock+0x180/0x180 [ 1247.953051] ? create_io_thread+0xf0/0xf0 [ 1247.953566] ? ksys_write+0x21a/0x260 [ 1247.954003] ? lock_downgrade+0x6d0/0x6d0 [ 1247.954502] __do_sys_clone3+0x1e5/0x320 [ 1247.954981] ? __do_sys_clone+0x110/0x110 [ 1247.955475] ? rcu_read_lock_any_held+0x75/0xa0 [ 1247.956027] ? vfs_write+0x354/0xb10 [ 1247.956454] ? fput_many+0x2f/0x1a0 [ 1247.956874] ? ksys_write+0x1a9/0x260 [ 1247.957324] ? __ia32_sys_read+0xb0/0xb0 [ 1247.957793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1247.958405] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1247.959018] ? trace_hardirqs_on+0x5b/0x180 [ 1247.959513] do_syscall_64+0x33/0x40 [ 1247.959940] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1247.960536] RIP: 0033:0x7f4d52085b19 [ 1247.960963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1247.963093] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1247.963983] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1247.964815] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1247.965633] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1247.966451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1247.967262] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1247.974614] FAULT_INJECTION: forcing a failure. [ 1247.974614] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.976396] CPU: 1 PID: 10589 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1247.977508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1247.978961] Call Trace: [ 1247.979415] dump_stack+0x107/0x167 [ 1247.979995] should_fail.cold+0x5/0xa [ 1247.980603] ? create_object.isra.0+0x3a/0xa30 [ 1247.981305] should_failslab+0x5/0x20 [ 1247.981894] kmem_cache_alloc+0x5b/0x310 [ 1247.982566] create_object.isra.0+0x3a/0xa30 [ 1247.983233] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1247.984025] __kmalloc+0x16e/0x390 [ 1247.984590] security_prepare_creds+0x112/0x190 [ 1247.985481] prepare_creds+0x452/0x5e0 [ 1247.986139] copy_creds+0x72/0x580 [ 1247.986706] copy_process+0xfef/0x78b0 [ 1247.987316] ? SOFTIRQ_verbose+0x10/0x10 [ 1247.988058] ? __lockdep_reset_lock+0x180/0x180 [ 1247.988951] ? mark_lock+0xf5/0x2df0 [ 1247.989660] ? lock_acquire+0x197/0x470 [ 1247.990343] ? find_held_lock+0x2c/0x110 [ 1247.990990] ? __cleanup_sighand+0xb0/0xb0 [ 1247.991806] ? _copy_from_user+0xfb/0x1b0 [ 1247.992503] kernel_clone+0xe7/0x980 [ 1247.993092] ? __lockdep_reset_lock+0x180/0x180 [ 1247.993817] ? create_io_thread+0xf0/0xf0 [ 1247.994482] ? ksys_write+0x21a/0x260 [ 1247.995072] ? lock_downgrade+0x6d0/0x6d0 [ 1247.995727] __do_sys_clone3+0x1e5/0x320 [ 1247.996358] ? __do_sys_clone+0x110/0x110 [ 1247.997164] ? rcu_read_lock_any_held+0x75/0xa0 [ 1247.998064] ? vfs_write+0x354/0xb10 [ 1247.998653] ? fput_many+0x2f/0x1a0 [ 1247.999223] ? ksys_write+0x1a9/0x260 [ 1247.999818] ? __ia32_sys_read+0xb0/0xb0 [ 1248.000461] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1248.001297] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1248.002096] ? trace_hardirqs_on+0x5b/0x180 [ 1248.002773] do_syscall_64+0x33/0x40 [ 1248.003347] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1248.004133] RIP: 0033:0x7f8fbb637b19 [ 1248.004724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1248.007571] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1248.009024] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1248.010206] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1248.011556] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1248.012834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1248.014211] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1248.030899] SELinux: duplicate or incompatible mount options [ 1248.033341] SELinux: duplicate or incompatible mount options 15:23:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) 15:23:10 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:10 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1500, 0x0}}], 0x324, 0x0) [ 1262.158500] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:23:10 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1300, 0x0}}], 0x324, 0x0) 15:23:10 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x553a6314c000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:23:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 15:23:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) [ 1262.170065] FAULT_INJECTION: forcing a failure. [ 1262.170065] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1262.173011] CPU: 1 PID: 10723 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1262.174695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1262.175469] FAULT_INJECTION: forcing a failure. [ 1262.175469] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.176691] Call Trace: [ 1262.176723] dump_stack+0x107/0x167 [ 1262.176756] should_fail.cold+0x5/0xa [ 1262.180892] __alloc_pages_nodemask+0x182/0x600 [ 1262.181966] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1262.183355] ? kmem_cache_alloc+0x301/0x310 [ 1262.184337] alloc_pages_current+0x187/0x280 [ 1262.185338] allocate_slab+0x26f/0x380 [ 1262.186235] ___slab_alloc+0x470/0x700 [ 1262.187115] ? create_object.isra.0+0x3a/0xa30 [ 1262.188151] ? find_held_lock+0x2c/0x110 [ 1262.189073] ? create_object.isra.0+0x3a/0xa30 [ 1262.190107] ? kmem_cache_alloc+0x301/0x310 [ 1262.191087] ? create_object.isra.0+0x3a/0xa30 [ 1262.192112] kmem_cache_alloc+0x301/0x310 [ 1262.193057] create_object.isra.0+0x3a/0xa30 [ 1262.194047] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1262.195212] kmem_cache_alloc+0x159/0x310 [ 1262.196156] prepare_creds+0x25/0x5e0 [ 1262.197014] copy_creds+0x72/0x580 [ 1262.197832] copy_process+0xfef/0x78b0 [ 1262.198714] ? SOFTIRQ_verbose+0x10/0x10 [ 1262.199642] ? __lockdep_reset_lock+0x180/0x180 [ 1262.200689] ? mark_lock+0xf5/0x2df0 [ 1262.201534] ? lock_acquire+0x197/0x470 [ 1262.202438] ? find_held_lock+0x2c/0x110 [ 1262.203374] ? __cleanup_sighand+0xb0/0xb0 [ 1262.204354] ? _copy_from_user+0xfb/0x1b0 [ 1262.205302] kernel_clone+0xe7/0x980 [ 1262.206143] ? __lockdep_reset_lock+0x180/0x180 [ 1262.207203] ? create_io_thread+0xf0/0xf0 [ 1262.208151] ? ksys_write+0x21a/0x260 [ 1262.209015] ? lock_downgrade+0x6d0/0x6d0 [ 1262.209955] __do_sys_clone3+0x1e5/0x320 [ 1262.210874] ? __do_sys_clone+0x110/0x110 [ 1262.211831] ? rcu_read_lock_any_held+0x75/0xa0 [ 1262.212881] ? vfs_write+0x354/0xb10 [ 1262.213721] ? fput_many+0x2f/0x1a0 [ 1262.214544] ? ksys_write+0x1a9/0x260 [ 1262.215420] ? __ia32_sys_read+0xb0/0xb0 [ 1262.216347] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1262.217539] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1262.218703] ? trace_hardirqs_on+0x5b/0x180 [ 1262.219684] do_syscall_64+0x33/0x40 [ 1262.220533] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1262.221691] RIP: 0033:0x7f4d52085b19 [ 1262.222547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1262.226708] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1262.228423] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1262.230032] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1262.231656] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1262.233278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1262.234901] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1262.236563] CPU: 0 PID: 10724 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1262.237692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1262.239052] Call Trace: [ 1262.239490] dump_stack+0x107/0x167 [ 1262.240109] should_fail.cold+0x5/0xa [ 1262.240734] ? create_object.isra.0+0x3a/0xa30 [ 1262.241504] should_failslab+0x5/0x20 [ 1262.242129] kmem_cache_alloc+0x5b/0x310 [ 1262.242820] create_object.isra.0+0x3a/0xa30 [ 1262.243547] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1262.244375] __kmalloc+0x16e/0x390 [ 1262.244967] security_prepare_creds+0x112/0x190 [ 1262.245732] prepare_creds+0x452/0x5e0 [ 1262.246236] SELinux: duplicate or incompatible mount options [ 1262.246383] copy_creds+0x72/0x580 [ 1262.246411] copy_process+0xfef/0x78b0 [ 1262.246437] ? SOFTIRQ_verbose+0x10/0x10 [ 1262.249598] ? __lockdep_reset_lock+0x180/0x180 [ 1262.250387] ? lock_acquire+0x197/0x470 [ 1262.251041] ? find_held_lock+0x2c/0x110 [ 1262.251737] ? __cleanup_sighand+0xb0/0xb0 [ 1262.252454] ? _copy_from_user+0xfb/0x1b0 [ 1262.253098] FAULT_INJECTION: forcing a failure. [ 1262.253098] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.253138] kernel_clone+0xe7/0x980 [ 1262.256219] ? __lockdep_reset_lock+0x180/0x180 [ 1262.256990] ? create_io_thread+0xf0/0xf0 [ 1262.257688] ? ksys_write+0x21a/0x260 [ 1262.258316] ? lock_downgrade+0x6d0/0x6d0 [ 1262.258996] __do_sys_clone3+0x1e5/0x320 [ 1262.259659] ? __do_sys_clone+0x110/0x110 [ 1262.260363] ? rcu_read_lock_any_held+0x75/0xa0 [ 1262.261104] ? vfs_write+0x354/0xb10 [ 1262.261706] ? fput_many+0x2f/0x1a0 [ 1262.262296] ? ksys_write+0x1a9/0x260 [ 1262.262909] ? __ia32_sys_read+0xb0/0xb0 [ 1262.263579] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1262.264419] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1262.265253] ? trace_hardirqs_on+0x5b/0x180 [ 1262.265951] do_syscall_64+0x33/0x40 [ 1262.266557] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1262.267388] RIP: 0033:0x7f8fbb637b19 [ 1262.268005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1262.270927] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1262.272141] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1262.273272] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1262.274415] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1262.275573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1262.276712] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1262.277898] CPU: 1 PID: 10718 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1262.279498] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1262.281369] Call Trace: [ 1262.281979] dump_stack+0x107/0x167 [ 1262.282818] should_fail.cold+0x5/0xa [ 1262.283689] ? create_object.isra.0+0x3a/0xa30 [ 1262.284721] should_failslab+0x5/0x20 [ 1262.285579] kmem_cache_alloc+0x5b/0x310 [ 1262.286525] create_object.isra.0+0x3a/0xa30 [ 1262.287518] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1262.288687] kmem_cache_alloc+0x159/0x310 [ 1262.289649] anon_vma_clone+0xdc/0x590 [ 1262.290568] anon_vma_fork+0x82/0x640 [ 1262.291429] ? __vm_enough_memory+0x184/0x360 [ 1262.292449] copy_process+0x72cd/0x78b0 [ 1262.293358] ? SOFTIRQ_verbose+0x10/0x10 [ 1262.294345] ? __cleanup_sighand+0xb0/0xb0 [ 1262.295332] ? _copy_from_user+0xfb/0x1b0 [ 1262.296294] kernel_clone+0xe7/0x980 [ 1262.297143] ? __lockdep_reset_lock+0x180/0x180 [ 1262.298245] ? create_io_thread+0xf0/0xf0 [ 1262.299228] ? ksys_write+0x21a/0x260 [ 1262.300099] ? lock_downgrade+0x6d0/0x6d0 [ 1262.301060] __do_sys_clone3+0x1e5/0x320 [ 1262.302017] ? __do_sys_clone+0x110/0x110 [ 1262.303009] ? rcu_read_lock_any_held+0x75/0xa0 [ 1262.304060] ? vfs_write+0x354/0xb10 [ 1262.304907] ? fput_many+0x2f/0x1a0 [ 1262.305731] ? ksys_write+0x1a9/0x260 [ 1262.306605] ? __ia32_sys_read+0xb0/0xb0 [ 1262.307537] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1262.308729] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1262.309893] ? trace_hardirqs_on+0x5b/0x180 [ 1262.310881] do_syscall_64+0x33/0x40 [ 1262.311726] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1262.312888] RIP: 0033:0x7fa1817f7b19 [ 1262.313735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1262.317875] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1262.319607] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1262.321222] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1262.322848] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1262.324474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1262.326094] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1262.341042] SELinux: duplicate or incompatible mount options [ 1262.351308] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:23:11 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:11 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1262.438317] SELinux: duplicate or incompatible mount options [ 1262.440933] SELinux: duplicate or incompatible mount options 15:23:11 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2001000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1262.501281] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:23:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) [ 1262.521240] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1262.544160] SELinux: duplicate or incompatible mount options [ 1262.548230] SELinux: duplicate or incompatible mount options 15:23:11 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1262.585785] FAULT_INJECTION: forcing a failure. [ 1262.585785] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.587404] CPU: 0 PID: 10898 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1262.588333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1262.589444] Call Trace: [ 1262.589808] dump_stack+0x107/0x167 [ 1262.590319] should_fail.cold+0x5/0xa [ 1262.590841] ? create_object.isra.0+0x3a/0xa30 [ 1262.591457] should_failslab+0x5/0x20 [ 1262.591976] kmem_cache_alloc+0x5b/0x310 [ 1262.592534] create_object.isra.0+0x3a/0xa30 [ 1262.593127] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1262.593830] __kmalloc+0x16e/0x390 [ 1262.594331] security_prepare_creds+0x112/0x190 [ 1262.594975] prepare_creds+0x452/0x5e0 [ 1262.595505] copy_creds+0x72/0x580 [ 1262.595994] copy_process+0xfef/0x78b0 [ 1262.596519] ? SOFTIRQ_verbose+0x10/0x10 [ 1262.597076] ? __lockdep_reset_lock+0x180/0x180 [ 1262.597712] ? lock_acquire+0x197/0x470 [ 1262.598249] ? find_held_lock+0x2c/0x110 [ 1262.598812] ? __cleanup_sighand+0xb0/0xb0 [ 1262.599408] ? _copy_from_user+0xfb/0x1b0 [ 1262.599977] kernel_clone+0xe7/0x980 [ 1262.600477] ? __lockdep_reset_lock+0x180/0x180 [ 1262.601104] ? create_io_thread+0xf0/0xf0 [ 1262.601677] ? ksys_write+0x21a/0x260 [ 1262.602191] ? lock_downgrade+0x6d0/0x6d0 [ 1262.602763] __do_sys_clone3+0x1e5/0x320 [ 1262.603304] ? __do_sys_clone+0x110/0x110 [ 1262.603889] ? rcu_read_lock_any_held+0x75/0xa0 [ 1262.604512] ? vfs_write+0x354/0xb10 [ 1262.605015] ? fput_many+0x2f/0x1a0 [ 1262.605506] ? ksys_write+0x1a9/0x260 [ 1262.606020] ? __ia32_sys_read+0xb0/0xb0 [ 1262.606579] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1262.607287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1262.607971] ? trace_hardirqs_on+0x5b/0x180 [ 1262.608554] do_syscall_64+0x33/0x40 [ 1262.609052] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1262.609737] RIP: 0033:0x7f4d52085b19 [ 1262.610248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1262.612668] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1262.613677] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1262.614624] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1262.615566] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1262.616506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1262.617448] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:23:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 15:23:11 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) 15:23:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2020000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1262.686777] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1262.735258] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1262.743147] FAULT_INJECTION: forcing a failure. [ 1262.743147] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.745567] CPU: 1 PID: 10958 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1262.747046] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1262.748794] Call Trace: [ 1262.749359] dump_stack+0x107/0x167 [ 1262.750124] should_fail.cold+0x5/0xa [ 1262.750938] ? security_prepare_creds+0x112/0x190 [ 1262.751954] should_failslab+0x5/0x20 [ 1262.752755] __kmalloc+0x72/0x390 [ 1262.753490] security_prepare_creds+0x112/0x190 [ 1262.754481] prepare_creds+0x452/0x5e0 [ 1262.755295] copy_creds+0x72/0x580 [ 1262.756042] copy_process+0xfef/0x78b0 [ 1262.756854] ? SOFTIRQ_verbose+0x10/0x10 [ 1262.757708] ? __lockdep_reset_lock+0x180/0x180 [ 1262.758694] ? mark_lock+0xf5/0x2df0 [ 1262.759484] ? lock_acquire+0x197/0x470 [ 1262.760318] ? find_held_lock+0x2c/0x110 [ 1262.761178] ? __cleanup_sighand+0xb0/0xb0 [ 1262.762120] ? _copy_from_user+0xfb/0x1b0 [ 1262.763050] kernel_clone+0xe7/0x980 [ 1262.763836] ? __lockdep_reset_lock+0x180/0x180 [ 1262.764821] ? create_io_thread+0xf0/0xf0 [ 1262.765704] ? ksys_write+0x21a/0x260 [ 1262.766520] ? lock_downgrade+0x6d0/0x6d0 [ 1262.767411] __do_sys_clone3+0x1e5/0x320 [ 1262.768267] ? __do_sys_clone+0x110/0x110 [ 1262.769161] ? rcu_read_lock_any_held+0x75/0xa0 [ 1262.770145] ? vfs_write+0x354/0xb10 [ 1262.770945] ? fput_many+0x2f/0x1a0 [ 1262.771708] ? ksys_write+0x1a9/0x260 [ 1262.772510] ? __ia32_sys_read+0xb0/0xb0 [ 1262.773370] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1262.774483] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1262.775559] ? trace_hardirqs_on+0x5b/0x180 [ 1262.776466] do_syscall_64+0x33/0x40 [ 1262.777246] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1262.778323] RIP: 0033:0x7f8fbb637b19 [ 1262.779109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1262.782968] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1262.784571] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1262.786090] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1262.787612] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1262.789117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1262.790613] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1262.821673] FAULT_INJECTION: forcing a failure. [ 1262.821673] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.824079] CPU: 1 PID: 11050 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1262.825546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1262.827315] Call Trace: [ 1262.827877] dump_stack+0x107/0x167 [ 1262.828660] should_fail.cold+0x5/0xa [ 1262.829466] ? anon_vma_fork+0x1ff/0x640 [ 1262.830344] should_failslab+0x5/0x20 [ 1262.831148] kmem_cache_alloc+0x5b/0x310 [ 1262.832016] anon_vma_fork+0x1ff/0x640 [ 1262.832851] copy_process+0x72cd/0x78b0 [ 1262.833699] ? SOFTIRQ_verbose+0x10/0x10 [ 1262.834616] ? __cleanup_sighand+0xb0/0xb0 [ 1262.835537] ? _copy_from_user+0xfb/0x1b0 [ 1262.836417] kernel_clone+0xe7/0x980 [ 1262.837197] ? __lockdep_reset_lock+0x180/0x180 [ 1262.838187] ? create_io_thread+0xf0/0xf0 [ 1262.839099] ? ksys_write+0x21a/0x260 [ 1262.839901] ? lock_downgrade+0x6d0/0x6d0 [ 1262.840785] __do_sys_clone3+0x1e5/0x320 [ 1262.841652] ? __do_sys_clone+0x110/0x110 [ 1262.842568] ? rcu_read_lock_any_held+0x75/0xa0 [ 1262.843548] ? vfs_write+0x354/0xb10 [ 1262.844335] ? fput_many+0x2f/0x1a0 [ 1262.845101] ? ksys_write+0x1a9/0x260 [ 1262.845902] ? __ia32_sys_read+0xb0/0xb0 [ 1262.846776] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1262.847886] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1262.848975] ? trace_hardirqs_on+0x5b/0x180 [ 1262.849889] do_syscall_64+0x33/0x40 [ 1262.850681] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1262.851757] RIP: 0033:0x7fa1817f7b19 [ 1262.852547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1262.856437] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1262.858058] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1262.859578] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1262.861082] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1262.862627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1262.864157] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:23:29 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:23:29 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:29 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1400, 0x0}}], 0x324, 0x0) 15:23:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 15:23:29 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1600, 0x0}}], 0x324, 0x0) 15:23:29 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x159e, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) 15:23:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) [ 1280.591323] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1280.611592] FAULT_INJECTION: forcing a failure. [ 1280.611592] name failslab, interval 1, probability 0, space 0, times 0 [ 1280.614330] CPU: 0 PID: 11072 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1280.615980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1280.617945] Call Trace: [ 1280.618602] dump_stack+0x107/0x167 [ 1280.619028] FAULT_INJECTION: forcing a failure. [ 1280.619028] name failslab, interval 1, probability 0, space 0, times 0 [ 1280.619468] should_fail.cold+0x5/0xa [ 1280.619510] ? dup_fd+0x89/0xe40 [ 1280.623721] should_failslab+0x5/0x20 [ 1280.624641] kmem_cache_alloc+0x5b/0x310 [ 1280.625667] dup_fd+0x89/0xe40 [ 1280.626475] ? audit_filter_inodes+0x40/0x40 [ 1280.627549] ? security_task_alloc+0xe6/0x260 [ 1280.628657] copy_process+0x197c/0x78b0 [ 1280.629626] ? SOFTIRQ_verbose+0x10/0x10 [ 1280.630631] ? __lockdep_reset_lock+0x180/0x180 [ 1280.631817] ? __cleanup_sighand+0xb0/0xb0 [ 1280.632869] ? _copy_from_user+0xfb/0x1b0 [ 1280.633909] kernel_clone+0xe7/0x980 [ 1280.634850] ? __lockdep_reset_lock+0x180/0x180 [ 1280.635966] ? create_io_thread+0xf0/0xf0 [ 1280.636985] ? ksys_write+0x21a/0x260 [ 1280.637898] ? lock_downgrade+0x6d0/0x6d0 [ 1280.638916] __do_sys_clone3+0x1e5/0x320 [ 1280.639878] ? __do_sys_clone+0x110/0x110 [ 1280.640923] ? rcu_read_lock_any_held+0x75/0xa0 [ 1280.642044] ? vfs_write+0x354/0xb10 [ 1280.642958] ? fput_many+0x2f/0x1a0 [ 1280.643825] ? ksys_write+0x1a9/0x260 [ 1280.644742] ? __ia32_sys_read+0xb0/0xb0 [ 1280.645727] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1280.646996] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1280.648225] ? trace_hardirqs_on+0x5b/0x180 [ 1280.649262] do_syscall_64+0x33/0x40 [ 1280.650156] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1280.651393] RIP: 0033:0x7f8fbb637b19 [ 1280.652291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1280.656640] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1280.658482] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1280.660203] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1280.661912] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1280.663640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1280.665348] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1280.667139] CPU: 1 PID: 11084 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1280.668770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1280.670686] Call Trace: [ 1280.671313] dump_stack+0x107/0x167 [ 1280.672167] should_fail.cold+0x5/0xa [ 1280.673062] ? create_object.isra.0+0x3a/0xa30 [ 1280.674126] should_failslab+0x5/0x20 [ 1280.675024] kmem_cache_alloc+0x5b/0x310 [ 1280.675979] create_object.isra.0+0x3a/0xa30 [ 1280.677001] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1280.678188] kmem_cache_alloc+0x159/0x310 [ 1280.679175] anon_vma_fork+0xf1/0x640 [ 1280.680060] ? __vm_enough_memory+0x184/0x360 [ 1280.681109] copy_process+0x72cd/0x78b0 [ 1280.682037] ? SOFTIRQ_verbose+0x10/0x10 [ 1280.683034] ? __cleanup_sighand+0xb0/0xb0 [ 1280.684047] ? _copy_from_user+0xfb/0x1b0 [ 1280.685023] kernel_clone+0xe7/0x980 [ 1280.685897] ? __lockdep_reset_lock+0x180/0x180 [ 1280.687178] ? create_io_thread+0xf0/0xf0 [ 1280.688310] ? ksys_write+0x21a/0x260 [ 1280.689331] ? lock_downgrade+0x6d0/0x6d0 [ 1280.690434] __do_sys_clone3+0x1e5/0x320 [ 1280.691531] ? __do_sys_clone+0x110/0x110 [ 1280.692527] ? rcu_read_lock_any_held+0x75/0xa0 [ 1280.693611] ? vfs_write+0x354/0xb10 [ 1280.694490] ? fput_many+0x2f/0x1a0 [ 1280.695342] ? ksys_write+0x1a9/0x260 [ 1280.696236] ? __ia32_sys_read+0xb0/0xb0 [ 1280.697197] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1280.698445] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1280.699672] ? trace_hardirqs_on+0x5b/0x180 [ 1280.700687] do_syscall_64+0x33/0x40 [ 1280.701572] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1280.702783] RIP: 0033:0x7fa1817f7b19 [ 1280.703664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1280.708016] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1280.709794] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1280.711496] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1280.713196] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1280.714920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1280.716619] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1280.727157] FAULT_INJECTION: forcing a failure. [ 1280.727157] name failslab, interval 1, probability 0, space 0, times 0 [ 1280.729808] CPU: 0 PID: 11075 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1280.731405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1280.733286] Call Trace: [ 1280.733904] dump_stack+0x107/0x167 [ 1280.734740] should_fail.cold+0x5/0xa [ 1280.735618] ? __delayacct_tsk_init+0x1b/0x80 [ 1280.736637] should_failslab+0x5/0x20 [ 1280.737525] kmem_cache_alloc+0x5b/0x310 [ 1280.738443] ? prepare_creds+0x466/0x5e0 [ 1280.739413] __delayacct_tsk_init+0x1b/0x80 [ 1280.740404] copy_process+0x3399/0x78b0 [ 1280.741313] ? SOFTIRQ_verbose+0x10/0x10 [ 1280.742264] ? __lockdep_reset_lock+0x180/0x180 [ 1280.743346] ? lock_acquire+0x197/0x470 [ 1280.744258] ? find_held_lock+0x2c/0x110 [ 1280.745209] ? __cleanup_sighand+0xb0/0xb0 [ 1280.746217] ? _copy_from_user+0xfb/0x1b0 [ 1280.747191] kernel_clone+0xe7/0x980 [ 1280.748038] ? __lockdep_reset_lock+0x180/0x180 [ 1280.749102] ? create_io_thread+0xf0/0xf0 [ 1280.750071] ? ksys_write+0x21a/0x260 [ 1280.750954] ? lock_downgrade+0x6d0/0x6d0 [ 1280.751908] __do_sys_clone3+0x1e5/0x320 [ 1280.752848] ? __do_sys_clone+0x110/0x110 [ 1280.753846] ? rcu_read_lock_any_held+0x75/0xa0 [ 1280.754923] ? vfs_write+0x354/0xb10 [ 1280.755778] ? fput_many+0x2f/0x1a0 [ 1280.756618] ? ksys_write+0x1a9/0x260 [ 1280.757504] ? __ia32_sys_read+0xb0/0xb0 [ 1280.758436] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1280.759647] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1280.760800] ? trace_hardirqs_on+0x5b/0x180 [ 1280.761783] do_syscall_64+0x33/0x40 [ 1280.762636] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1280.763786] RIP: 0033:0x7f4d52085b19 [ 1280.764641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1280.768746] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1280.770464] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1280.772058] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1280.773650] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1280.775268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1280.776869] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:23:29 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1280.786819] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:23:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 15:23:29 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2e, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:29 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000001000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:23:29 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1280.931369] FAULT_INJECTION: forcing a failure. [ 1280.931369] name failslab, interval 1, probability 0, space 0, times 0 [ 1280.934407] CPU: 1 PID: 11177 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1280.936146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1280.938206] Call Trace: [ 1280.938878] dump_stack+0x107/0x167 [ 1280.939800] should_fail.cold+0x5/0xa [ 1280.940742] ? create_object.isra.0+0x3a/0xa30 [ 1280.941885] should_failslab+0x5/0x20 [ 1280.942847] kmem_cache_alloc+0x5b/0x310 [ 1280.943865] create_object.isra.0+0x3a/0xa30 [ 1280.944959] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1280.946225] kmem_cache_alloc+0x159/0x310 [ 1280.947297] dup_fd+0x89/0xe40 [ 1280.948108] ? audit_filter_inodes+0x40/0x40 [ 1280.949212] ? security_task_alloc+0xe6/0x260 [ 1280.950337] copy_process+0x197c/0x78b0 [ 1280.951355] ? SOFTIRQ_verbose+0x10/0x10 [ 1280.952372] ? __lockdep_reset_lock+0x180/0x180 [ 1280.953524] ? mark_lock+0xf5/0x2df0 [ 1280.954503] ? __cleanup_sighand+0xb0/0xb0 [ 1280.955566] ? _copy_from_user+0xfb/0x1b0 [ 1280.956612] kernel_clone+0xe7/0x980 [ 1280.957525] ? __lockdep_reset_lock+0x180/0x180 [ 1280.958690] ? create_io_thread+0xf0/0xf0 [ 1280.959736] ? ksys_write+0x21a/0x260 [ 1280.960684] ? lock_downgrade+0x6d0/0x6d0 [ 1280.961013] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1280.961714] __do_sys_clone3+0x1e5/0x320 [ 1280.961748] ? __do_sys_clone+0x110/0x110 [ 1280.965949] ? rcu_read_lock_any_held+0x75/0xa0 [ 1280.967098] ? vfs_write+0x354/0xb10 [ 1280.968024] ? fput_many+0x2f/0x1a0 [ 1280.968924] ? ksys_write+0x1a9/0x260 [ 1280.969863] ? __ia32_sys_read+0xb0/0xb0 [ 1280.970891] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1280.972199] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1280.973467] ? trace_hardirqs_on+0x5b/0x180 [ 1280.974535] do_syscall_64+0x33/0x40 [ 1280.975463] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1280.976726] RIP: 0033:0x7f8fbb637b19 [ 1280.977639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1280.982184] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1280.984072] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1280.985821] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1280.987583] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1280.988910] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1280.989328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1280.989344] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 15:23:29 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:29 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x9e15, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1281.213944] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1281.246072] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:23:45 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10100000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:23:45 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:45 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1500, 0x0}}], 0x324, 0x0) 15:23:45 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1700, 0x0}}], 0x324, 0x0) 15:23:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 15:23:45 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 15:23:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) [ 1296.856549] FAULT_INJECTION: forcing a failure. [ 1296.856549] name failslab, interval 1, probability 0, space 0, times 0 [ 1296.859274] CPU: 1 PID: 11310 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1296.860925] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1296.862913] Call Trace: [ 1296.863557] dump_stack+0x107/0x167 [ 1296.864427] should_fail.cold+0x5/0xa [ 1296.865336] ? create_object.isra.0+0x3a/0xa30 [ 1296.866426] should_failslab+0x5/0x20 [ 1296.867340] kmem_cache_alloc+0x5b/0x310 [ 1296.868310] create_object.isra.0+0x3a/0xa30 [ 1296.869348] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1296.870548] kmem_cache_alloc+0x159/0x310 [ 1296.871533] ? prepare_creds+0x466/0x5e0 [ 1296.872498] __delayacct_tsk_init+0x1b/0x80 [ 1296.873511] copy_process+0x3399/0x78b0 [ 1296.874449] ? SOFTIRQ_verbose+0x10/0x10 [ 1296.875420] ? __lockdep_reset_lock+0x180/0x180 15:23:45 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1296.876510] ? mark_lock+0xf5/0x2df0 [ 1296.877529] ? lock_acquire+0x197/0x470 [ 1296.878526] ? find_held_lock+0x2c/0x110 [ 1296.879537] ? __cleanup_sighand+0xb0/0xb0 [ 1296.880588] ? _copy_from_user+0xfb/0x1b0 [ 1296.881602] kernel_clone+0xe7/0x980 [ 1296.882504] ? __lockdep_reset_lock+0x180/0x180 [ 1296.883647] ? create_io_thread+0xf0/0xf0 [ 1296.884671] ? ksys_write+0x21a/0x260 [ 1296.885600] ? lock_downgrade+0x6d0/0x6d0 [ 1296.886615] __do_sys_clone3+0x1e5/0x320 [ 1296.887617] ? __do_sys_clone+0x110/0x110 [ 1296.888654] ? rcu_read_lock_any_held+0x75/0xa0 [ 1296.889786] ? vfs_write+0x354/0xb10 [ 1296.890697] ? fput_many+0x2f/0x1a0 [ 1296.891573] ? ksys_write+0x1a9/0x260 [ 1296.892494] ? __ia32_sys_read+0xb0/0xb0 [ 1296.892922] FAULT_INJECTION: forcing a failure. [ 1296.892922] name failslab, interval 1, probability 0, space 0, times 0 [ 1296.893475] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1296.893499] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1296.893521] ? trace_hardirqs_on+0x5b/0x180 [ 1296.898563] do_syscall_64+0x33/0x40 [ 1296.899474] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1296.900709] RIP: 0033:0x7f8fbb637b19 [ 1296.901608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1296.906084] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1296.907942] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1296.909660] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1296.911387] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1296.913104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1296.914833] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1296.916560] CPU: 0 PID: 11383 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1296.917537] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1296.918687] Call Trace: [ 1296.919060] dump_stack+0x107/0x167 [ 1296.919569] should_fail.cold+0x5/0xa [ 1296.920111] ? create_object.isra.0+0x3a/0xa30 [ 1296.920755] should_failslab+0x5/0x20 [ 1296.921288] kmem_cache_alloc+0x5b/0x310 [ 1296.921864] create_object.isra.0+0x3a/0xa30 [ 1296.922478] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1296.923176] kmem_cache_alloc+0x159/0x310 [ 1296.923746] ? prepare_creds+0x466/0x5e0 [ 1296.924319] __delayacct_tsk_init+0x1b/0x80 [ 1296.924920] copy_process+0x3399/0x78b0 [ 1296.925474] ? SOFTIRQ_verbose+0x10/0x10 [ 1296.926041] ? __lockdep_reset_lock+0x180/0x180 [ 1296.926703] ? lock_acquire+0x197/0x470 [ 1296.927254] ? find_held_lock+0x2c/0x110 [ 1296.927837] ? __cleanup_sighand+0xb0/0xb0 [ 1296.928202] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1296.928448] ? _copy_from_user+0xfb/0x1b0 [ 1296.928475] kernel_clone+0xe7/0x980 [ 1296.931745] ? __lockdep_reset_lock+0x180/0x180 [ 1296.932388] ? create_io_thread+0xf0/0xf0 [ 1296.932977] ? ksys_write+0x21a/0x260 [ 1296.933505] ? lock_downgrade+0x6d0/0x6d0 [ 1296.934088] __do_sys_clone3+0x1e5/0x320 [ 1296.934644] ? __do_sys_clone+0x110/0x110 [ 1296.935254] ? rcu_read_lock_any_held+0x75/0xa0 [ 1296.935890] ? vfs_write+0x354/0xb10 [ 1296.936404] ? fput_many+0x2f/0x1a0 [ 1296.936913] ? ksys_write+0x1a9/0x260 [ 1296.937434] ? __ia32_sys_read+0xb0/0xb0 [ 1296.938000] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1296.938727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1296.939435] ? trace_hardirqs_on+0x5b/0x180 [ 1296.940031] do_syscall_64+0x33/0x40 [ 1296.940539] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1296.941237] RIP: 0033:0x7f4d52085b19 [ 1296.941750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1296.943169] FAULT_INJECTION: forcing a failure. [ 1296.943169] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1296.944250] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1296.944266] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1296.944275] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1296.944291] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1296.950978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1296.951946] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1296.952956] CPU: 1 PID: 11385 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1296.954583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1296.956545] Call Trace: [ 1296.957168] dump_stack+0x107/0x167 [ 1296.958036] should_fail.cold+0x5/0xa [ 1296.958952] __alloc_pages_nodemask+0x182/0x600 [ 1296.960049] ? __lockdep_reset_lock+0x180/0x180 [ 1296.961150] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1296.962583] ? copy_page_range+0x28e1/0x3810 [ 1296.963632] alloc_pages_current+0x187/0x280 [ 1296.964667] get_zeroed_page+0x14/0xb0 [ 1296.965575] __pud_alloc+0x33/0x270 [ 1296.966431] copy_page_range+0x2ca1/0x3810 [ 1296.967428] ? perf_trace_lock+0xac/0x490 [ 1296.968392] ? lock_chain_count+0x20/0x20 [ 1296.969381] ? lock_downgrade+0x6d0/0x6d0 [ 1296.970363] ? up_write+0x191/0x550 [ 1296.971223] ? vm_iomap_memory+0x190/0x190 [ 1296.972202] ? downgrade_write+0x3a0/0x3a0 [ 1296.973186] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1296.974446] ? __vma_link_rb+0x540/0x700 [ 1296.975407] copy_process+0x7658/0x78b0 [ 1296.976324] ? SOFTIRQ_verbose+0x10/0x10 [ 1296.977313] ? __cleanup_sighand+0xb0/0xb0 [ 1296.978319] ? _copy_from_user+0xfb/0x1b0 15:23:45 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xe0ffff, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1296.979304] kernel_clone+0xe7/0x980 [ 1296.980350] ? __lockdep_reset_lock+0x180/0x180 [ 1296.981434] ? create_io_thread+0xf0/0xf0 [ 1296.982410] ? ksys_write+0x21a/0x260 [ 1296.983309] ? lock_downgrade+0x6d0/0x6d0 [ 1296.984275] __do_sys_clone3+0x1e5/0x320 [ 1296.985214] ? __do_sys_clone+0x110/0x110 [ 1296.986199] ? rcu_read_lock_any_held+0x75/0xa0 [ 1296.987280] ? vfs_write+0x354/0xb10 [ 1296.988148] ? fput_many+0x2f/0x1a0 [ 1296.988992] ? ksys_write+0x1a9/0x260 [ 1296.989879] ? __ia32_sys_read+0xb0/0xb0 [ 1296.990839] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1296.992046] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1296.993227] ? trace_hardirqs_on+0x5b/0x180 [ 1296.994223] do_syscall_64+0x33/0x40 [ 1296.995091] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1296.996282] RIP: 0033:0x7fa1817f7b19 [ 1296.997149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1297.001410] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1297.003181] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1297.004838] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1297.006488] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1297.008127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:23:45 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1297.009755] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1297.038245] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:23:45 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10487d012a0000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1297.074075] SELinux: duplicate or incompatible mount options [ 1297.078793] SELinux: duplicate or incompatible mount options 15:23:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) 15:23:45 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 15:23:45 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1297.176710] SELinux: duplicate or incompatible mount options [ 1297.177778] FAULT_INJECTION: forcing a failure. [ 1297.177778] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.178201] FAULT_INJECTION: forcing a failure. [ 1297.178201] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.179228] CPU: 0 PID: 11531 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1297.179242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1297.182794] Call Trace: [ 1297.183124] dump_stack+0x107/0x167 [ 1297.183580] should_fail.cold+0x5/0xa [ 1297.184047] ? create_object.isra.0+0x3a/0xa30 [ 1297.184605] should_failslab+0x5/0x20 [ 1297.185076] kmem_cache_alloc+0x5b/0x310 [ 1297.185590] create_object.isra.0+0x3a/0xa30 [ 1297.186125] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1297.186761] kmem_cache_alloc_trace+0x151/0x320 [ 1297.187329] ? rwlock_bug.part.0+0x90/0x90 [ 1297.187854] alloc_fdtable+0x9e/0x2c0 [ 1297.188317] dup_fd+0x92d/0xe40 [ 1297.188739] copy_process+0x197c/0x78b0 [ 1297.189222] ? SOFTIRQ_verbose+0x10/0x10 [ 1297.189720] ? __lockdep_reset_lock+0x180/0x180 [ 1297.190315] ? __cleanup_sighand+0xb0/0xb0 [ 1297.190860] ? _copy_from_user+0xfb/0x1b0 [ 1297.191365] kernel_clone+0xe7/0x980 [ 1297.191820] ? __lockdep_reset_lock+0x180/0x180 [ 1297.192381] ? create_io_thread+0xf0/0xf0 [ 1297.192895] ? ksys_write+0x21a/0x260 [ 1297.193355] ? lock_downgrade+0x6d0/0x6d0 [ 1297.193867] __do_sys_clone3+0x1e5/0x320 [ 1297.194364] ? __do_sys_clone+0x110/0x110 [ 1297.194896] ? rcu_read_lock_any_held+0x75/0xa0 [ 1297.195457] ? vfs_write+0x354/0xb10 [ 1297.195914] ? fput_many+0x2f/0x1a0 [ 1297.196354] ? ksys_write+0x1a9/0x260 [ 1297.196821] ? __ia32_sys_read+0xb0/0xb0 [ 1297.197313] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1297.197950] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1297.198565] ? trace_hardirqs_on+0x5b/0x180 [ 1297.199100] do_syscall_64+0x33/0x40 [ 1297.199552] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1297.200168] RIP: 0033:0x7f8fbb637b19 [ 1297.200620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1297.202833] RSP: 002b:00007f8fb8bad188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1297.203744] RAX: ffffffffffffffda RBX: 00007f8fbb74af60 RCX: 00007f8fbb637b19 [ 1297.204600] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1297.205459] RBP: 00007f8fb8bad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1297.206321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1297.207197] R13: 00007ffe8662371f R14: 00007f8fb8bad300 R15: 0000000000022000 [ 1297.208096] CPU: 1 PID: 11529 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1297.209201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1297.210507] Call Trace: [ 1297.210945] dump_stack+0x107/0x167 [ 1297.211196] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1297.211522] should_fail.cold+0x5/0xa [ 1297.211541] ? dup_fd+0x89/0xe40 [ 1297.211559] should_failslab+0x5/0x20 [ 1297.214361] kmem_cache_alloc+0x5b/0x310 [ 1297.215012] dup_fd+0x89/0xe40 [ 1297.215519] ? audit_filter_inodes+0x40/0x40 [ 1297.216236] ? security_task_alloc+0xe6/0x260 [ 1297.216953] copy_process+0x197c/0x78b0 [ 1297.217589] ? SOFTIRQ_verbose+0x10/0x10 [ 1297.218235] ? __lockdep_reset_lock+0x180/0x180 [ 1297.218974] ? mark_lock+0xf5/0x2df0 [ 1297.219586] ? __cleanup_sighand+0xb0/0xb0 [ 1297.220270] ? _copy_from_user+0xfb/0x1b0 [ 1297.220936] kernel_clone+0xe7/0x980 [ 1297.221522] ? __lockdep_reset_lock+0x180/0x180 [ 1297.221959] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1297.222260] ? create_io_thread+0xf0/0xf0 [ 1297.224050] ? ksys_write+0x21a/0x260 [ 1297.224653] ? lock_downgrade+0x6d0/0x6d0 [ 1297.225308] __do_sys_clone3+0x1e5/0x320 [ 1297.225948] ? __do_sys_clone+0x110/0x110 [ 1297.226631] ? rcu_read_lock_any_held+0x75/0xa0 [ 1297.227368] ? vfs_write+0x354/0xb10 [ 1297.227950] ? fput_many+0x2f/0x1a0 [ 1297.228526] ? ksys_write+0x1a9/0x260 [ 1297.229133] ? __ia32_sys_read+0xb0/0xb0 [ 1297.229786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1297.230608] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1297.231415] ? trace_hardirqs_on+0x5b/0x180 [ 1297.232116] do_syscall_64+0x33/0x40 [ 1297.232704] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1297.233504] RIP: 0033:0x7f4d52085b19 [ 1297.234091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1297.237010] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1297.238213] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1297.239348] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1297.240475] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1297.241596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1297.242725] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1297.249201] SELinux: duplicate or incompatible mount options 15:23:46 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:46 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1297.290486] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1297.315153] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1311.014775] FAULT_INJECTION: forcing a failure. [ 1311.014775] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.016628] CPU: 0 PID: 11649 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1311.017680] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1311.018821] Call Trace: [ 1311.019211] dump_stack+0x107/0x167 [ 1311.019722] should_fail.cold+0x5/0xa [ 1311.020255] ? create_object.isra.0+0x3a/0xa30 [ 1311.020882] should_failslab+0x5/0x20 [ 1311.021410] kmem_cache_alloc+0x5b/0x310 [ 1311.021974] create_object.isra.0+0x3a/0xa30 [ 1311.022568] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 15:23:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 15:23:59 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:23:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 39) 15:23:59 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1800, 0x0}}], 0x324, 0x0) 15:23:59 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1600, 0x0}}], 0x324, 0x0) [ 1311.023275] kmem_cache_alloc+0x159/0x310 [ 1311.024012] dup_fd+0x89/0xe40 [ 1311.024457] ? audit_filter_inodes+0x40/0x40 [ 1311.025070] ? security_task_alloc+0xe6/0x260 [ 1311.025705] copy_process+0x197c/0x78b0 [ 1311.026251] ? SOFTIRQ_verbose+0x10/0x10 [ 1311.026815] ? __lockdep_reset_lock+0x180/0x180 [ 1311.027503] ? __cleanup_sighand+0xb0/0xb0 [ 1311.028107] ? _copy_from_user+0xfb/0x1b0 [ 1311.028687] kernel_clone+0xe7/0x980 [ 1311.029196] ? __lockdep_reset_lock+0x180/0x180 [ 1311.029848] ? create_io_thread+0xf0/0xf0 [ 1311.030446] ? ksys_write+0x21a/0x260 [ 1311.030971] ? lock_downgrade+0x6d0/0x6d0 [ 1311.031557] __do_sys_clone3+0x1e5/0x320 [ 1311.032122] ? __do_sys_clone+0x110/0x110 [ 1311.032732] ? rcu_read_lock_any_held+0x75/0xa0 [ 1311.033370] ? vfs_write+0x354/0xb10 [ 1311.033884] ? fput_many+0x2f/0x1a0 [ 1311.034391] ? ksys_write+0x1a9/0x260 [ 1311.034921] ? __ia32_sys_read+0xb0/0xb0 [ 1311.035494] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1311.036222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1311.036937] ? trace_hardirqs_on+0x5b/0x180 [ 1311.037541] do_syscall_64+0x33/0x40 [ 1311.038052] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1311.038752] RIP: 0033:0x7f4d52085b19 [ 1311.039273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1311.041767] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1311.042804] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1311.043780] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1311.044749] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1311.045711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1311.046685] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:23:59 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1311.072646] SELinux: duplicate or incompatible mount options [ 1311.073551] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1311.079871] SELinux: duplicate or incompatible mount options [ 1311.091958] FAULT_INJECTION: forcing a failure. [ 1311.091958] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1311.093620] CPU: 0 PID: 11654 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1311.094546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1311.095678] Call Trace: [ 1311.096035] dump_stack+0x107/0x167 [ 1311.096543] should_fail.cold+0x5/0xa [ 1311.097071] __alloc_pages_nodemask+0x182/0x600 [ 1311.097700] ? lock_acquire+0x197/0x470 [ 1311.098245] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1311.099060] ? lock_downgrade+0x6d0/0x6d0 [ 1311.099619] ? do_raw_spin_lock+0x121/0x260 [ 1311.100215] alloc_pages_current+0x187/0x280 [ 1311.100818] __pmd_alloc+0x37/0x630 [ 1311.101313] copy_page_range+0x2bd8/0x3810 [ 1311.101886] ? lock_chain_count+0x20/0x20 [ 1311.102499] ? up_write+0x191/0x550 [ 1311.103008] ? vm_iomap_memory+0x190/0x190 [ 1311.103573] ? downgrade_write+0x3a0/0x3a0 [ 1311.104148] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1311.104878] ? __vma_link_rb+0x540/0x700 [ 1311.105435] copy_process+0x7658/0x78b0 [ 1311.105966] ? SOFTIRQ_verbose+0x10/0x10 [ 1311.106553] ? __cleanup_sighand+0xb0/0xb0 [ 1311.107309] ? _copy_from_user+0xfb/0x1b0 [ 1311.107889] kernel_clone+0xe7/0x980 [ 1311.108394] ? __lockdep_reset_lock+0x180/0x180 [ 1311.109019] ? create_io_thread+0xf0/0xf0 [ 1311.109588] ? ksys_write+0x21a/0x260 [ 1311.110101] ? lock_downgrade+0x6d0/0x6d0 [ 1311.110658] __do_sys_clone3+0x1e5/0x320 [ 1311.111229] ? __do_sys_clone+0x110/0x110 [ 1311.111814] ? rcu_read_lock_any_held+0x75/0xa0 [ 1311.112428] ? vfs_write+0x354/0xb10 [ 1311.112932] ? fput_many+0x2f/0x1a0 [ 1311.113417] ? ksys_write+0x1a9/0x260 [ 1311.113932] ? __ia32_sys_read+0xb0/0xb0 [ 1311.114487] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1311.115203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1311.115896] ? trace_hardirqs_on+0x5b/0x180 [ 1311.116477] do_syscall_64+0x33/0x40 [ 1311.116970] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1311.117654] RIP: 0033:0x7fa1817f7b19 [ 1311.118154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1311.120583] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1311.121585] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1311.122546] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1311.123510] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1311.124442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1311.125384] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1311.141699] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:23:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:23:59 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xc014633a550000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:00 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:00 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1311.294302] SELinux: duplicate or incompatible mount options [ 1311.296138] SELinux: duplicate or incompatible mount options 15:24:00 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1311.326945] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:24:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 40) [ 1311.348129] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:24:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) [ 1311.376197] SELinux: duplicate or incompatible mount options [ 1311.385103] SELinux: duplicate or incompatible mount options 15:24:00 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0e10b1b000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:00 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1311.437901] FAULT_INJECTION: forcing a failure. [ 1311.437901] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.439470] CPU: 0 PID: 11774 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1311.440259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1311.441211] Call Trace: [ 1311.441521] dump_stack+0x107/0x167 [ 1311.441947] should_fail.cold+0x5/0xa [ 1311.442390] ? __pmd_alloc+0x94/0x630 [ 1311.442829] should_failslab+0x5/0x20 [ 1311.443278] kmem_cache_alloc+0x5b/0x310 [ 1311.443756] __pmd_alloc+0x94/0x630 [ 1311.444184] copy_page_range+0x2bd8/0x3810 [ 1311.444674] ? lock_chain_count+0x20/0x20 [ 1311.445202] ? up_write+0x191/0x550 [ 1311.445623] ? vm_iomap_memory+0x190/0x190 [ 1311.446108] ? downgrade_write+0x3a0/0x3a0 [ 1311.446605] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1311.447240] ? __vma_link_rb+0x540/0x700 [ 1311.447718] copy_process+0x7658/0x78b0 [ 1311.448180] ? SOFTIRQ_verbose+0x10/0x10 [ 1311.448687] ? __cleanup_sighand+0xb0/0xb0 [ 1311.449199] ? _copy_from_user+0xfb/0x1b0 [ 1311.449689] kernel_clone+0xe7/0x980 [ 1311.450123] ? __lockdep_reset_lock+0x180/0x180 [ 1311.450662] ? create_io_thread+0xf0/0xf0 [ 1311.451168] ? ksys_write+0x21a/0x260 [ 1311.451612] ? lock_downgrade+0x6d0/0x6d0 [ 1311.452095] __do_sys_clone3+0x1e5/0x320 [ 1311.452567] ? __do_sys_clone+0x110/0x110 [ 1311.453068] ? rcu_read_lock_any_held+0x75/0xa0 [ 1311.453607] ? vfs_write+0x354/0xb10 [ 1311.454041] ? fput_many+0x2f/0x1a0 [ 1311.454462] ? ksys_write+0x1a9/0x260 [ 1311.454910] ? __ia32_sys_read+0xb0/0xb0 [ 1311.455386] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1311.455989] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1311.456582] ? trace_hardirqs_on+0x5b/0x180 [ 1311.457085] do_syscall_64+0x33/0x40 [ 1311.457517] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1311.458111] RIP: 0033:0x7fa1817f7b19 [ 1311.458550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1311.460675] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1311.461553] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1311.462375] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1311.463200] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1311.464018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1311.464838] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1311.471886] FAULT_INJECTION: forcing a failure. [ 1311.471886] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.473209] CPU: 0 PID: 11777 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1311.474003] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1311.474951] Call Trace: [ 1311.475258] dump_stack+0x107/0x167 [ 1311.475682] should_fail.cold+0x5/0xa [ 1311.476123] ? alloc_fdtable+0x9e/0x2c0 [ 1311.476579] should_failslab+0x5/0x20 [ 1311.477016] kmem_cache_alloc_trace+0x55/0x320 [ 1311.477538] ? rwlock_bug.part.0+0x90/0x90 [ 1311.478033] alloc_fdtable+0x9e/0x2c0 [ 1311.478478] dup_fd+0x92d/0xe40 [ 1311.478890] copy_process+0x197c/0x78b0 [ 1311.479346] ? SOFTIRQ_verbose+0x10/0x10 [ 1311.479821] ? __lockdep_reset_lock+0x180/0x180 [ 1311.480386] ? __cleanup_sighand+0xb0/0xb0 [ 1311.480894] ? _copy_from_user+0xfb/0x1b0 [ 1311.481383] kernel_clone+0xe7/0x980 [ 1311.481816] ? __lockdep_reset_lock+0x180/0x180 [ 1311.482351] ? create_io_thread+0xf0/0xf0 [ 1311.482840] ? ksys_write+0x21a/0x260 [ 1311.483294] ? lock_downgrade+0x6d0/0x6d0 [ 1311.483777] __do_sys_clone3+0x1e5/0x320 [ 1311.484244] ? __do_sys_clone+0x110/0x110 [ 1311.484740] ? rcu_read_lock_any_held+0x75/0xa0 [ 1311.485273] ? vfs_write+0x354/0xb10 [ 1311.485702] ? fput_many+0x2f/0x1a0 [ 1311.486119] ? ksys_write+0x1a9/0x260 [ 1311.486556] ? __ia32_sys_read+0xb0/0xb0 [ 1311.487037] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1311.487645] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1311.488237] ? trace_hardirqs_on+0x5b/0x180 [ 1311.488737] do_syscall_64+0x33/0x40 [ 1311.489167] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1311.489756] RIP: 0033:0x7f4d52085b19 [ 1311.490184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1311.492290] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1311.493165] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1311.493982] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1311.494799] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1311.495626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1311.496439] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1311.528189] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1311.538747] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:24:18 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1900, 0x0}}], 0x324, 0x0) 15:24:18 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:18 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1700, 0x0}}], 0x324, 0x0) 15:24:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 41) 15:24:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x11, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 15:24:18 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0ff1f00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1329.398915] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1329.403343] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1329.408201] FAULT_INJECTION: forcing a failure. [ 1329.408201] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.410801] CPU: 0 PID: 11892 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1329.412277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.414024] Call Trace: [ 1329.414598] dump_stack+0x107/0x167 [ 1329.415396] should_fail.cold+0x5/0xa [ 1329.416211] ? create_object.isra.0+0x3a/0xa30 [ 1329.417179] should_failslab+0x5/0x20 [ 1329.417993] kmem_cache_alloc+0x5b/0x310 [ 1329.418866] create_object.isra.0+0x3a/0xa30 [ 1329.419802] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1329.420885] kmem_cache_alloc_trace+0x151/0x320 [ 1329.421866] ? rwlock_bug.part.0+0x90/0x90 [ 1329.422801] alloc_fdtable+0x9e/0x2c0 [ 1329.423622] dup_fd+0x92d/0xe40 [ 1329.424351] copy_process+0x197c/0x78b0 [ 1329.425190] ? SOFTIRQ_verbose+0x10/0x10 [ 1329.426065] ? __lockdep_reset_lock+0x180/0x180 [ 1329.427111] ? __cleanup_sighand+0xb0/0xb0 [ 1329.428054] ? _copy_from_user+0xfb/0x1b0 [ 1329.428948] kernel_clone+0xe7/0x980 [ 1329.429737] ? __lockdep_reset_lock+0x180/0x180 [ 1329.430725] ? create_io_thread+0xf0/0xf0 [ 1329.431637] ? ksys_write+0x21a/0x260 [ 1329.432445] ? lock_downgrade+0x6d0/0x6d0 [ 1329.433333] __do_sys_clone3+0x1e5/0x320 [ 1329.434198] ? __do_sys_clone+0x110/0x110 [ 1329.435135] ? rcu_read_lock_any_held+0x75/0xa0 [ 1329.436128] ? vfs_write+0x354/0xb10 [ 1329.436924] ? fput_many+0x2f/0x1a0 [ 1329.437310] FAULT_INJECTION: forcing a failure. [ 1329.437310] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.437690] ? ksys_write+0x1a9/0x260 [ 1329.437724] ? __ia32_sys_read+0xb0/0xb0 [ 1329.440840] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1329.441953] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1329.443043] ? trace_hardirqs_on+0x5b/0x180 [ 1329.443975] do_syscall_64+0x33/0x40 [ 1329.444772] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.445853] RIP: 0033:0x7f4d52085b19 [ 1329.446642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.450515] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1329.452138] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1329.453638] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1329.455153] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.456655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1329.458156] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1329.459720] CPU: 1 PID: 11914 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1329.460614] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.461662] Call Trace: [ 1329.462006] dump_stack+0x107/0x167 [ 1329.462469] should_fail.cold+0x5/0xa [ 1329.462954] ? create_object.isra.0+0x3a/0xa30 [ 1329.463540] should_failslab+0x5/0x20 [ 1329.464024] kmem_cache_alloc+0x5b/0x310 [ 1329.464549] create_object.isra.0+0x3a/0xa30 [ 1329.465108] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1329.465754] kmem_cache_alloc+0x159/0x310 [ 1329.466292] __pmd_alloc+0x94/0x630 [ 1329.466752] copy_page_range+0x2bd8/0x3810 [ 1329.467299] ? perf_trace_lock+0xac/0x490 [ 1329.467822] ? lock_chain_count+0x20/0x20 [ 1329.468394] ? up_write+0x191/0x550 [ 1329.468857] ? vm_iomap_memory+0x190/0x190 [ 1329.469392] ? downgrade_write+0x3a0/0x3a0 [ 1329.469940] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1329.470620] ? __vma_link_rb+0x540/0x700 [ 1329.471146] copy_process+0x7658/0x78b0 [ 1329.471647] ? SOFTIRQ_verbose+0x10/0x10 [ 1329.472191] ? __cleanup_sighand+0xb0/0xb0 [ 1329.472739] ? _copy_from_user+0xfb/0x1b0 [ 1329.473271] kernel_clone+0xe7/0x980 [ 1329.473742] ? __lockdep_reset_lock+0x180/0x180 [ 1329.474332] ? create_io_thread+0xf0/0xf0 [ 1329.474861] ? ksys_write+0x21a/0x260 [ 1329.475342] ? lock_downgrade+0x6d0/0x6d0 [ 1329.475862] __do_sys_clone3+0x1e5/0x320 [ 1329.476380] ? __do_sys_clone+0x110/0x110 [ 1329.476920] ? rcu_read_lock_any_held+0x75/0xa0 [ 1329.477498] ? vfs_write+0x354/0xb10 [ 1329.477965] ? fput_many+0x2f/0x1a0 [ 1329.478421] ? ksys_write+0x1a9/0x260 [ 1329.478919] ? __ia32_sys_read+0xb0/0xb0 [ 1329.479438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1329.480091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1329.480732] ? trace_hardirqs_on+0x5b/0x180 [ 1329.481285] do_syscall_64+0x33/0x40 [ 1329.481753] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.482394] RIP: 0033:0x7fa1817f7b19 [ 1329.482867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.485165] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1329.486129] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1329.487022] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1329.487920] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.488814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1329.489711] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1329.497049] SELinux: duplicate or incompatible mount options 15:24:18 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1329.502359] SELinux: duplicate or incompatible mount options [ 1329.538314] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:24:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1329.553547] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:24:18 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:18 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1329.605850] SELinux: duplicate or incompatible mount options [ 1329.612811] SELinux: duplicate or incompatible mount options 15:24:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1329.656637] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:24:18 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1329.718891] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1329.727452] SELinux: duplicate or incompatible mount options [ 1329.732798] SELinux: duplicate or incompatible mount options 15:24:33 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1a00, 0x0}}], 0x324, 0x0) 15:24:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:33 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1800, 0x0}}], 0x324, 0x0) 15:24:33 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 15:24:33 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1344.973345] FAULT_INJECTION: forcing a failure. 15:24:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x400000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 42) [ 1344.973345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1344.975558] CPU: 0 PID: 12147 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1344.976508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.977645] Call Trace: [ 1344.978020] dump_stack+0x107/0x167 [ 1344.978528] should_fail.cold+0x5/0xa [ 1344.979065] __alloc_pages_nodemask+0x182/0x600 [ 1344.979719] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1344.979886] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1344.980535] ? find_held_lock+0x2c/0x110 [ 1344.980564] ? __pmd_alloc+0x31d/0x630 [ 1344.980584] ? lock_downgrade+0x6d0/0x6d0 [ 1344.983612] ? do_raw_spin_lock+0x121/0x260 [ 1344.984361] alloc_pages_current+0x187/0x280 [ 1344.985017] pte_alloc_one+0x16/0x1a0 [ 1344.985557] __pte_alloc+0x1d/0x330 [ 1344.986071] copy_page_range+0x1b62/0x3810 [ 1344.986660] ? lock_chain_count+0x20/0x20 [ 1344.987302] ? up_write+0x191/0x550 [ 1344.987809] ? vm_iomap_memory+0x190/0x190 [ 1344.988392] ? downgrade_write+0x3a0/0x3a0 [ 1344.988978] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1344.989734] ? __vma_link_rb+0x540/0x700 [ 1344.990303] copy_process+0x7658/0x78b0 [ 1344.990849] ? SOFTIRQ_verbose+0x10/0x10 [ 1344.991462] ? __cleanup_sighand+0xb0/0xb0 [ 1344.992073] ? _copy_from_user+0xfb/0x1b0 [ 1344.992661] kernel_clone+0xe7/0x980 [ 1344.993184] ? __lockdep_reset_lock+0x180/0x180 [ 1344.993823] ? create_io_thread+0xf0/0xf0 [ 1344.994412] ? ksys_write+0x21a/0x260 [ 1344.994704] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1344.994937] ? lock_downgrade+0x6d0/0x6d0 [ 1344.997029] __do_sys_clone3+0x1e5/0x320 [ 1344.997590] ? __do_sys_clone+0x110/0x110 [ 1344.998198] ? rcu_read_lock_any_held+0x75/0xa0 [ 1344.998833] ? vfs_write+0x354/0xb10 [ 1344.999398] ? fput_many+0x2f/0x1a0 [ 1344.999901] ? ksys_write+0x1a9/0x260 [ 1345.000435] ? __ia32_sys_read+0xb0/0xb0 [ 1345.000999] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1345.001729] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1345.002445] ? trace_hardirqs_on+0x5b/0x180 [ 1345.003044] do_syscall_64+0x33/0x40 [ 1345.003564] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1345.004270] RIP: 0033:0x7fa1817f7b19 [ 1345.004780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1345.007294] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1345.008342] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1345.009312] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1345.010291] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1345.011263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1345.012256] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1345.020182] FAULT_INJECTION: forcing a failure. [ 1345.020182] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.021746] CPU: 1 PID: 12143 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1345.022708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1345.023869] Call Trace: [ 1345.024244] dump_stack+0x107/0x167 [ 1345.024744] should_fail.cold+0x5/0xa [ 1345.025265] ? kvmalloc_node+0x119/0x170 [ 1345.025820] should_failslab+0x5/0x20 [ 1345.026345] __kmalloc_node+0x76/0x420 [ 1345.026885] kvmalloc_node+0x119/0x170 [ 1345.027452] alloc_fdtable+0xed/0x2c0 [ 1345.027977] dup_fd+0x92d/0xe40 [ 1345.028439] copy_process+0x197c/0x78b0 [ 1345.028987] ? SOFTIRQ_verbose+0x10/0x10 [ 1345.029547] ? __lockdep_reset_lock+0x180/0x180 [ 1345.030183] ? mark_lock+0xf5/0x2df0 [ 1345.030709] ? __cleanup_sighand+0xb0/0xb0 [ 1345.031320] ? _copy_from_user+0xfb/0x1b0 [ 1345.031900] kernel_clone+0xe7/0x980 [ 1345.032409] ? __lockdep_reset_lock+0x180/0x180 [ 1345.033049] ? create_io_thread+0xf0/0xf0 [ 1345.033629] ? ksys_write+0x21a/0x260 [ 1345.034150] ? lock_downgrade+0x6d0/0x6d0 [ 1345.034724] __do_sys_clone3+0x1e5/0x320 [ 1345.035290] ? __do_sys_clone+0x110/0x110 [ 1345.035887] ? rcu_read_lock_any_held+0x75/0xa0 [ 1345.036524] ? vfs_write+0x354/0xb10 [ 1345.037031] ? fput_many+0x2f/0x1a0 [ 1345.037533] ? ksys_write+0x1a9/0x260 [ 1345.038058] ? __ia32_sys_read+0xb0/0xb0 [ 1345.038622] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1345.039356] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1345.040059] ? trace_hardirqs_on+0x5b/0x180 [ 1345.040650] do_syscall_64+0x33/0x40 [ 1345.041158] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1345.041859] RIP: 0033:0x7f4d52085b19 [ 1345.042368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1345.044899] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1345.045932] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1345.046905] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1345.047904] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1345.048882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1345.049869] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:24:33 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:33 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 15:24:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x800000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:33 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x9e150000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1345.153158] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1345.169185] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1345.310539] FAULT_INJECTION: forcing a failure. [ 1345.310539] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.312059] CPU: 0 PID: 12365 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1345.312890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1345.313887] Call Trace: [ 1345.314217] dump_stack+0x107/0x167 [ 1345.314661] should_fail.cold+0x5/0xa [ 1345.315126] ? create_object.isra.0+0x3a/0xa30 [ 1345.315693] should_failslab+0x5/0x20 [ 1345.316154] kmem_cache_alloc+0x5b/0x310 [ 1345.316654] create_object.isra.0+0x3a/0xa30 [ 1345.317181] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1345.317801] __kmalloc_node+0x1ae/0x420 [ 1345.318294] kvmalloc_node+0x119/0x170 [ 1345.318770] alloc_fdtable+0xed/0x2c0 [ 1345.319236] dup_fd+0x92d/0xe40 [ 1345.319663] copy_process+0x197c/0x78b0 [ 1345.320145] ? SOFTIRQ_verbose+0x10/0x10 [ 1345.320642] ? __lockdep_reset_lock+0x180/0x180 [ 1345.321241] ? __cleanup_sighand+0xb0/0xb0 [ 1345.321777] ? _copy_from_user+0xfb/0x1b0 [ 1345.322291] kernel_clone+0xe7/0x980 [ 1345.322743] ? __lockdep_reset_lock+0x180/0x180 [ 1345.323314] ? create_io_thread+0xf0/0xf0 [ 1345.323841] ? ksys_write+0x21a/0x260 [ 1345.324304] ? lock_downgrade+0x6d0/0x6d0 [ 1345.324815] __do_sys_clone3+0x1e5/0x320 [ 1345.325307] ? __do_sys_clone+0x110/0x110 [ 1345.325831] ? rcu_read_lock_any_held+0x75/0xa0 [ 1345.326393] ? vfs_write+0x354/0xb10 [ 1345.326847] ? fput_many+0x2f/0x1a0 [ 1345.327301] ? ksys_write+0x1a9/0x260 [ 1345.327764] ? __ia32_sys_read+0xb0/0xb0 [ 1345.328261] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1345.328894] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1345.329515] ? trace_hardirqs_on+0x5b/0x180 [ 1345.330036] do_syscall_64+0x33/0x40 [ 1345.330484] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1345.331101] RIP: 0033:0x7f4d52085b19 [ 1345.331560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1345.333765] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1345.334680] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1345.335583] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1345.336463] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1345.337317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1345.338171] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:24:49 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1b00, 0x0}}], 0x324, 0x0) 15:24:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:49 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1900, 0x0}}], 0x324, 0x0) 15:24:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 43) 15:24:49 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:49 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:49 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) [ 1360.819951] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1360.825986] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1360.831830] SELinux: duplicate or incompatible mount options [ 1360.837075] FAULT_INJECTION: forcing a failure. [ 1360.837075] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.838660] CPU: 0 PID: 12385 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1360.839612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1360.840748] Call Trace: [ 1360.841121] dump_stack+0x107/0x167 [ 1360.841634] should_fail.cold+0x5/0xa [ 1360.842162] ? ptlock_alloc+0x1d/0x70 [ 1360.842686] should_failslab+0x5/0x20 [ 1360.843209] kmem_cache_alloc+0x5b/0x310 [ 1360.843790] ptlock_alloc+0x1d/0x70 [ 1360.844296] pte_alloc_one+0x68/0x1a0 [ 1360.844824] __pte_alloc+0x1d/0x330 [ 1360.845336] copy_page_range+0x1b62/0x3810 [ 1360.845920] ? lock_chain_count+0x20/0x20 [ 1360.846544] ? up_write+0x191/0x550 [ 1360.847048] ? vm_iomap_memory+0x190/0x190 [ 1360.847175] SELinux: duplicate or incompatible mount options [ 1360.847638] ? downgrade_write+0x3a0/0x3a0 [ 1360.847659] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1360.847680] ? __vma_link_rb+0x540/0x700 [ 1360.850926] copy_process+0x7658/0x78b0 [ 1360.851491] ? SOFTIRQ_verbose+0x10/0x10 [ 1360.852097] ? __cleanup_sighand+0xb0/0xb0 [ 1360.852714] ? _copy_from_user+0xfb/0x1b0 [ 1360.853296] kernel_clone+0xe7/0x980 [ 1360.853810] ? __lockdep_reset_lock+0x180/0x180 [ 1360.854451] ? create_io_thread+0xf0/0xf0 [ 1360.855049] ? ksys_write+0x21a/0x260 [ 1360.855585] ? lock_downgrade+0x6d0/0x6d0 [ 1360.856167] __do_sys_clone3+0x1e5/0x320 [ 1360.856725] ? __do_sys_clone+0x110/0x110 [ 1360.857325] ? rcu_read_lock_any_held+0x75/0xa0 [ 1360.857962] ? vfs_write+0x354/0xb10 [ 1360.858484] ? fput_many+0x2f/0x1a0 [ 1360.858987] ? ksys_write+0x1a9/0x260 [ 1360.859518] ? __ia32_sys_read+0xb0/0xb0 [ 1360.860085] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1360.860800] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1360.861507] ? trace_hardirqs_on+0x5b/0x180 [ 1360.862104] do_syscall_64+0x33/0x40 [ 1360.862614] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1360.863314] RIP: 0033:0x7fa1817f7b19 [ 1360.863884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1360.866379] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1360.867421] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1360.868419] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1360.869395] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1360.870374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1360.871351] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1360.881541] FAULT_INJECTION: forcing a failure. [ 1360.881541] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.883176] CPU: 0 PID: 12387 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1360.884124] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1360.885243] Call Trace: [ 1360.885603] dump_stack+0x107/0x167 [ 1360.886099] should_fail.cold+0x5/0xa [ 1360.886616] ? kvmalloc_node+0x119/0x170 [ 1360.887170] should_failslab+0x5/0x20 [ 1360.887698] __kmalloc_node+0x76/0x420 [ 1360.888227] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1360.888915] kvmalloc_node+0x119/0x170 [ 1360.889449] alloc_fdtable+0x159/0x2c0 [ 1360.889982] dup_fd+0x92d/0xe40 [ 1360.890450] copy_process+0x197c/0x78b0 [ 1360.890990] ? SOFTIRQ_verbose+0x10/0x10 [ 1360.891559] ? __lockdep_reset_lock+0x180/0x180 [ 1360.892233] ? __cleanup_sighand+0xb0/0xb0 [ 1360.892833] ? _copy_from_user+0xfb/0x1b0 [ 1360.893406] kernel_clone+0xe7/0x980 [ 1360.893910] ? __lockdep_reset_lock+0x180/0x180 [ 1360.894546] ? create_io_thread+0xf0/0xf0 [ 1360.895126] ? ksys_write+0x21a/0x260 [ 1360.895649] ? lock_downgrade+0x6d0/0x6d0 [ 1360.896218] __do_sys_clone3+0x1e5/0x320 [ 1360.896770] ? __do_sys_clone+0x110/0x110 [ 1360.897353] ? rcu_read_lock_any_held+0x75/0xa0 [ 1360.897976] ? vfs_write+0x354/0xb10 [ 1360.898486] ? fput_many+0x2f/0x1a0 [ 1360.898977] ? ksys_write+0x1a9/0x260 [ 1360.899500] ? __ia32_sys_read+0xb0/0xb0 [ 1360.900059] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1360.900773] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1360.901470] ? trace_hardirqs_on+0x5b/0x180 [ 1360.902069] do_syscall_64+0x33/0x40 [ 1360.902568] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1360.903255] RIP: 0033:0x7f4d52085b19 [ 1360.903764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1360.906239] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1360.907265] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1360.908240] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1360.909193] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1360.910150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1360.911113] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:24:49 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:24:49 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1360.991764] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:24:49 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffe000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1361.028805] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:24:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 44) 15:24:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) 15:24:49 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:24:49 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1361.093683] FAULT_INJECTION: forcing a failure. [ 1361.093683] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.095163] CPU: 0 PID: 12500 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1361.096019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1361.097028] Call Trace: [ 1361.097361] dump_stack+0x107/0x167 [ 1361.097813] should_fail.cold+0x5/0xa [ 1361.098286] ? create_object.isra.0+0x3a/0xa30 [ 1361.098848] should_failslab+0x5/0x20 [ 1361.099329] kmem_cache_alloc+0x5b/0x310 [ 1361.099855] create_object.isra.0+0x3a/0xa30 [ 1361.100403] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1361.101040] __kmalloc_node+0x1ae/0x420 [ 1361.101549] kvmalloc_node+0x119/0x170 [ 1361.102044] alloc_fdtable+0x159/0x2c0 [ 1361.102545] dup_fd+0x92d/0xe40 [ 1361.102997] copy_process+0x197c/0x78b0 [ 1361.103501] ? SOFTIRQ_verbose+0x10/0x10 [ 1361.104019] ? __lockdep_reset_lock+0x180/0x180 [ 1361.104642] ? __cleanup_sighand+0xb0/0xb0 [ 1361.105200] ? _copy_from_user+0xfb/0x1b0 [ 1361.105734] kernel_clone+0xe7/0x980 [ 1361.106199] ? __lockdep_reset_lock+0x180/0x180 [ 1361.106783] ? create_io_thread+0xf0/0xf0 [ 1361.107337] ? ksys_write+0x21a/0x260 [ 1361.107822] ? lock_downgrade+0x6d0/0x6d0 [ 1361.108354] __do_sys_clone3+0x1e5/0x320 [ 1361.108857] ? __do_sys_clone+0x110/0x110 [ 1361.109404] ? rcu_read_lock_any_held+0x75/0xa0 [ 1361.109977] ? vfs_write+0x354/0xb10 [ 1361.110444] ? fput_many+0x2f/0x1a0 [ 1361.110911] ? ksys_write+0x1a9/0x260 [ 1361.111387] ? __ia32_sys_read+0xb0/0xb0 [ 1361.111907] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1361.112551] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1361.113180] ? trace_hardirqs_on+0x5b/0x180 [ 1361.113720] do_syscall_64+0x33/0x40 [ 1361.114175] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1361.114810] RIP: 0033:0x7f4d52085b19 [ 1361.115265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1361.117500] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1361.118436] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1361.119304] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1361.120176] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1361.121053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1361.121928] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:24:49 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1361.169964] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1361.172892] FAULT_INJECTION: forcing a failure. [ 1361.172892] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.175298] CPU: 1 PID: 12512 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1361.176774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1361.178536] Call Trace: [ 1361.179104] dump_stack+0x107/0x167 [ 1361.179894] should_fail.cold+0x5/0xa [ 1361.180711] ? create_object.isra.0+0x3a/0xa30 [ 1361.181684] should_failslab+0x5/0x20 [ 1361.182498] kmem_cache_alloc+0x5b/0x310 [ 1361.183371] create_object.isra.0+0x3a/0xa30 [ 1361.184310] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1361.185395] kmem_cache_alloc+0x159/0x310 [ 1361.186286] ptlock_alloc+0x1d/0x70 [ 1361.187068] pte_alloc_one+0x68/0x1a0 [ 1361.187897] __pte_alloc+0x1d/0x330 [ 1361.188678] copy_page_range+0x1b62/0x3810 [ 1361.189579] ? perf_trace_lock+0xac/0x490 [ 1361.190464] ? lock_chain_count+0x20/0x20 [ 1361.191405] ? up_write+0x191/0x550 [ 1361.192190] ? vm_iomap_memory+0x190/0x190 [ 1361.193089] ? downgrade_write+0x3a0/0x3a0 [ 1361.193994] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1361.195148] ? __vma_link_rb+0x540/0x700 [ 1361.196034] copy_process+0x7658/0x78b0 [ 1361.196878] ? SOFTIRQ_verbose+0x10/0x10 [ 1361.197783] ? __cleanup_sighand+0xb0/0xb0 [ 1361.198710] ? _copy_from_user+0xfb/0x1b0 [ 1361.199612] kernel_clone+0xe7/0x980 [ 1361.200405] ? __lockdep_reset_lock+0x180/0x180 [ 1361.201396] ? create_io_thread+0xf0/0xf0 [ 1361.202294] ? ksys_write+0x21a/0x260 [ 1361.203106] ? lock_downgrade+0x6d0/0x6d0 [ 1361.204005] __do_sys_clone3+0x1e5/0x320 [ 1361.204867] ? __do_sys_clone+0x110/0x110 [ 1361.205780] ? rcu_read_lock_any_held+0x75/0xa0 [ 1361.206769] ? vfs_write+0x354/0xb10 [ 1361.207573] ? fput_many+0x2f/0x1a0 [ 1361.208347] ? ksys_write+0x1a9/0x260 [ 1361.209162] ? __ia32_sys_read+0xb0/0xb0 [ 1361.210033] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1361.211146] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1361.212245] ? trace_hardirqs_on+0x5b/0x180 [ 1361.213166] do_syscall_64+0x33/0x40 [ 1361.213960] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1361.215049] RIP: 0033:0x7fa1817f7b19 [ 1361.215849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1361.219762] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1361.221383] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1361.222903] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1361.224429] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1361.225942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1361.227460] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1361.268116] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:25:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:25:04 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:25:04 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1a00, 0x0}}], 0x324, 0x0) 15:25:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) 15:25:04 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:04 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 45) 15:25:04 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1c00, 0x0}}], 0x324, 0x0) [ 1375.879521] FAULT_INJECTION: forcing a failure. [ 1375.879521] name failslab, interval 1, probability 0, space 0, times 0 [ 1375.881067] CPU: 0 PID: 12619 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1375.882020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1375.883111] Call Trace: [ 1375.883475] dump_stack+0x107/0x167 [ 1375.883978] should_fail.cold+0x5/0xa [ 1375.884512] ? copy_fs_struct+0x45/0x340 [ 1375.885075] should_failslab+0x5/0x20 [ 1375.885589] kmem_cache_alloc+0x5b/0x310 [ 1375.886144] copy_fs_struct+0x45/0x340 [ 1375.886649] copy_process+0x34b5/0x78b0 [ 1375.887159] ? SOFTIRQ_verbose+0x10/0x10 [ 1375.887694] ? __lockdep_reset_lock+0x180/0x180 [ 1375.888327] ? __cleanup_sighand+0xb0/0xb0 [ 1375.888906] ? _copy_from_user+0xfb/0x1b0 [ 1375.889451] kernel_clone+0xe7/0x980 [ 1375.889932] ? __lockdep_reset_lock+0x180/0x180 [ 1375.890528] ? create_io_thread+0xf0/0xf0 [ 1375.891081] ? ksys_write+0x21a/0x260 [ 1375.891574] ? lock_downgrade+0x6d0/0x6d0 [ 1375.892118] __do_sys_clone3+0x1e5/0x320 [ 1375.892653] ? __do_sys_clone+0x110/0x110 [ 1375.893212] ? rcu_read_lock_any_held+0x75/0xa0 [ 1375.893803] ? vfs_write+0x354/0xb10 [ 1375.894285] ? fput_many+0x2f/0x1a0 [ 1375.894751] ? ksys_write+0x1a9/0x260 [ 1375.895241] ? __ia32_sys_read+0xb0/0xb0 [ 1375.895775] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1375.896447] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1375.897127] ? trace_hardirqs_on+0x5b/0x180 [ 1375.897684] do_syscall_64+0x33/0x40 [ 1375.898161] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1375.898819] RIP: 0033:0x7f4d52085b19 [ 1375.899292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1375.901660] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1375.902628] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1375.903540] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1375.904502] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1375.905468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1375.906437] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1375.911906] FAULT_INJECTION: forcing a failure. [ 1375.911906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1375.913539] CPU: 0 PID: 12628 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1375.914419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1375.915503] Call Trace: [ 1375.915849] dump_stack+0x107/0x167 [ 1375.916321] should_fail.cold+0x5/0xa [ 1375.916812] __alloc_pages_nodemask+0x182/0x600 [ 1375.917412] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1375.918170] ? find_held_lock+0x2c/0x110 [ 1375.918700] ? __pmd_alloc+0x31d/0x630 [ 1375.919195] ? lock_downgrade+0x6d0/0x6d0 [ 1375.919756] ? do_raw_spin_lock+0x121/0x260 [ 1375.920338] alloc_pages_current+0x187/0x280 [ 1375.920932] pte_alloc_one+0x16/0x1a0 [ 1375.921443] __pte_alloc+0x1d/0x330 [ 1375.921935] copy_page_range+0x1b62/0x3810 [ 1375.922511] ? lock_chain_count+0x20/0x20 [ 1375.923106] ? up_write+0x191/0x550 [ 1375.923573] ? vm_iomap_memory+0x190/0x190 [ 1375.924116] ? downgrade_write+0x3a0/0x3a0 [ 1375.924658] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1375.925346] ? __vma_link_rb+0x540/0x700 [ 1375.925889] copy_process+0x7658/0x78b0 [ 1375.926392] ? SOFTIRQ_verbose+0x10/0x10 [ 1375.926954] ? __cleanup_sighand+0xb0/0xb0 [ 1375.927524] ? _copy_from_user+0xfb/0x1b0 [ 1375.928074] kernel_clone+0xe7/0x980 [ 1375.928550] ? __lockdep_reset_lock+0x180/0x180 [ 1375.929141] ? create_io_thread+0xf0/0xf0 [ 1375.929684] ? ksys_write+0x21a/0x260 [ 1375.930173] ? lock_downgrade+0x6d0/0x6d0 [ 1375.930705] __do_sys_clone3+0x1e5/0x320 [ 1375.931220] ? __do_sys_clone+0x110/0x110 [ 1375.931775] ? rcu_read_lock_any_held+0x75/0xa0 [ 1375.932364] ? vfs_write+0x354/0xb10 [ 1375.932839] ? fput_many+0x2f/0x1a0 [ 1375.933301] ? ksys_write+0x1a9/0x260 [ 1375.933782] ? __ia32_sys_read+0xb0/0xb0 [ 1375.934302] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1375.934963] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1375.935608] ? trace_hardirqs_on+0x5b/0x180 [ 1375.936173] do_syscall_64+0x33/0x40 [ 1375.936643] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1375.937289] RIP: 0033:0x7fa1817f7b19 [ 1375.937756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1375.940088] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1375.941041] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1375.941937] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1375.942851] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1375.943779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1375.944672] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1375.946123] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1375.955830] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:25:04 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1376.014226] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:25:04 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1376.026280] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:25:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 46) 15:25:04 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 15:25:04 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1376.121919] FAULT_INJECTION: forcing a failure. [ 1376.121919] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.123625] CPU: 0 PID: 12743 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1376.124657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1376.125878] Call Trace: [ 1376.126277] dump_stack+0x107/0x167 [ 1376.126823] should_fail.cold+0x5/0xa [ 1376.127386] ? create_object.isra.0+0x3a/0xa30 [ 1376.127988] should_failslab+0x5/0x20 [ 1376.128461] kmem_cache_alloc+0x5b/0x310 [ 1376.129072] create_object.isra.0+0x3a/0xa30 [ 1376.129704] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1376.130458] kmem_cache_alloc+0x159/0x310 [ 1376.131031] vm_area_dup+0x78/0x290 [ 1376.131474] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1376.132170] ? lock_downgrade+0x6d0/0x6d0 [ 1376.132774] ? _cond_resched+0x10/0x30 [ 1376.133345] ? copy_page_range+0x24e9/0x3810 [ 1376.134015] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1376.134704] ? avc_has_extended_perms+0xf40/0xf40 [ 1376.135445] ? vm_area_alloc+0x110/0x110 [ 1376.136065] ? selinux_vm_enough_memory+0x114/0x180 [ 1376.136734] ? selinux_sb_statfs+0x250/0x250 [ 1376.137271] ? percpu_counter_add_batch+0x8b/0x140 [ 1376.137876] ? __vm_enough_memory+0x184/0x360 [ 1376.138431] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1376.139027] copy_process+0x298b/0x78b0 [ 1376.139515] ? SOFTIRQ_verbose+0x10/0x10 [ 1376.140172] ? __cleanup_sighand+0xb0/0xb0 [ 1376.140831] ? _copy_from_user+0xfb/0x1b0 [ 1376.141341] kernel_clone+0xe7/0x980 [ 1376.141892] ? __lockdep_reset_lock+0x180/0x180 [ 1376.142581] ? create_io_thread+0xf0/0xf0 [ 1376.142782] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1376.143144] ? ksys_write+0x21a/0x260 [ 1376.145807] ? lock_downgrade+0x6d0/0x6d0 [ 1376.146420] __do_sys_clone3+0x1e5/0x320 [ 1376.147025] ? __do_sys_clone+0x110/0x110 [ 1376.147680] ? rcu_read_lock_any_held+0x75/0xa0 [ 1376.148360] ? vfs_write+0x354/0xb10 [ 1376.148905] ? fput_many+0x2f/0x1a0 [ 1376.149432] ? ksys_write+0x1a9/0x260 [ 1376.149983] ? __ia32_sys_read+0xb0/0xb0 [ 1376.150589] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1376.151361] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1376.152022] ? trace_hardirqs_on+0x5b/0x180 [ 1376.152530] do_syscall_64+0x33/0x40 [ 1376.153078] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1376.153816] RIP: 0033:0x7fa1817f7b19 [ 1376.154366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1376.156567] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1376.157433] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1376.158235] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1376.159083] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1376.159919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1376.160726] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:25:05 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1376.174316] FAULT_INJECTION: forcing a failure. [ 1376.174316] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.175948] CPU: 0 PID: 12747 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1376.176931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1376.178108] Call Trace: [ 1376.178488] dump_stack+0x107/0x167 [ 1376.179015] should_fail.cold+0x5/0xa [ 1376.179574] ? create_object.isra.0+0x3a/0xa30 [ 1376.180143] should_failslab+0x5/0x20 [ 1376.180690] kmem_cache_alloc+0x5b/0x310 [ 1376.181273] create_object.isra.0+0x3a/0xa30 [ 1376.181895] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1376.182633] kmem_cache_alloc+0x159/0x310 [ 1376.183252] copy_fs_struct+0x45/0x340 [ 1376.183835] copy_process+0x34b5/0x78b0 [ 1376.184372] ? SOFTIRQ_verbose+0x10/0x10 [ 1376.184963] ? __lockdep_reset_lock+0x180/0x180 [ 1376.185678] ? __cleanup_sighand+0xb0/0xb0 [ 1376.186300] ? _copy_from_user+0xfb/0x1b0 [ 1376.186909] kernel_clone+0xe7/0x980 [ 1376.187441] ? __lockdep_reset_lock+0x180/0x180 [ 1376.188124] ? create_io_thread+0xf0/0xf0 [ 1376.188739] ? ksys_write+0x21a/0x260 [ 1376.189283] ? lock_downgrade+0x6d0/0x6d0 [ 1376.189884] __do_sys_clone3+0x1e5/0x320 [ 1376.190468] ? __do_sys_clone+0x110/0x110 [ 1376.191088] ? rcu_read_lock_any_held+0x75/0xa0 [ 1376.191758] ? vfs_write+0x354/0xb10 [ 1376.192293] ? fput_many+0x2f/0x1a0 [ 1376.192817] ? ksys_write+0x1a9/0x260 [ 1376.193359] ? __ia32_sys_read+0xb0/0xb0 [ 1376.193940] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1376.194610] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1376.195230] ? trace_hardirqs_on+0x5b/0x180 [ 1376.195759] do_syscall_64+0x33/0x40 [ 1376.196198] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1376.196799] RIP: 0033:0x7f4d52085b19 [ 1376.197233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1376.199659] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1376.200696] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1376.201629] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1376.202557] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1376.203561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:25:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1376.204335] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1376.204579] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:25:20 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1b00, 0x0}}], 0x324, 0x0) 15:25:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:25:20 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1d00, 0x0}}], 0x324, 0x0) 15:25:20 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xe0ffff00000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:20 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2e00, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 47) 15:25:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 15:25:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xffffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1391.937726] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1391.954921] FAULT_INJECTION: forcing a failure. [ 1391.954921] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.956512] CPU: 0 PID: 12875 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1391.957434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1391.958537] Call Trace: [ 1391.958904] dump_stack+0x107/0x167 [ 1391.959406] should_fail.cold+0x5/0xa [ 1391.959935] ? anon_vma_clone+0xdc/0x590 [ 1391.960484] should_failslab+0x5/0x20 [ 1391.960992] kmem_cache_alloc+0x5b/0x310 [ 1391.961546] anon_vma_clone+0xdc/0x590 [ 1391.962085] anon_vma_fork+0x82/0x640 [ 1391.962593] ? __vm_enough_memory+0x184/0x360 [ 1391.963213] copy_process+0x72cd/0x78b0 [ 1391.963759] ? SOFTIRQ_verbose+0x10/0x10 [ 1391.964361] ? __cleanup_sighand+0xb0/0xb0 [ 1391.964962] ? _copy_from_user+0xfb/0x1b0 [ 1391.965530] kernel_clone+0xe7/0x980 [ 1391.966046] ? __lockdep_reset_lock+0x180/0x180 [ 1391.966194] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1391.966667] ? create_io_thread+0xf0/0xf0 [ 1391.966702] ? ksys_write+0x21a/0x260 [ 1391.969766] ? lock_downgrade+0x6d0/0x6d0 [ 1391.970331] __do_sys_clone3+0x1e5/0x320 [ 1391.970873] ? __do_sys_clone+0x110/0x110 [ 1391.971465] ? rcu_read_lock_any_held+0x75/0xa0 [ 1391.972099] ? vfs_write+0x354/0xb10 [ 1391.972601] ? fput_many+0x2f/0x1a0 [ 1391.973087] ? ksys_write+0x1a9/0x260 [ 1391.973613] ? __ia32_sys_read+0xb0/0xb0 [ 1391.974154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1391.974858] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1391.975543] ? trace_hardirqs_on+0x5b/0x180 [ 1391.976134] do_syscall_64+0x33/0x40 [ 1391.976634] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1391.977326] RIP: 0033:0x7fa1817f7b19 [ 1391.977819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1391.980241] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1391.981241] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1391.982205] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1391.983158] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1391.984118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1391.985072] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1391.990431] FAULT_INJECTION: forcing a failure. [ 1391.990431] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.992847] CPU: 1 PID: 12879 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1391.994315] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1391.996103] Call Trace: [ 1391.996677] dump_stack+0x107/0x167 [ 1391.997455] should_fail.cold+0x5/0xa [ 1391.998268] ? copy_process+0x1ae7/0x78b0 [ 1391.999151] should_failslab+0x5/0x20 [ 1391.999990] kmem_cache_alloc+0x5b/0x310 [ 1392.000856] ? _raw_spin_unlock+0x1a/0x30 [ 1392.001743] copy_process+0x1ae7/0x78b0 [ 1392.002597] ? SOFTIRQ_verbose+0x10/0x10 [ 1392.003467] ? __lockdep_reset_lock+0x180/0x180 [ 1392.004485] ? mark_lock+0xf5/0x2df0 [ 1392.005309] ? __cleanup_sighand+0xb0/0xb0 [ 1392.006236] ? _copy_from_user+0xfb/0x1b0 [ 1392.007127] kernel_clone+0xe7/0x980 [ 1392.007950] ? __lockdep_reset_lock+0x180/0x180 [ 1392.008953] ? create_io_thread+0xf0/0xf0 [ 1392.009850] ? ksys_write+0x21a/0x260 [ 1392.010664] ? lock_downgrade+0x6d0/0x6d0 [ 1392.011556] __do_sys_clone3+0x1e5/0x320 [ 1392.012451] ? __do_sys_clone+0x110/0x110 [ 1392.013355] ? rcu_read_lock_any_held+0x75/0xa0 [ 1392.014340] ? vfs_write+0x354/0xb10 [ 1392.015131] ? fput_many+0x2f/0x1a0 [ 1392.015921] ? ksys_write+0x1a9/0x260 [ 1392.016746] ? __ia32_sys_read+0xb0/0xb0 [ 1392.017617] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1392.018731] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1392.019825] ? trace_hardirqs_on+0x5b/0x180 [ 1392.020782] do_syscall_64+0x33/0x40 [ 1392.021579] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1392.022667] RIP: 0033:0x7f4d52085b19 [ 1392.023461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1392.027390] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1392.029035] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1392.030542] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1392.032080] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1392.033590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1392.035097] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:25:20 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x200000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:25:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 15:25:20 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 48) [ 1392.156278] FAULT_INJECTION: forcing a failure. [ 1392.156278] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1392.157813] CPU: 0 PID: 12990 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1392.158653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1392.159663] Call Trace: [ 1392.160004] dump_stack+0x107/0x167 [ 1392.160459] should_fail.cold+0x5/0xa [ 1392.160933] __alloc_pages_nodemask+0x182/0x600 [ 1392.161503] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1392.162247] ? kmem_cache_alloc+0x301/0x310 [ 1392.162784] alloc_pages_current+0x187/0x280 [ 1392.163329] allocate_slab+0x26f/0x380 [ 1392.163811] ___slab_alloc+0x470/0x700 [ 1392.164296] ? lock_downgrade+0x6d0/0x6d0 [ 1392.164806] ? copy_process+0x1ae7/0x78b0 [ 1392.165318] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1392.165965] ? trace_hardirqs_on+0x5b/0x180 [ 1392.166496] ? copy_process+0x1ae7/0x78b0 [ 1392.167007] ? kmem_cache_alloc+0x301/0x310 [ 1392.167533] kmem_cache_alloc+0x301/0x310 [ 1392.168054] copy_process+0x1ae7/0x78b0 [ 1392.168540] ? SOFTIRQ_verbose+0x10/0x10 [ 1392.169041] ? __lockdep_reset_lock+0x180/0x180 [ 1392.169645] ? __cleanup_sighand+0xb0/0xb0 [ 1392.170185] ? _copy_from_user+0xfb/0x1b0 [ 1392.170700] kernel_clone+0xe7/0x980 [ 1392.171155] ? __lockdep_reset_lock+0x180/0x180 [ 1392.171731] ? create_io_thread+0xf0/0xf0 [ 1392.172261] ? ksys_write+0x21a/0x260 [ 1392.172723] ? lock_downgrade+0x6d0/0x6d0 [ 1392.173233] __do_sys_clone3+0x1e5/0x320 [ 1392.173723] ? __do_sys_clone+0x110/0x110 [ 1392.174247] ? rcu_read_lock_any_held+0x75/0xa0 [ 1392.174805] ? vfs_write+0x354/0xb10 [ 1392.175266] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1392.175822] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1392.176491] ? ksys_write+0x1a9/0x260 [ 1392.176953] ? __ia32_sys_read+0xb0/0xb0 [ 1392.177454] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1392.178086] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1392.178706] ? trace_hardirqs_on+0x5b/0x180 [ 1392.179230] do_syscall_64+0x33/0x40 [ 1392.179681] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1392.180307] RIP: 0033:0x7f4d52085b19 [ 1392.180765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1392.182968] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1392.183899] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1392.184766] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1392.185628] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1392.186491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1392.187366] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:25:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:25:21 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1392.232587] FAULT_INJECTION: forcing a failure. [ 1392.232587] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.233977] CPU: 0 PID: 12994 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1392.234790] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1392.234985] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1392.235777] Call Trace: [ 1392.235798] dump_stack+0x107/0x167 [ 1392.235817] should_fail.cold+0x5/0xa [ 1392.235838] ? create_object.isra.0+0x3a/0xa30 [ 1392.239554] should_failslab+0x5/0x20 [ 1392.240013] kmem_cache_alloc+0x5b/0x310 [ 1392.240507] create_object.isra.0+0x3a/0xa30 [ 1392.241023] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1392.241629] kmem_cache_alloc+0x159/0x310 [ 1392.242130] anon_vma_clone+0xdc/0x590 [ 1392.242607] anon_vma_fork+0x82/0x640 [ 1392.243058] ? __vm_enough_memory+0x184/0x360 [ 1392.243599] copy_process+0x72cd/0x78b0 [ 1392.244079] ? SOFTIRQ_verbose+0x10/0x10 [ 1392.244603] ? __cleanup_sighand+0xb0/0xb0 [ 1392.245130] ? _copy_from_user+0xfb/0x1b0 [ 1392.245634] kernel_clone+0xe7/0x980 [ 1392.246072] ? __lockdep_reset_lock+0x180/0x180 [ 1392.246626] ? create_io_thread+0xf0/0xf0 [ 1392.247132] ? ksys_write+0x21a/0x260 [ 1392.247587] ? lock_downgrade+0x6d0/0x6d0 [ 1392.248091] __do_sys_clone3+0x1e5/0x320 [ 1392.248568] ? __do_sys_clone+0x110/0x110 [ 1392.249080] ? rcu_read_lock_any_held+0x75/0xa0 [ 1392.249625] ? vfs_write+0x354/0xb10 [ 1392.250064] ? fput_many+0x2f/0x1a0 [ 1392.250496] ? ksys_write+0x1a9/0x260 [ 1392.250946] ? __ia32_sys_read+0xb0/0xb0 [ 1392.251433] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1392.252052] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1392.252656] ? trace_hardirqs_on+0x5b/0x180 [ 1392.253171] do_syscall_64+0x33/0x40 [ 1392.253610] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1392.254214] RIP: 0033:0x7fa1817f7b19 [ 1392.254660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1392.256803] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1392.257332] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1392.257688] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1392.257697] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1392.257704] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1392.257720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:25:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0ff1f, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1392.262987] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:25:21 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1392.407332] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1392.439524] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1407.660474] FAULT_INJECTION: forcing a failure. [ 1407.660474] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.662668] CPU: 0 PID: 13117 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1407.663895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1407.665379] Call Trace: [ 1407.665859] dump_stack+0x107/0x167 [ 1407.666518] should_fail.cold+0x5/0xa [ 1407.667204] ? create_object.isra.0+0x3a/0xa30 [ 1407.668012] should_failslab+0x5/0x20 [ 1407.668705] kmem_cache_alloc+0x5b/0x310 [ 1407.669434] create_object.isra.0+0x3a/0xa30 [ 1407.670209] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1407.671174] kmem_cache_alloc+0x159/0x310 [ 1407.671928] vm_area_dup+0x78/0x290 [ 1407.672597] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1407.673420] ? lock_downgrade+0x6d0/0x6d0 [ 1407.674142] ? _cond_resched+0x10/0x30 [ 1407.674817] ? copy_page_range+0x24e9/0x3810 [ 1407.675617] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1407.676460] ? avc_has_extended_perms+0xf40/0xf40 [ 1407.677317] ? vm_area_alloc+0x110/0x110 [ 1407.678035] ? selinux_vm_enough_memory+0x114/0x180 [ 1407.678917] ? selinux_sb_statfs+0x250/0x250 [ 1407.679694] ? percpu_counter_add_batch+0x8b/0x140 [ 1407.680579] ? __vm_enough_memory+0x184/0x360 [ 1407.681352] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1407.682245] copy_process+0x298b/0x78b0 [ 1407.682934] ? SOFTIRQ_verbose+0x10/0x10 [ 1407.683708] ? __cleanup_sighand+0xb0/0xb0 [ 1407.684496] ? _copy_from_user+0xfb/0x1b0 [ 1407.685220] kernel_clone+0xe7/0x980 [ 1407.685875] ? __lockdep_reset_lock+0x180/0x180 [ 1407.686697] ? create_io_thread+0xf0/0xf0 [ 1407.687440] ? ksys_write+0x21a/0x260 [ 1407.688121] ? lock_downgrade+0x6d0/0x6d0 [ 1407.688881] __do_sys_clone3+0x1e5/0x320 [ 1407.689594] ? __do_sys_clone+0x110/0x110 [ 1407.690343] ? rcu_read_lock_any_held+0x75/0xa0 [ 1407.691150] ? vfs_write+0x354/0xb10 [ 1407.691790] ? fput_many+0x2f/0x1a0 [ 1407.692435] ? ksys_write+0x1a9/0x260 [ 1407.693103] ? __ia32_sys_read+0xb0/0xb0 15:25:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 49) 15:25:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1407.693828] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1407.694924] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1407.695825] ? trace_hardirqs_on+0x5b/0x180 [ 1407.696609] do_syscall_64+0x33/0x40 [ 1407.697262] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1407.698161] RIP: 0033:0x7fa1817f7b19 [ 1407.698817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1407.702021] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 15:25:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:36 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1e00, 0x0}}], 0x324, 0x0) 15:25:36 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1c00, 0x0}}], 0x324, 0x0) 15:25:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) 15:25:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1407.703342] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1407.704667] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1407.705899] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1407.707111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1407.708341] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1407.724906] FAULT_INJECTION: forcing a failure. [ 1407.724906] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.726862] CPU: 0 PID: 13125 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1407.728066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1407.728109] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1407.729469] Call Trace: [ 1407.729493] dump_stack+0x107/0x167 [ 1407.729518] should_fail.cold+0x5/0xa [ 1407.729541] ? copy_process+0x1c65/0x78b0 [ 1407.733944] should_failslab+0x5/0x20 [ 1407.734597] kmem_cache_alloc+0x5b/0x310 [ 1407.735306] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1407.736224] copy_process+0x1c65/0x78b0 [ 1407.736911] ? SOFTIRQ_verbose+0x10/0x10 [ 1407.737623] ? __lockdep_reset_lock+0x180/0x180 [ 1407.738472] ? __cleanup_sighand+0xb0/0xb0 [ 1407.739235] ? _copy_from_user+0xfb/0x1b0 [ 1407.739994] kernel_clone+0xe7/0x980 [ 1407.740648] ? __lockdep_reset_lock+0x180/0x180 [ 1407.741511] ? create_io_thread+0xf0/0xf0 [ 1407.742247] ? ksys_write+0x21a/0x260 [ 1407.742904] ? lock_downgrade+0x6d0/0x6d0 [ 1407.743634] __do_sys_clone3+0x1e5/0x320 [ 1407.744354] ? __do_sys_clone+0x110/0x110 [ 1407.745105] ? rcu_read_lock_any_held+0x75/0xa0 [ 1407.745896] ? vfs_write+0x354/0xb10 [ 1407.746545] ? fput_many+0x2f/0x1a0 [ 1407.747166] ? ksys_write+0x1a9/0x260 [ 1407.747821] ? __ia32_sys_read+0xb0/0xb0 [ 1407.748544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1407.749449] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1407.750338] ? trace_hardirqs_on+0x5b/0x180 [ 1407.751096] do_syscall_64+0x33/0x40 [ 1407.751739] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1407.752634] RIP: 0033:0x7f4d52085b19 [ 1407.753265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1407.753330] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1407.756382] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1407.756403] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1407.756414] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1407.756426] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1407.756437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1407.756456] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:25:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 50) [ 1407.883807] FAULT_INJECTION: forcing a failure. [ 1407.883807] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.885819] CPU: 0 PID: 13165 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1407.886920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1407.888242] Call Trace: [ 1407.888675] dump_stack+0x107/0x167 [ 1407.889268] should_fail.cold+0x5/0xa [ 1407.889889] ? create_object.isra.0+0x3a/0xa30 [ 1407.890622] should_failslab+0x5/0x20 [ 1407.891229] kmem_cache_alloc+0x5b/0x310 [ 1407.891899] create_object.isra.0+0x3a/0xa30 [ 1407.892615] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1407.893430] kmem_cache_alloc+0x159/0x310 [ 1407.894115] anon_vma_fork+0xf1/0x640 [ 1407.894727] ? __vm_enough_memory+0x184/0x360 [ 1407.895471] copy_process+0x72cd/0x78b0 [ 1407.896122] ? SOFTIRQ_verbose+0x10/0x10 [ 1407.896825] ? __cleanup_sighand+0xb0/0xb0 [ 1407.897538] ? _copy_from_user+0xfb/0x1b0 [ 1407.898216] kernel_clone+0xe7/0x980 [ 1407.898818] ? __lockdep_reset_lock+0x180/0x180 [ 1407.899560] ? create_io_thread+0xf0/0xf0 [ 1407.900248] ? ksys_write+0x21a/0x260 [ 1407.900865] ? lock_downgrade+0x6d0/0x6d0 [ 1407.901538] __do_sys_clone3+0x1e5/0x320 [ 1407.902178] ? __do_sys_clone+0x110/0x110 [ 1407.902876] ? rcu_read_lock_any_held+0x75/0xa0 [ 1407.903626] ? vfs_write+0x354/0xb10 [ 1407.904243] ? fput_many+0x2f/0x1a0 [ 1407.904820] ? ksys_write+0x1a9/0x260 [ 1407.905428] ? __ia32_sys_read+0xb0/0xb0 [ 1407.906084] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1407.906943] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1407.907745] ? trace_hardirqs_on+0x5b/0x180 [ 1407.908433] do_syscall_64+0x33/0x40 [ 1407.909022] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1407.909826] RIP: 0033:0x7fa1817f7b19 [ 1407.910417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1407.913339] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1407.914552] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1407.915673] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1407.916830] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1407.917960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1407.919100] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:25:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) [ 1407.982283] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:25:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:25:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1408.005519] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1408.041309] FAULT_INJECTION: forcing a failure. [ 1408.041309] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.042969] CPU: 0 PID: 13242 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1408.043941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1408.045116] Call Trace: [ 1408.045502] dump_stack+0x107/0x167 [ 1408.046027] should_fail.cold+0x5/0xa [ 1408.046577] ? create_object.isra.0+0x3a/0xa30 [ 1408.047239] should_failslab+0x5/0x20 [ 1408.047782] kmem_cache_alloc+0x5b/0x310 [ 1408.048379] create_object.isra.0+0x3a/0xa30 [ 1408.049003] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1408.049729] kmem_cache_alloc+0x159/0x310 [ 1408.050323] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1408.051093] copy_process+0x1c65/0x78b0 [ 1408.051661] ? SOFTIRQ_verbose+0x10/0x10 [ 1408.052263] ? __lockdep_reset_lock+0x180/0x180 [ 1408.052963] ? __cleanup_sighand+0xb0/0xb0 [ 1408.053602] ? _copy_from_user+0xfb/0x1b0 [ 1408.054213] kernel_clone+0xe7/0x980 [ 1408.054743] ? __lockdep_reset_lock+0x180/0x180 [ 1408.055412] ? create_io_thread+0xf0/0xf0 [ 1408.056024] ? ksys_write+0x21a/0x260 [ 1408.056581] ? lock_downgrade+0x6d0/0x6d0 [ 1408.057175] __do_sys_clone3+0x1e5/0x320 [ 1408.057762] ? __do_sys_clone+0x110/0x110 [ 1408.058377] ? rcu_read_lock_any_held+0x75/0xa0 [ 1408.059032] ? vfs_write+0x354/0xb10 [ 1408.059569] ? fput_many+0x2f/0x1a0 [ 1408.060090] ? ksys_write+0x1a9/0x260 [ 1408.060630] ? __ia32_sys_read+0xb0/0xb0 [ 1408.061217] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1408.061956] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1408.062688] ? trace_hardirqs_on+0x5b/0x180 [ 1408.063303] do_syscall_64+0x33/0x40 [ 1408.063831] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1408.064572] RIP: 0033:0x7f4d52085b19 [ 1408.065105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1408.067682] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1408.068766] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1408.069772] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1408.070773] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1408.071785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1408.072789] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:25:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:25:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 51) [ 1408.202290] FAULT_INJECTION: forcing a failure. [ 1408.202290] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.203860] CPU: 0 PID: 13260 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1408.204769] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1408.205832] Call Trace: [ 1408.206181] dump_stack+0x107/0x167 [ 1408.206659] should_fail.cold+0x5/0xa [ 1408.207157] ? anon_vma_fork+0x1ff/0x640 [ 1408.207683] should_failslab+0x5/0x20 [ 1408.208185] kmem_cache_alloc+0x5b/0x310 [ 1408.208722] anon_vma_fork+0x1ff/0x640 [ 1408.209234] copy_process+0x72cd/0x78b0 [ 1408.209751] ? SOFTIRQ_verbose+0x10/0x10 [ 1408.210319] ? __cleanup_sighand+0xb0/0xb0 [ 1408.210892] ? _copy_from_user+0xfb/0x1b0 [ 1408.211438] kernel_clone+0xe7/0x980 [ 1408.211919] ? __lockdep_reset_lock+0x180/0x180 [ 1408.212530] ? create_io_thread+0xf0/0xf0 [ 1408.213081] ? ksys_write+0x21a/0x260 [ 1408.213577] ? lock_downgrade+0x6d0/0x6d0 [ 1408.214118] __do_sys_clone3+0x1e5/0x320 [ 1408.214642] ? __do_sys_clone+0x110/0x110 [ 1408.215208] ? rcu_read_lock_any_held+0x75/0xa0 [ 1408.215805] ? vfs_write+0x354/0xb10 [ 1408.216302] ? fput_many+0x2f/0x1a0 [ 1408.216770] ? ksys_write+0x1a9/0x260 [ 1408.217266] ? __ia32_sys_read+0xb0/0xb0 [ 1408.217798] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1408.218472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1408.219128] ? trace_hardirqs_on+0x5b/0x180 [ 1408.219684] do_syscall_64+0x33/0x40 [ 1408.220171] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1408.220824] RIP: 0033:0x7fa1817f7b19 [ 1408.221307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1408.223645] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1408.224628] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1408.225540] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1408.226449] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1408.227353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1408.228265] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1408.235516] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:25:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1408.264075] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:25:37 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) 15:25:51 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1f00, 0x0}}], 0x324, 0x0) 15:25:51 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1d00, 0x0}}], 0x324, 0x0) 15:25:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 52) 15:25:51 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:25:51 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:25:51 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1422.566138] FAULT_INJECTION: forcing a failure. [ 1422.566138] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.567725] CPU: 0 PID: 13383 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1422.568690] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1422.569824] Call Trace: [ 1422.570196] dump_stack+0x107/0x167 [ 1422.570708] should_fail.cold+0x5/0xa [ 1422.571252] ? copy_process+0x2514/0x78b0 [ 1422.571826] should_failslab+0x5/0x20 [ 1422.572372] kmem_cache_alloc+0x5b/0x310 [ 1422.572953] copy_process+0x2514/0x78b0 [ 1422.573504] ? SOFTIRQ_verbose+0x10/0x10 [ 1422.574084] ? __lockdep_reset_lock+0x180/0x180 [ 1422.574765] ? __cleanup_sighand+0xb0/0xb0 [ 1422.575271] FAULT_INJECTION: forcing a failure. [ 1422.575271] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.575376] ? _copy_from_user+0xfb/0x1b0 [ 1422.578595] kernel_clone+0xe7/0x980 [ 1422.579112] ? __lockdep_reset_lock+0x180/0x180 [ 1422.579761] ? create_io_thread+0xf0/0xf0 [ 1422.580367] ? ksys_write+0x21a/0x260 [ 1422.580908] ? lock_downgrade+0x6d0/0x6d0 [ 1422.581500] __do_sys_clone3+0x1e5/0x320 [ 1422.582065] ? __do_sys_clone+0x110/0x110 [ 1422.582670] ? rcu_read_lock_any_held+0x75/0xa0 [ 1422.583316] ? vfs_write+0x354/0xb10 [ 1422.583874] ? fput_many+0x2f/0x1a0 [ 1422.584389] ? ksys_write+0x1a9/0x260 [ 1422.584918] ? __ia32_sys_read+0xb0/0xb0 [ 1422.585486] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1422.586222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1422.586930] ? trace_hardirqs_on+0x5b/0x180 [ 1422.587538] do_syscall_64+0x33/0x40 [ 1422.588054] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1422.588767] RIP: 0033:0x7f4d52085b19 [ 1422.589282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1422.591796] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1422.592866] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1422.593840] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1422.594822] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1422.595803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1422.596802] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1422.597825] CPU: 1 PID: 13385 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1422.599489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1422.601484] Call Trace: [ 1422.602121] dump_stack+0x107/0x167 [ 1422.603001] should_fail.cold+0x5/0xa [ 1422.603916] ? create_object.isra.0+0x3a/0xa30 [ 1422.605023] should_failslab+0x5/0x20 [ 1422.605936] kmem_cache_alloc+0x5b/0x310 [ 1422.606919] create_object.isra.0+0x3a/0xa30 [ 1422.607968] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1422.609200] kmem_cache_alloc+0x159/0x310 [ 1422.610204] anon_vma_fork+0x1ff/0x640 [ 1422.611146] copy_process+0x72cd/0x78b0 [ 1422.612098] ? SOFTIRQ_verbose+0x10/0x10 [ 1422.613118] ? __cleanup_sighand+0xb0/0xb0 [ 1422.614155] ? _copy_from_user+0xfb/0x1b0 [ 1422.615150] kernel_clone+0xe7/0x980 [ 1422.616031] ? __lockdep_reset_lock+0x180/0x180 [ 1422.617142] ? create_io_thread+0xf0/0xf0 [ 1422.618137] ? ksys_write+0x21a/0x260 [ 1422.619039] ? lock_downgrade+0x6d0/0x6d0 [ 1422.620026] __do_sys_clone3+0x1e5/0x320 [ 1422.620993] ? __do_sys_clone+0x110/0x110 [ 1422.622007] ? rcu_read_lock_any_held+0x75/0xa0 [ 1422.623104] ? vfs_write+0x354/0xb10 [ 1422.623988] ? fput_many+0x2f/0x1a0 [ 1422.624857] ? ksys_write+0x1a9/0x260 [ 1422.625759] ? __ia32_sys_read+0xb0/0xb0 [ 1422.626728] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1422.627967] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1422.629206] ? trace_hardirqs_on+0x5b/0x180 [ 1422.630233] do_syscall_64+0x33/0x40 [ 1422.631122] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1422.632339] RIP: 0033:0x7fa1817f7b19 [ 1422.633224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1422.637580] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1422.639400] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1422.641091] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1422.642779] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1422.644484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1422.646186] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1422.674306] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1422.687845] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:25:51 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1422.875905] FAULT_INJECTION: forcing a failure. [ 1422.875905] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.877401] CPU: 0 PID: 13497 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1422.878235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1422.879235] Call Trace: [ 1422.879563] dump_stack+0x107/0x167 [ 1422.880008] should_fail.cold+0x5/0xa [ 1422.880484] ? vm_area_dup+0x78/0x290 [ 1422.880960] should_failslab+0x5/0x20 [ 1422.881419] kmem_cache_alloc+0x5b/0x310 [ 1422.881924] ? copy_page_range+0x28e1/0x3810 [ 1422.882461] vm_area_dup+0x78/0x290 [ 1422.882917] ? copy_page_range+0x24e9/0x3810 15:25:51 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:25:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 53) [ 1422.883451] ? lock_chain_count+0x20/0x20 [ 1422.884176] ? vm_area_alloc+0x110/0x110 [ 1422.884685] ? up_write+0x191/0x550 [ 1422.885126] ? vm_iomap_memory+0x190/0x190 [ 1422.885634] ? downgrade_write+0x3a0/0x3a0 [ 1422.886145] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1422.886805] ? __vma_link_rb+0x540/0x700 [ 1422.887305] copy_process+0x298b/0x78b0 [ 1422.887781] ? SOFTIRQ_verbose+0x10/0x10 [ 1422.888318] ? __cleanup_sighand+0xb0/0xb0 [ 1422.888852] ? _copy_from_user+0xfb/0x1b0 [ 1422.889360] kernel_clone+0xe7/0x980 [ 1422.889810] ? __lockdep_reset_lock+0x180/0x180 [ 1422.890380] ? create_io_thread+0xf0/0xf0 [ 1422.890899] ? ksys_write+0x21a/0x260 [ 1422.891360] ? lock_downgrade+0x6d0/0x6d0 [ 1422.891872] __do_sys_clone3+0x1e5/0x320 [ 1422.892370] ? __do_sys_clone+0x110/0x110 [ 1422.892892] ? rcu_read_lock_any_held+0x75/0xa0 [ 1422.893447] ? vfs_write+0x354/0xb10 [ 1422.893900] ? fput_many+0x2f/0x1a0 [ 1422.894335] ? ksys_write+0x1a9/0x260 [ 1422.894800] ? __ia32_sys_read+0xb0/0xb0 [ 1422.895290] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1422.895917] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1422.896540] ? trace_hardirqs_on+0x5b/0x180 [ 1422.897068] do_syscall_64+0x33/0x40 [ 1422.897511] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1422.898121] RIP: 0033:0x7fa1817f7b19 [ 1422.898570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1422.900760] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1422.901664] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1422.902508] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1422.903351] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1422.904194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1422.905045] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:26:07 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:07 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2000, 0x0}}], 0x324, 0x0) 15:26:07 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1e00, 0x0}}], 0x324, 0x0) 15:26:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:07 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x9e15000000000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 54) 15:26:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) [ 1438.253507] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1438.258971] FAULT_INJECTION: forcing a failure. [ 1438.258971] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.260565] CPU: 0 PID: 13518 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1438.261534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1438.262695] Call Trace: [ 1438.263078] dump_stack+0x107/0x167 [ 1438.263604] should_fail.cold+0x5/0xa [ 1438.264149] ? copy_process+0x2514/0x78b0 [ 1438.264751] should_failslab+0x5/0x20 [ 1438.265296] kmem_cache_alloc+0x5b/0x310 [ 1438.265882] copy_process+0x2514/0x78b0 [ 1438.266449] ? SOFTIRQ_verbose+0x10/0x10 [ 1438.267034] ? __lockdep_reset_lock+0x180/0x180 [ 1438.267724] ? __cleanup_sighand+0xb0/0xb0 [ 1438.268350] ? _copy_from_user+0xfb/0x1b0 [ 1438.268960] kernel_clone+0xe7/0x980 [ 1438.269487] ? __lockdep_reset_lock+0x180/0x180 [ 1438.270151] ? create_io_thread+0xf0/0xf0 [ 1438.270765] ? ksys_write+0x21a/0x260 [ 1438.271312] ? lock_downgrade+0x6d0/0x6d0 [ 1438.271685] FAULT_INJECTION: forcing a failure. [ 1438.271685] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.271910] __do_sys_clone3+0x1e5/0x320 [ 1438.275013] ? __do_sys_clone+0x110/0x110 [ 1438.275633] ? rcu_read_lock_any_held+0x75/0xa0 [ 1438.276291] ? vfs_write+0x354/0xb10 [ 1438.276845] ? fput_many+0x2f/0x1a0 [ 1438.277358] ? ksys_write+0x1a9/0x260 [ 1438.277899] ? __ia32_sys_read+0xb0/0xb0 [ 1438.278480] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1438.279221] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1438.279945] ? trace_hardirqs_on+0x5b/0x180 [ 1438.280560] do_syscall_64+0x33/0x40 [ 1438.281091] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1438.281815] RIP: 0033:0x7f4d52085b19 [ 1438.282343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1438.284915] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1438.285993] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1438.286992] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1438.287996] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1438.288999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1438.289998] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1438.291039] CPU: 1 PID: 13512 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1438.292658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1438.294557] Call Trace: [ 1438.295172] dump_stack+0x107/0x167 [ 1438.296018] should_fail.cold+0x5/0xa [ 1438.296912] ? create_object.isra.0+0x3a/0xa30 [ 1438.297961] should_failslab+0x5/0x20 [ 1438.298839] kmem_cache_alloc+0x5b/0x310 [ 1438.299731] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1438.299783] create_object.isra.0+0x3a/0xa30 [ 1438.299805] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1438.303257] kmem_cache_alloc+0x159/0x310 [ 1438.304230] anon_vma_fork+0xf1/0x640 [ 1438.305118] ? __vm_enough_memory+0x184/0x360 [ 1438.306158] copy_process+0x72cd/0x78b0 [ 1438.307071] ? SOFTIRQ_verbose+0x10/0x10 [ 1438.308054] ? __cleanup_sighand+0xb0/0xb0 [ 1438.309072] ? _copy_from_user+0xfb/0x1b0 [ 1438.310043] kernel_clone+0xe7/0x980 [ 1438.310902] ? __lockdep_reset_lock+0x180/0x180 [ 1438.311976] ? create_io_thread+0xf0/0xf0 [ 1438.312956] ? ksys_write+0x21a/0x260 [ 1438.313836] ? lock_downgrade+0x6d0/0x6d0 [ 1438.314800] __do_sys_clone3+0x1e5/0x320 [ 1438.315737] ? __do_sys_clone+0x110/0x110 [ 1438.316735] ? rcu_read_lock_any_held+0x75/0xa0 [ 1438.317810] ? vfs_write+0x354/0xb10 [ 1438.318668] ? fput_many+0x2f/0x1a0 [ 1438.319507] ? ksys_write+0x1a9/0x260 [ 1438.320384] ? __ia32_sys_read+0xb0/0xb0 [ 1438.321332] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1438.322538] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1438.323728] ? trace_hardirqs_on+0x5b/0x180 [ 1438.324732] do_syscall_64+0x33/0x40 [ 1438.325584] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1438.326760] RIP: 0033:0x7fa1817f7b19 [ 1438.327615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1438.331846] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1438.333615] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1438.335226] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1438.336833] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1438.338451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1438.340091] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:26:07 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:07 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) 15:26:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1438.466978] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1ffff000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1438.495133] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1438.500214] FAULT_INJECTION: forcing a failure. [ 1438.500214] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1438.502949] CPU: 1 PID: 13629 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1438.504532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1438.506403] Call Trace: [ 1438.507001] dump_stack+0x107/0x167 [ 1438.507819] should_fail.cold+0x5/0xa [ 1438.508699] __alloc_pages_nodemask+0x182/0x600 [ 1438.509750] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1438.511131] alloc_pages_current+0x187/0x280 [ 1438.512118] __get_free_pages+0xc/0xa0 [ 1438.513008] pgd_alloc+0x84/0x4e0 [ 1438.513788] ? pgd_page_get_mm+0x40/0x40 [ 1438.514713] ? lockdep_init_map_type+0x2c7/0x780 [ 1438.515771] ? lockdep_init_map_type+0x2c7/0x780 [ 1438.516873] mm_init+0x670/0xab0 [ 1438.517641] copy_process+0x257b/0x78b0 [ 1438.518540] ? SOFTIRQ_verbose+0x10/0x10 [ 1438.519453] ? __lockdep_reset_lock+0x180/0x180 [ 1438.520520] ? mark_lock+0xf5/0x2df0 [ 1438.521388] ? __cleanup_sighand+0xb0/0xb0 [ 1438.522381] ? _copy_from_user+0xfb/0x1b0 [ 1438.523323] kernel_clone+0xe7/0x980 [ 1438.524167] ? __lockdep_reset_lock+0x180/0x180 [ 1438.525231] ? create_io_thread+0xf0/0xf0 [ 1438.526204] ? ksys_write+0x21a/0x260 [ 1438.527083] ? lock_downgrade+0x6d0/0x6d0 [ 1438.528045] __do_sys_clone3+0x1e5/0x320 [ 1438.528994] ? __do_sys_clone+0x110/0x110 [ 1438.529970] ? rcu_read_lock_any_held+0x75/0xa0 [ 1438.531030] ? vfs_write+0x354/0xb10 [ 1438.531871] ? fput_many+0x2f/0x1a0 [ 1438.532694] ? ksys_write+0x1a9/0x260 [ 1438.533553] ? __ia32_sys_read+0xb0/0xb0 [ 1438.534485] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1438.535698] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1438.536871] ? trace_hardirqs_on+0x5b/0x180 [ 1438.537852] do_syscall_64+0x33/0x40 [ 1438.538719] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1438.539907] RIP: 0033:0x7f4d52085b19 [ 1438.540779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1438.545058] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1438.546815] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1438.548473] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1438.550132] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1438.551785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1438.553461] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:26:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 55) 15:26:07 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:07 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x3f00}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1438.631736] FAULT_INJECTION: forcing a failure. [ 1438.631736] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.633120] CPU: 0 PID: 13740 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1438.633934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1438.634916] Call Trace: [ 1438.635239] dump_stack+0x107/0x167 [ 1438.635671] should_fail.cold+0x5/0xa [ 1438.636127] ? vm_area_dup+0x78/0x290 [ 1438.636588] should_failslab+0x5/0x20 [ 1438.637037] kmem_cache_alloc+0x5b/0x310 [ 1438.637521] ? copy_page_range+0x28e1/0x3810 [ 1438.638042] vm_area_dup+0x78/0x290 [ 1438.638483] ? copy_page_range+0x24e9/0x3810 [ 1438.639038] ? vm_area_alloc+0x110/0x110 [ 1438.639524] ? vm_iomap_memory+0x190/0x190 [ 1438.640034] ? __vma_link_rb+0x540/0x700 [ 1438.640522] copy_process+0x298b/0x78b0 [ 1438.640985] ? SOFTIRQ_verbose+0x10/0x10 [ 1438.641495] ? __cleanup_sighand+0xb0/0xb0 [ 1438.642012] ? _copy_from_user+0xfb/0x1b0 [ 1438.642507] kernel_clone+0xe7/0x980 [ 1438.642941] ? __lockdep_reset_lock+0x180/0x180 [ 1438.643485] ? create_io_thread+0xf0/0xf0 [ 1438.643983] ? ksys_write+0x21a/0x260 [ 1438.644429] ? lock_downgrade+0x6d0/0x6d0 [ 1438.644926] __do_sys_clone3+0x1e5/0x320 [ 1438.645401] ? __do_sys_clone+0x110/0x110 [ 1438.645909] ? rcu_read_lock_any_held+0x75/0xa0 [ 1438.646450] ? vfs_write+0x354/0xb10 [ 1438.646890] ? fput_many+0x2f/0x1a0 [ 1438.647315] ? ksys_write+0x1a9/0x260 [ 1438.647757] ? __ia32_sys_read+0xb0/0xb0 [ 1438.648229] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1438.648845] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1438.649439] ? trace_hardirqs_on+0x5b/0x180 [ 1438.649952] do_syscall_64+0x33/0x40 [ 1438.650396] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1438.650987] RIP: 0033:0x7fa1817f7b19 [ 1438.651414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1438.653553] RSP: 002b:00007fa17ed4c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1438.654434] RAX: ffffffffffffffda RBX: 00007fa18190b020 RCX: 00007fa1817f7b19 [ 1438.655256] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1438.655935] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1438.656081] RBP: 00007fa17ed4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1438.656098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1438.659936] R13: 00007fffc404c34f R14: 00007fa17ed4c300 R15: 0000000000022000 [ 1438.681448] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:21 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x1f00, 0x0}}], 0x324, 0x0) 15:26:21 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xff03, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 15:26:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 56) 15:26:21 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2100, 0x0}}], 0x324, 0x0) 15:26:21 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1452.779088] FAULT_INJECTION: forcing a failure. [ 1452.779088] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.780755] CPU: 0 PID: 13861 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1452.781569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1452.782535] Call Trace: [ 1452.782848] dump_stack+0x107/0x167 [ 1452.783268] should_fail.cold+0x5/0xa [ 1452.783707] ? create_object.isra.0+0x3a/0xa30 [ 1452.784228] should_failslab+0x5/0x20 [ 1452.784669] kmem_cache_alloc+0x5b/0x310 [ 1452.785145] create_object.isra.0+0x3a/0xa30 [ 1452.785644] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1452.786226] kmem_cache_alloc+0x159/0x310 [ 1452.786700] ? copy_page_range+0x28e1/0x3810 [ 1452.787210] vm_area_dup+0x78/0x290 [ 1452.787646] ? copy_page_range+0x24e9/0x3810 [ 1452.788191] ? vm_area_alloc+0x110/0x110 [ 1452.788670] ? vm_iomap_memory+0x190/0x190 [ 1452.789173] ? __vma_link_rb+0x540/0x700 [ 1452.789646] copy_process+0x298b/0x78b0 [ 1452.790101] ? SOFTIRQ_verbose+0x10/0x10 [ 1452.790600] ? __cleanup_sighand+0xb0/0xb0 [ 1452.791112] ? _copy_from_user+0xfb/0x1b0 [ 1452.791597] kernel_clone+0xe7/0x980 [ 1452.792020] ? __lockdep_reset_lock+0x180/0x180 [ 1452.792549] ? create_io_thread+0xf0/0xf0 [ 1452.793061] ? ksys_write+0x21a/0x260 [ 1452.793497] ? lock_downgrade+0x6d0/0x6d0 [ 1452.793977] __do_sys_clone3+0x1e5/0x320 [ 1452.794444] ? __do_sys_clone+0x110/0x110 [ 1452.794943] ? rcu_read_lock_any_held+0x75/0xa0 [ 1452.795471] ? vfs_write+0x354/0xb10 [ 1452.795900] ? fput_many+0x2f/0x1a0 [ 1452.796315] ? ksys_write+0x1a9/0x260 [ 1452.796753] ? __ia32_sys_read+0xb0/0xb0 [ 1452.797223] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1452.797818] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1452.798404] ? trace_hardirqs_on+0x5b/0x180 [ 1452.798900] do_syscall_64+0x33/0x40 [ 1452.799326] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1452.799909] RIP: 0033:0x7fa1817f7b19 [ 1452.800335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1452.802426] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1452.803295] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1452.803398] tmpfs: Unknown parameter 'context"sysadm_u' [ 1452.804106] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1452.804114] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1452.804121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1452.804137] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1452.816121] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1452.821158] FAULT_INJECTION: forcing a failure. [ 1452.821158] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.823673] CPU: 1 PID: 13870 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1452.825163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1452.826620] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1452.826922] Call Trace: [ 1452.826950] dump_stack+0x107/0x167 [ 1452.826975] should_fail.cold+0x5/0xa [ 1452.830100] ? create_object.isra.0+0x3a/0xa30 [ 1452.831080] should_failslab+0x5/0x20 [ 1452.831890] kmem_cache_alloc+0x5b/0x310 [ 1452.832771] create_object.isra.0+0x3a/0xa30 [ 1452.833704] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1452.834789] kmem_cache_alloc+0x159/0x310 [ 1452.835678] copy_process+0x2514/0x78b0 [ 1452.836524] ? SOFTIRQ_verbose+0x10/0x10 [ 1452.837401] ? __lockdep_reset_lock+0x180/0x180 [ 1452.838392] ? mark_lock+0xf5/0x2df0 [ 1452.839213] ? __cleanup_sighand+0xb0/0xb0 [ 1452.840135] ? _copy_from_user+0xfb/0x1b0 [ 1452.841043] kernel_clone+0xe7/0x980 [ 1452.841834] ? __lockdep_reset_lock+0x180/0x180 [ 1452.842824] ? create_io_thread+0xf0/0xf0 [ 1452.843722] ? ksys_write+0x21a/0x260 [ 1452.844532] ? lock_downgrade+0x6d0/0x6d0 [ 1452.845426] __do_sys_clone3+0x1e5/0x320 [ 1452.846290] ? __do_sys_clone+0x110/0x110 [ 1452.847196] ? rcu_read_lock_any_held+0x75/0xa0 [ 1452.848180] ? vfs_write+0x354/0xb10 [ 1452.848982] ? fput_many+0x2f/0x1a0 [ 1452.849757] ? ksys_write+0x1a9/0x260 [ 1452.850572] ? __ia32_sys_read+0xb0/0xb0 [ 1452.851443] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1452.852557] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1452.853658] ? trace_hardirqs_on+0x5b/0x180 [ 1452.854579] do_syscall_64+0x33/0x40 [ 1452.855375] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1452.856461] RIP: 0033:0x7f4d52085b19 [ 1452.857260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1452.861163] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1452.862783] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1452.864306] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1452.865830] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1452.867353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1452.868880] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1452.883385] tmpfs: Unknown parameter 'context"sysadm_u' 15:26:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:21 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20010}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:21 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 57) [ 1452.938556] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1452.962488] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1452.965100] tmpfs: Bad value for 'context' [ 1452.975621] tmpfs: Bad value for 'context' [ 1453.007948] FAULT_INJECTION: forcing a failure. [ 1453.007948] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.009280] CPU: 0 PID: 14081 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1453.010062] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1453.011004] Call Trace: [ 1453.011312] dump_stack+0x107/0x167 [ 1453.011734] should_fail.cold+0x5/0xa [ 1453.012172] ? vm_area_dup+0x78/0x290 [ 1453.012613] should_failslab+0x5/0x20 [ 1453.013059] kmem_cache_alloc+0x5b/0x310 [ 1453.013534] vm_area_dup+0x78/0x290 [ 1453.013968] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1453.014504] ? lock_downgrade+0x6d0/0x6d0 [ 1453.014976] ? perf_trace_lock+0xac/0x490 [ 1453.015452] ? copy_page_range+0x24e9/0x3810 [ 1453.015952] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1453.016551] ? __lockdep_reset_lock+0x180/0x180 [ 1453.017097] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1453.017635] ? avc_has_extended_perms+0xf40/0xf40 [ 1453.018187] ? copy_process+0x2be1/0x78b0 [ 1453.018666] ? vm_area_alloc+0x110/0x110 [ 1453.019141] ? selinux_vm_enough_memory+0x114/0x180 [ 1453.019708] ? selinux_sb_statfs+0x250/0x250 [ 1453.020212] ? up_write+0x191/0x550 [ 1453.020643] ? percpu_counter_add_batch+0x8b/0x140 [ 1453.021210] ? __vm_enough_memory+0x184/0x360 [ 1453.021718] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1453.022306] copy_process+0x298b/0x78b0 [ 1453.022799] ? __cleanup_sighand+0xb0/0xb0 [ 1453.023309] ? _copy_from_user+0xfb/0x1b0 [ 1453.023792] kernel_clone+0xe7/0x980 [ 1453.024219] ? __lockdep_reset_lock+0x180/0x180 [ 1453.024760] ? create_io_thread+0xf0/0xf0 [ 1453.025247] ? ksys_write+0x21a/0x260 [ 1453.025682] ? lock_downgrade+0x6d0/0x6d0 [ 1453.026158] __do_sys_clone3+0x1e5/0x320 [ 1453.026620] ? __do_sys_clone+0x110/0x110 [ 1453.027120] ? rcu_read_lock_any_held+0x75/0xa0 [ 1453.027652] ? vfs_write+0x354/0xb10 [ 1453.028082] ? fput_many+0x2f/0x1a0 [ 1453.028499] ? ksys_write+0x1a9/0x260 [ 1453.028940] ? __ia32_sys_read+0xb0/0xb0 [ 1453.029410] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1453.030005] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1453.030592] ? trace_hardirqs_on+0x5b/0x180 [ 1453.031087] do_syscall_64+0x33/0x40 [ 1453.031511] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1453.032090] RIP: 0033:0x7fa1817f7b19 [ 1453.032513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1453.034598] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1453.035466] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1453.036274] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1453.037091] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1453.037898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1453.038707] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:26:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20200}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:21 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1453.092359] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1453.105078] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x41, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:36 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2200, 0x0}}], 0x324, 0x0) 15:26:36 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2000, 0x0}}], 0x324, 0x0) 15:26:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) 15:26:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 58) [ 1467.255142] tmpfs: Unknown parameter 'contextAsysadm_u' [ 1467.261267] tmpfs: Unknown parameter 'contextAsysadm_u' [ 1467.276693] FAULT_INJECTION: forcing a failure. [ 1467.276693] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.278273] CPU: 0 PID: 14213 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1467.279200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1467.280314] Call Trace: [ 1467.280676] dump_stack+0x107/0x167 [ 1467.281191] should_fail.cold+0x5/0xa [ 1467.281706] ? create_object.isra.0+0x3a/0xa30 [ 1467.282322] should_failslab+0x5/0x20 [ 1467.282834] kmem_cache_alloc+0x5b/0x310 [ 1467.283407] create_object.isra.0+0x3a/0xa30 [ 1467.283994] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1467.284679] kmem_cache_alloc+0x159/0x310 [ 1467.285275] vm_area_dup+0x78/0x290 [ 1467.285777] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1467.286413] ? lock_downgrade+0x6d0/0x6d0 [ 1467.286977] ? perf_trace_lock+0xac/0x490 [ 1467.287539] ? copy_page_range+0x24e9/0x3810 [ 1467.288124] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1467.288834] ? __lockdep_reset_lock+0x180/0x180 [ 1467.289460] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1467.290101] ? avc_has_extended_perms+0xf40/0xf40 [ 1467.290172] FAULT_INJECTION: forcing a failure. [ 1467.290172] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.290738] ? copy_process+0x2be1/0x78b0 [ 1467.290759] ? vm_area_alloc+0x110/0x110 [ 1467.290785] ? selinux_vm_enough_memory+0x114/0x180 [ 1467.290801] ? selinux_sb_statfs+0x250/0x250 [ 1467.290812] ? up_write+0x191/0x550 [ 1467.290832] ? percpu_counter_add_batch+0x8b/0x140 [ 1467.290856] ? __vm_enough_memory+0x184/0x360 [ 1467.290868] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1467.290887] copy_process+0x298b/0x78b0 [ 1467.290948] ? __cleanup_sighand+0xb0/0xb0 [ 1467.290991] ? _copy_from_user+0xfb/0x1b0 [ 1467.291018] kernel_clone+0xe7/0x980 [ 1467.291032] ? __lockdep_reset_lock+0x180/0x180 [ 1467.291050] ? create_io_thread+0xf0/0xf0 [ 1467.291083] ? ksys_write+0x21a/0x260 [ 1467.291098] ? lock_downgrade+0x6d0/0x6d0 [ 1467.291120] __do_sys_clone3+0x1e5/0x320 [ 1467.291134] ? __do_sys_clone+0x110/0x110 [ 1467.291176] ? rcu_read_lock_any_held+0x75/0xa0 [ 1467.291188] ? vfs_write+0x354/0xb10 [ 1467.291207] ? fput_many+0x2f/0x1a0 [ 1467.291221] ? ksys_write+0x1a9/0x260 [ 1467.291236] ? __ia32_sys_read+0xb0/0xb0 [ 1467.291257] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1467.291273] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1467.291285] ? trace_hardirqs_on+0x5b/0x180 [ 1467.291306] do_syscall_64+0x33/0x40 [ 1467.291321] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1467.291331] RIP: 0033:0x7fa1817f7b19 [ 1467.291345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1467.291353] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1467.291369] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1467.291378] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1467.291387] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1467.291396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1467.291404] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1467.320955] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1467.321565] CPU: 1 PID: 14217 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1467.336482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1467.338248] Call Trace: [ 1467.338820] dump_stack+0x107/0x167 [ 1467.339597] should_fail.cold+0x5/0xa [ 1467.340410] ? create_object.isra.0+0x3a/0xa30 [ 1467.341384] should_failslab+0x5/0x20 [ 1467.342190] kmem_cache_alloc+0x5b/0x310 [ 1467.343056] create_object.isra.0+0x3a/0xa30 [ 1467.343984] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1467.345068] kmem_cache_alloc+0x159/0x310 [ 1467.345956] vm_area_dup+0x78/0x290 [ 1467.346741] ? __lock_acquire+0xbb1/0x5b00 [ 1467.347659] ? perf_trace_lock+0xac/0x490 [ 1467.348536] ? SOFTIRQ_verbose+0x10/0x10 [ 1467.349407] ? __lockdep_reset_lock+0x180/0x180 [ 1467.350406] ? vm_area_alloc+0x110/0x110 [ 1467.351261] ? find_held_lock+0x2c/0x110 [ 1467.352125] ? get_mm_exe_file+0x139/0x310 [ 1467.353028] ? lock_downgrade+0x6d0/0x6d0 [ 1467.353909] ? down_write_nested+0xe4/0x160 [ 1467.354822] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1467.355900] ? get_mm_exe_file+0x162/0x310 [ 1467.356809] copy_process+0x298b/0x78b0 [ 1467.357655] ? SOFTIRQ_verbose+0x10/0x10 [ 1467.358554] ? __cleanup_sighand+0xb0/0xb0 [ 1467.359476] ? _copy_from_user+0xfb/0x1b0 [ 1467.360362] kernel_clone+0xe7/0x980 [ 1467.361160] ? __lockdep_reset_lock+0x180/0x180 [ 1467.362145] ? create_io_thread+0xf0/0xf0 [ 1467.363036] ? ksys_write+0x21a/0x260 [ 1467.363844] ? lock_downgrade+0x6d0/0x6d0 [ 1467.364724] __do_sys_clone3+0x1e5/0x320 [ 1467.365590] ? __do_sys_clone+0x110/0x110 [ 1467.366500] ? rcu_read_lock_any_held+0x75/0xa0 [ 1467.367486] ? vfs_write+0x354/0xb10 [ 1467.368275] ? fput_many+0x2f/0x1a0 [ 1467.369053] ? ksys_write+0x1a9/0x260 [ 1467.369858] ? __ia32_sys_read+0xb0/0xb0 [ 1467.370723] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1467.371841] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1467.372940] ? trace_hardirqs_on+0x5b/0x180 [ 1467.373861] do_syscall_64+0x33/0x40 [ 1467.374655] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1467.375742] RIP: 0033:0x7f4d52085b19 [ 1467.376533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1467.380443] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1467.382075] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1467.383581] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1467.385106] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1467.386621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1467.388133] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1467.396388] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1467.429630] SELinux: security_context_str_to_sid(sysadm_udefcontext=sysadm_u,) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x100000800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1467.452908] SELinux: security_context_str_to_sid(sysadm_udefcontext=sysadm_u,) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1467.513670] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 59) 15:26:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}, 0x41}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:26:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x101000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1467.547171] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1b0bd1f000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1467.569078] SELinux: security_context_str_to_sid(sysadm_uAdefcontext=sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1467.585085] FAULT_INJECTION: forcing a failure. [ 1467.585085] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.587612] CPU: 1 PID: 14333 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1467.588074] SELinux: security_context_str_to_sid(sysadm_uAdefcontext=sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1467.589099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1467.589107] Call Trace: [ 1467.589139] dump_stack+0x107/0x167 [ 1467.593489] should_fail.cold+0x5/0xa [ 1467.594305] ? anon_vma_clone+0xdc/0x590 [ 1467.595169] should_failslab+0x5/0x20 [ 1467.595981] kmem_cache_alloc+0x5b/0x310 [ 1467.596859] anon_vma_clone+0xdc/0x590 [ 1467.597700] anon_vma_fork+0x82/0x640 [ 1467.598508] ? __vm_enough_memory+0x184/0x360 [ 1467.599463] copy_process+0x72cd/0x78b0 [ 1467.600348] ? __cleanup_sighand+0xb0/0xb0 [ 1467.601275] ? _copy_from_user+0xfb/0x1b0 [ 1467.602170] kernel_clone+0xe7/0x980 [ 1467.602961] ? __lockdep_reset_lock+0x180/0x180 15:26:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1467.603945] ? create_io_thread+0xf0/0xf0 [ 1467.605005] ? ksys_write+0x21a/0x260 [ 1467.605817] ? lock_downgrade+0x6d0/0x6d0 [ 1467.606703] __do_sys_clone3+0x1e5/0x320 [ 1467.607566] ? __do_sys_clone+0x110/0x110 [ 1467.608477] ? rcu_read_lock_any_held+0x75/0xa0 [ 1467.609479] ? vfs_write+0x354/0xb10 [ 1467.610277] ? fput_many+0x2f/0x1a0 [ 1467.611053] ? ksys_write+0x1a9/0x260 [ 1467.611865] ? __ia32_sys_read+0xb0/0xb0 [ 1467.612739] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1467.613862] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1467.614953] ? trace_hardirqs_on+0x5b/0x180 [ 1467.615875] do_syscall_64+0x33/0x40 [ 1467.616672] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1467.617761] RIP: 0033:0x7fa1817f7b19 [ 1467.618554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1467.622455] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1467.624076] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1467.625607] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1467.627122] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1467.628637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1467.630163] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 [ 1467.643835] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1467.674997] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:52 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2100, 0x0}}], 0x324, 0x0) 15:26:52 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'sysadm_u'}}]}) 15:26:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 60) 15:26:52 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x200000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:52 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1483.231415] tmpfs: Unknown parameter 'defcontext"sysadm_u' 15:26:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2a3a2c653000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 15:26:52 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2300, 0x0}}], 0x324, 0x0) [ 1483.255134] tmpfs: Unknown parameter 'defcontext"sysadm_u' [ 1483.260844] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1483.262202] FAULT_INJECTION: forcing a failure. [ 1483.262202] name failslab, interval 1, probability 0, space 0, times 0 [ 1483.265407] CPU: 0 PID: 14454 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1483.266422] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1483.267576] Call Trace: [ 1483.267959] dump_stack+0x107/0x167 [ 1483.268482] should_fail.cold+0x5/0xa [ 1483.269035] ? vm_area_dup+0x78/0x290 [ 1483.269582] should_failslab+0x5/0x20 [ 1483.270128] kmem_cache_alloc+0x5b/0x310 [ 1483.270723] vm_area_dup+0x78/0x290 [ 1483.271267] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1483.271940] ? lock_downgrade+0x6d0/0x6d0 [ 1483.272543] ? copy_page_range+0x24e9/0x3810 [ 1483.273204] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1483.273873] ? avc_has_extended_perms+0xf40/0xf40 [ 1483.274582] ? vm_area_alloc+0x110/0x110 [ 1483.275161] ? find_held_lock+0x2c/0x110 [ 1483.275758] ? selinux_vm_enough_memory+0x114/0x180 [ 1483.276470] ? selinux_sb_statfs+0x250/0x250 [ 1483.277117] ? percpu_counter_add_batch+0x8b/0x140 [ 1483.277832] ? __vm_enough_memory+0x184/0x360 [ 1483.278466] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1483.279199] copy_process+0x298b/0x78b0 [ 1483.279758] ? SOFTIRQ_verbose+0x10/0x10 [ 1483.280376] ? __cleanup_sighand+0xb0/0xb0 [ 1483.281000] ? _copy_from_user+0xfb/0x1b0 [ 1483.281600] kernel_clone+0xe7/0x980 [ 1483.282133] ? __lockdep_reset_lock+0x180/0x180 [ 1483.282807] ? create_io_thread+0xf0/0xf0 [ 1483.283425] ? ksys_write+0x21a/0x260 [ 1483.283968] ? lock_downgrade+0x6d0/0x6d0 [ 1483.284568] __do_sys_clone3+0x1e5/0x320 [ 1483.285149] ? __do_sys_clone+0x110/0x110 [ 1483.285500] FAULT_INJECTION: forcing a failure. [ 1483.285500] name failslab, interval 1, probability 0, space 0, times 0 [ 1483.285767] ? rcu_read_lock_any_held+0x75/0xa0 [ 1483.288976] ? vfs_write+0x354/0xb10 [ 1483.289520] ? fput_many+0x2f/0x1a0 [ 1483.290039] ? ksys_write+0x1a9/0x260 [ 1483.290583] ? __ia32_sys_read+0xb0/0xb0 [ 1483.291152] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1483.291895] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1483.292622] ? trace_hardirqs_on+0x5b/0x180 [ 1483.293239] do_syscall_64+0x33/0x40 [ 1483.293772] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1483.294485] RIP: 0033:0x7f4d52085b19 [ 1483.295018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1483.297618] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1483.298700] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1483.299721] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1483.300739] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1483.301802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1483.302824] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1483.303853] CPU: 1 PID: 14462 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 1483.305590] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1483.307589] Call Trace: [ 1483.308237] dump_stack+0x107/0x167 [ 1483.309139] should_fail.cold+0x5/0xa [ 1483.310067] ? create_object.isra.0+0x3a/0xa30 [ 1483.311183] should_failslab+0x5/0x20 [ 1483.312105] kmem_cache_alloc+0x5b/0x310 [ 1483.313122] create_object.isra.0+0x3a/0xa30 [ 1483.314183] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1483.315406] kmem_cache_alloc+0x159/0x310 [ 1483.316421] anon_vma_clone+0xdc/0x590 [ 1483.317384] anon_vma_fork+0x82/0x640 [ 1483.318297] ? __vm_enough_memory+0x184/0x360 [ 1483.319376] copy_process+0x72cd/0x78b0 [ 1483.320379] ? __cleanup_sighand+0xb0/0xb0 [ 1483.321422] ? _copy_from_user+0xfb/0x1b0 [ 1483.322418] kernel_clone+0xe7/0x980 [ 1483.323299] ? __lockdep_reset_lock+0x180/0x180 [ 1483.324406] ? create_io_thread+0xf0/0xf0 [ 1483.325414] ? ksys_write+0x21a/0x260 [ 1483.326318] ? lock_downgrade+0x6d0/0x6d0 [ 1483.327320] __do_sys_clone3+0x1e5/0x320 [ 1483.328290] ? __do_sys_clone+0x110/0x110 [ 1483.329320] ? rcu_read_lock_any_held+0x75/0xa0 [ 1483.330424] ? vfs_write+0x354/0xb10 [ 1483.331311] ? fput_many+0x2f/0x1a0 [ 1483.332182] ? ksys_write+0x1a9/0x260 [ 1483.333095] ? __ia32_sys_read+0xb0/0xb0 [ 1483.334069] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1483.335299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1483.336505] ? trace_hardirqs_on+0x5b/0x180 [ 1483.337530] do_syscall_64+0x33/0x40 [ 1483.338406] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1483.339607] RIP: 0033:0x7fa1817f7b19 [ 1483.340476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1483.344774] RSP: 002b:00007fa17ed6d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1483.346571] RAX: ffffffffffffffda RBX: 00007fa18190af60 RCX: 00007fa1817f7b19 [ 1483.348255] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1483.349935] RBP: 00007fa17ed6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1483.351605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1483.353287] R13: 00007fffc404c34f R14: 00007fa17ed6d300 R15: 0000000000022000 15:26:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x553a5e7f8000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1483.378976] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:52 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'sysadm_u'}}]}) 15:26:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2001000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:52 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1483.478876] tmpfs: Bad value for 'defcontext' [ 1483.480462] tmpfs: Bad value for 'defcontext' 15:26:52 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0xf0ff1f}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:26:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) [ 1483.500735] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1483.514778] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:26:52 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x41, 'sysadm_u'}}]}) 15:26:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2020000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1483.581221] tmpfs: Unknown parameter 'defcontextAsysadm_u' [ 1483.588484] FAULT_INJECTION: forcing a failure. [ 1483.588484] name failslab, interval 1, probability 0, space 0, times 0 [ 1483.591225] CPU: 1 PID: 14609 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1483.592891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1483.594908] Call Trace: [ 1483.595568] dump_stack+0x107/0x167 [ 1483.596478] should_fail.cold+0x5/0xa [ 1483.597399] ? create_object.isra.0+0x3a/0xa30 [ 1483.598492] should_failslab+0x5/0x20 [ 1483.599404] kmem_cache_alloc+0x5b/0x310 [ 1483.600379] create_object.isra.0+0x3a/0xa30 [ 1483.601444] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1483.602662] kmem_cache_alloc+0x159/0x310 [ 1483.603656] vm_area_dup+0x78/0x290 [ 1483.604530] ? __lock_acquire+0xbb1/0x5b00 [ 1483.605560] ? perf_trace_lock+0xac/0x490 [ 1483.606553] ? SOFTIRQ_verbose+0x10/0x10 [ 1483.607514] ? __lockdep_reset_lock+0x180/0x180 [ 1483.608629] ? vm_area_alloc+0x110/0x110 [ 1483.609597] ? find_held_lock+0x2c/0x110 [ 1483.610569] ? get_mm_exe_file+0x139/0x310 [ 1483.611580] ? lock_downgrade+0x6d0/0x6d0 [ 1483.612559] ? down_write_nested+0xe4/0x160 [ 1483.613583] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1483.614795] ? get_mm_exe_file+0x162/0x310 [ 1483.615798] copy_process+0x298b/0x78b0 [ 1483.616722] ? SOFTIRQ_verbose+0x10/0x10 [ 1483.617723] ? __cleanup_sighand+0xb0/0xb0 [ 1483.618751] ? _copy_from_user+0xfb/0x1b0 [ 1483.619727] kernel_clone+0xe7/0x980 [ 1483.620594] ? __lockdep_reset_lock+0x180/0x180 [ 1483.621697] ? create_io_thread+0xf0/0xf0 [ 1483.622686] ? ksys_write+0x21a/0x260 [ 1483.623574] ? lock_downgrade+0x6d0/0x6d0 [ 1483.624548] __do_sys_clone3+0x1e5/0x320 [ 1483.625508] ? __do_sys_clone+0x110/0x110 [ 1483.626504] ? rcu_read_lock_any_held+0x75/0xa0 [ 1483.627592] ? vfs_write+0x354/0xb10 [ 1483.628466] ? fput_many+0x2f/0x1a0 [ 1483.629317] ? ksys_write+0x1a9/0x260 [ 1483.630202] ? __ia32_sys_read+0xb0/0xb0 [ 1483.631150] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1483.632355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1483.633551] ? trace_hardirqs_on+0x5b/0x180 [ 1483.634550] do_syscall_64+0x33/0x40 [ 1483.635409] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1483.636588] RIP: 0033:0x7f4d52085b19 [ 1483.637454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1483.641687] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1483.643433] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1483.645062] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1483.646683] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1483.648303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1483.649933] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1483.660661] tmpfs: Unknown parameter 'defcontextAsysadm_u' 15:27:06 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:06 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2200, 0x0}}], 0x324, 0x0) 15:27:06 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2302, 0x0}}], 0x324, 0x0) 15:27:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:06 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}, 0x22}]}) [ 1497.711747] SELinux: duplicate or incompatible mount options 15:27:06 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) 15:27:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:06 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1497.746251] SELinux: duplicate or incompatible mount options [ 1497.766491] FAULT_INJECTION: forcing a failure. [ 1497.766491] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.768985] CPU: 0 PID: 14706 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1497.770513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1497.772316] Call Trace: [ 1497.772905] dump_stack+0x107/0x167 [ 1497.773728] should_fail.cold+0x5/0xa [ 1497.774573] ? anon_vma_clone+0xdc/0x590 [ 1497.775466] should_failslab+0x5/0x20 [ 1497.776306] kmem_cache_alloc+0x5b/0x310 [ 1497.777221] anon_vma_clone+0xdc/0x590 [ 1497.777456] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1497.778102] anon_vma_fork+0x82/0x640 [ 1497.780905] ? __vm_enough_memory+0x184/0x360 [ 1497.781946] copy_process+0x72cd/0x78b0 [ 1497.782810] ? SOFTIRQ_verbose+0x10/0x10 [ 1497.783777] ? __cleanup_sighand+0xb0/0xb0 [ 1497.784745] ? _copy_from_user+0xfb/0x1b0 [ 1497.785683] kernel_clone+0xe7/0x980 [ 1497.786492] ? __lockdep_reset_lock+0x180/0x180 [ 1497.787507] ? create_io_thread+0xf0/0xf0 [ 1497.788445] ? ksys_write+0x21a/0x260 [ 1497.789282] ? lock_downgrade+0x6d0/0x6d0 [ 1497.790197] __do_sys_clone3+0x1e5/0x320 [ 1497.791087] ? __do_sys_clone+0x110/0x110 [ 1497.792035] ? rcu_read_lock_any_held+0x75/0xa0 [ 1497.793042] ? vfs_write+0x354/0xb10 [ 1497.793869] ? fput_many+0x2f/0x1a0 [ 1497.794647] ? ksys_write+0x1a9/0x260 [ 1497.795479] ? __ia32_sys_read+0xb0/0xb0 [ 1497.796374] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1497.797524] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1497.798644] ? trace_hardirqs_on+0x5b/0x180 [ 1497.799580] do_syscall_64+0x33/0x40 [ 1497.800395] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1497.801504] RIP: 0033:0x7f4d52085b19 [ 1497.802313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1497.806299] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1497.807959] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1497.809511] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1497.811059] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1497.812606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1497.814165] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1497.818110] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:27:06 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}, 0x41}]}) 15:27:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000001000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1497.944917] SELinux: duplicate or incompatible mount options [ 1497.947117] SELinux: duplicate or incompatible mount options 15:27:06 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:27:06 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10100000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1498.040493] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:27:06 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1498.080771] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:27:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1498.112641] SELinux: duplicate or incompatible mount options [ 1498.129515] SELinux: duplicate or incompatible mount options 15:27:07 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1498.244092] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1498.268321] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:27:24 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2304, 0x0}}], 0x324, 0x0) 15:27:24 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2300, 0x0}}], 0x324, 0x0) 15:27:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x8000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x11, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) 15:27:24 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x2}) 15:27:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:24 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1515.371961] FAULT_INJECTION: forcing a failure. [ 1515.371961] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.374475] CPU: 0 PID: 14950 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1515.374556] SELinux: duplicate or incompatible mount options [ 1515.375903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.375912] Call Trace: [ 1515.375940] dump_stack+0x107/0x167 [ 1515.375972] should_fail.cold+0x5/0xa [ 1515.380914] ? create_object.isra.0+0x3a/0xa30 [ 1515.381876] should_failslab+0x5/0x20 [ 1515.382664] kmem_cache_alloc+0x5b/0x310 [ 1515.383515] create_object.isra.0+0x3a/0xa30 [ 1515.384417] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1515.385261] SELinux: duplicate or incompatible mount options [ 1515.385468] kmem_cache_alloc+0x159/0x310 [ 1515.385510] anon_vma_clone+0xdc/0x590 [ 1515.388333] anon_vma_fork+0x82/0x640 [ 1515.389117] ? __vm_enough_memory+0x184/0x360 [ 1515.390061] copy_process+0x72cd/0x78b0 [ 1515.390866] ? SOFTIRQ_verbose+0x10/0x10 [ 1515.391768] ? __cleanup_sighand+0xb0/0xb0 [ 1515.392683] ? _copy_from_user+0xfb/0x1b0 [ 1515.393564] kernel_clone+0xe7/0x980 [ 1515.394326] ? __lockdep_reset_lock+0x180/0x180 [ 1515.395288] ? create_io_thread+0xf0/0xf0 [ 1515.396167] ? ksys_write+0x21a/0x260 [ 1515.396951] ? lock_downgrade+0x6d0/0x6d0 [ 1515.397823] __do_sys_clone3+0x1e5/0x320 [ 1515.398640] ? __do_sys_clone+0x110/0x110 [ 1515.399535] ? rcu_read_lock_any_held+0x75/0xa0 [ 1515.400474] ? vfs_write+0x354/0xb10 [ 1515.401250] ? fput_many+0x2f/0x1a0 [ 1515.402008] ? ksys_write+0x1a9/0x260 [ 1515.402791] ? __ia32_sys_read+0xb0/0xb0 [ 1515.403618] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.404675] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.405738] ? trace_hardirqs_on+0x5b/0x180 [ 1515.406646] do_syscall_64+0x33/0x40 [ 1515.407419] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.408472] RIP: 0033:0x7f4d52085b19 [ 1515.409231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.412878] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1515.414400] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1515.415807] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1515.417390] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.418872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1515.420328] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1515.427708] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1515.463983] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:27:24 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x3}) 15:27:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x30652c3a2a0000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:24 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1515.563597] SELinux: duplicate or incompatible mount options [ 1515.586080] SELinux: duplicate or incompatible mount options 15:27:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x10000200}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) 15:27:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x807f5e3a550000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:24 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x4}) [ 1515.676069] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1515.714575] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1515.730730] FAULT_INJECTION: forcing a failure. [ 1515.730730] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.733121] CPU: 1 PID: 15131 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1515.734586] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.736342] Call Trace: [ 1515.736924] dump_stack+0x107/0x167 [ 1515.737711] should_fail.cold+0x5/0xa [ 1515.738506] ? anon_vma_fork+0xf1/0x640 [ 1515.739352] should_failslab+0x5/0x20 [ 1515.740162] kmem_cache_alloc+0x5b/0x310 [ 1515.741010] anon_vma_fork+0xf1/0x640 [ 1515.741795] ? __vm_enough_memory+0x184/0x360 [ 1515.742455] SELinux: duplicate or incompatible mount options [ 1515.742747] copy_process+0x72cd/0x78b0 [ 1515.742776] ? SOFTIRQ_verbose+0x10/0x10 [ 1515.745511] ? __cleanup_sighand+0xb0/0xb0 [ 1515.746455] ? _copy_from_user+0xfb/0x1b0 [ 1515.747341] kernel_clone+0xe7/0x980 [ 1515.748136] ? __lockdep_reset_lock+0x180/0x180 [ 1515.749112] ? create_io_thread+0xf0/0xf0 [ 1515.749999] ? ksys_write+0x21a/0x260 [ 1515.750785] ? lock_downgrade+0x6d0/0x6d0 [ 1515.751639] __do_sys_clone3+0x1e5/0x320 [ 1515.752254] SELinux: duplicate or incompatible mount options [ 1515.752505] ? __do_sys_clone+0x110/0x110 [ 1515.752558] ? rcu_read_lock_any_held+0x75/0xa0 [ 1515.755313] ? vfs_write+0x354/0xb10 [ 1515.756088] ? fput_many+0x2f/0x1a0 [ 1515.756843] ? ksys_write+0x1a9/0x260 [ 1515.757633] ? __ia32_sys_read+0xb0/0xb0 [ 1515.758532] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.759656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.760760] ? trace_hardirqs_on+0x5b/0x180 [ 1515.761662] do_syscall_64+0x33/0x40 [ 1515.762459] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.763565] RIP: 0033:0x7f4d52085b19 [ 1515.764366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.768158] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1515.769774] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1515.771303] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1515.772831] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.774390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1515.775872] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:27:39 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2310, 0x0}}], 0x324, 0x0) 15:27:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:39 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2302, 0x0}}], 0x324, 0x0) [ 1530.949406] SELinux: duplicate or incompatible mount options [ 1530.955093] SELinux: duplicate or incompatible mount options 15:27:39 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x5}) 15:27:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0d10b1b000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x11000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:27:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) [ 1530.988789] FAULT_INJECTION: forcing a failure. [ 1530.988789] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.991280] CPU: 1 PID: 15206 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1530.992750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1530.994488] Call Trace: [ 1530.995057] dump_stack+0x107/0x167 [ 1530.995823] should_fail.cold+0x5/0xa [ 1530.996663] ? create_object.isra.0+0x3a/0xa30 [ 1530.997094] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1530.997674] should_failslab+0x5/0x20 [ 1530.997695] kmem_cache_alloc+0x5b/0x310 [ 1530.997729] create_object.isra.0+0x3a/0xa30 [ 1531.002368] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1531.003477] kmem_cache_alloc+0x159/0x310 [ 1531.004387] anon_vma_fork+0xf1/0x640 [ 1531.005212] ? __vm_enough_memory+0x184/0x360 [ 1531.006203] copy_process+0x72cd/0x78b0 [ 1531.007066] ? SOFTIRQ_verbose+0x10/0x10 [ 1531.007979] ? __cleanup_sighand+0xb0/0xb0 [ 1531.008936] ? _copy_from_user+0xfb/0x1b0 [ 1531.009844] kernel_clone+0xe7/0x980 [ 1531.010640] ? __lockdep_reset_lock+0x180/0x180 [ 1531.011626] ? create_io_thread+0xf0/0xf0 [ 1531.012521] ? ksys_write+0x21a/0x260 [ 1531.013315] ? lock_downgrade+0x6d0/0x6d0 [ 1531.014202] __do_sys_clone3+0x1e5/0x320 [ 1531.015063] ? __do_sys_clone+0x110/0x110 [ 1531.015980] ? rcu_read_lock_any_held+0x75/0xa0 [ 1531.016955] ? vfs_write+0x354/0xb10 [ 1531.017747] ? fput_many+0x2f/0x1a0 [ 1531.018523] ? ksys_write+0x1a9/0x260 [ 1531.019322] ? __ia32_sys_read+0xb0/0xb0 [ 1531.020183] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1531.021283] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1531.022392] ? trace_hardirqs_on+0x5b/0x180 [ 1531.023315] do_syscall_64+0x33/0x40 [ 1531.024104] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1531.025184] RIP: 0033:0x7f4d52085b19 [ 1531.025976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1531.028224] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1531.029876] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1531.029899] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1531.029910] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1531.029922] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1531.029933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1531.029954] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:27:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0ff1f00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:39 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x6}) 15:27:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:27:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1ffff000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1531.229401] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:27:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1531.237857] SELinux: duplicate or incompatible mount options [ 1531.256604] SELinux: duplicate or incompatible mount options [ 1531.276750] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:27:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}], 0x7}) [ 1531.448405] SELinux: duplicate or incompatible mount options [ 1531.463768] SELinux: duplicate or incompatible mount options 15:27:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) 15:27:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:27:55 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2304, 0x0}}], 0x324, 0x0) 15:27:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:55 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6e7465e85a70743d73797361646d5f6b2c646566636f6e756578743d73797343646d5f75"]) mknodat$loop(r0, &(0x7f0000000000)='./file0/file0\x00', 0x1000, 0x0) 15:27:55 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2400, 0x0}}], 0x324, 0x0) 15:27:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x400000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1546.314009] tmpfs: Unknown parameter 'conteèZpt' [ 1546.320155] tmpfs: Unknown parameter 'conteèZpt' [ 1546.323409] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1546.340690] FAULT_INJECTION: forcing a failure. [ 1546.340690] name failslab, interval 1, probability 0, space 0, times 0 [ 1546.343425] CPU: 0 PID: 15472 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1546.345019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1546.346922] Call Trace: [ 1546.347539] dump_stack+0x107/0x167 [ 1546.347661] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1546.348388] should_fail.cold+0x5/0xa [ 1546.350370] ? anon_vma_fork+0x1ff/0x640 [ 1546.351310] should_failslab+0x5/0x20 [ 1546.352193] kmem_cache_alloc+0x5b/0x310 [ 1546.353148] anon_vma_fork+0x1ff/0x640 [ 1546.354076] copy_process+0x72cd/0x78b0 [ 1546.354992] ? SOFTIRQ_verbose+0x10/0x10 [ 1546.356001] ? __cleanup_sighand+0xb0/0xb0 [ 1546.357018] ? _copy_from_user+0xfb/0x1b0 [ 1546.358007] kernel_clone+0xe7/0x980 [ 1546.358864] ? __lockdep_reset_lock+0x180/0x180 [ 1546.359938] ? create_io_thread+0xf0/0xf0 [ 1546.360923] ? ksys_write+0x21a/0x260 [ 1546.361810] ? lock_downgrade+0x6d0/0x6d0 [ 1546.362780] __do_sys_clone3+0x1e5/0x320 [ 1546.363715] ? __do_sys_clone+0x110/0x110 [ 1546.364712] ? rcu_read_lock_any_held+0x75/0xa0 [ 1546.365794] ? vfs_write+0x354/0xb10 [ 1546.366660] ? fput_many+0x2f/0x1a0 [ 1546.367721] ? ksys_write+0x1a9/0x260 [ 1546.368608] ? __ia32_sys_read+0xb0/0xb0 [ 1546.369545] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1546.370779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1546.371950] ? trace_hardirqs_on+0x5b/0x180 [ 1546.372948] do_syscall_64+0x33/0x40 [ 1546.373811] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1546.374975] RIP: 0033:0x7f4d52085b19 [ 1546.375827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1546.380037] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1546.381808] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1546.383456] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1546.385093] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1546.386741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1546.388370] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:27:55 executing program 7: sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x12a8, 0x7, 0xa, 0x3, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFTA_RULE_COMPAT={0x1c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x60}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x84}]}, @NFTA_RULE_EXPRESSIONS={0x1010, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@flow_offload={{0x11}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}}]}, {0x164, 0x1, 0x0, 0x1, [@target={{0xb}, @val={0x110, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0xf4, 0x3, "62af92a9a313ffb3735f6789431ddf54e01b0c84b0a68959c4520f0caceba76905a8ec6475d89e47ca8a76a477c7f56a89072c30b80d71f2d98d34202c14140132aa46c25019003451687ed6129c5571ebe8e480884c05b8601d6af4e9bfe4e78973b2db4f31eb54a62a9b801f89a9279caed888cef983123b8c3f8de2a2f8f8eed66b6f4d7a367c23a20ba4ee159806e76648bff21e5f48077fe283c0c24213b3a5824dc82bcf5208e97dfa189f5ca53be34931652fd1741dc9f56248314f202aeaaec2640679e61be0cbb557633609558d19bf317f61ac33ca177551e79df9e39d035f380352f91222a5d3cf38fc8b"}, @NFTA_TARGET_NAME={0x6, 0x1, '-\x00'}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x702}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x7}]}}, @osf={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_OSF_FLAGS={0x8}]}}, @xfrm={{0x9}, @void}, @masq={{0x9}, @void}]}, {0xbac, 0x1, 0x0, 0x1, [@immediate={{0xe}, @val={0xb78, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x2a4, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0xff, 0x1, "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"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x102, 0x1, "2a84deb64f7a0fd9f9479c9244dc2e060d73473296d779e5646b65356ff7a6c952cb7461bf9c10dfab801ef10271204914b68729195173bb0480c40672369728007f608a536863c197e6297dfff130cadcfb1f200cc2cb27000b38a6adc5f9dbfd3a6f5aa0c7179697f309c821f32de3b65a048f92dfbae397541f558d47ada1811f15401ce19a0c70ab6c189ea2d1db484a0a3a69f6eb9d4973fe65fd42edcd16adb2fce9f6dd5a14da224bde138f50e2bebce80d275c63a8f7bcbd9086ac5bad9dd41681d734c292680e54988b2448dee9c2221832917ddcbe054ecfa62784418525aded977774c23f60c0f28eec4c2e9a3087ee585b1d364f588f4bc2"}, @NFTA_DATA_VALUE={0x67, 0x1, "5a45b5456b78f973bdb79b50c2dfa9762474d44bf822534d837d2134cbc173d1e7f0c7bf0825d15a3d479b0988b2abb9d11f1d111fc68419def392d301112cca1924913f0f94b27d77e759efd5fec06aa753d4753dfc15f2aad3555d4fbd78f6659fbd"}]}, @NFTA_IMMEDIATE_DATA={0x2d8, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd9, 0x1, "ad05b21f552dc09f369601e193318e90436aaea6b8a0277f3dabc5199954793d79fa91a3ec40a90b0866517aa7628b1adb95896e55ea31010b2c59f1d9df7d7e2f1bcb790fefe01d39d3650e246708a925cb51e9d53388e5e5a7c5f623823f888be53b717debcc62d5610549e9c091b44d3f279b9b39c6eb581132482fbb770cf0badf14e23a21bc36d65660d3a7a8dfa405eb3fdeac0624a6e2afe81814aeb46a8d8461ce1408ed77ac10101588e5a5c7d9bf259586a2bfcf809f661815cc3b18865a4ebe156cb42b542f99005b7acac230879b43"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xfd, 0x1, "5d83089bac2c53e68473b3b40fe4b72dcdbdd98e59ced9d963d096f00ecedf8521241b584dd0815583ab44376da1c3ff01adde913908222aa7e815b95cbb2162bc21eb86afe25c419ad3dac8cd62f4648327d28808588145835eab3be757549656f569a7b8f252cdd61aecd9d0e3e310a6e2eae55bc793f1dbc20c39b7aa0ccc6d87a73b73ee7298a4a155c9a8c7d57eee97397a7403d724310a9befb6351238e4adc4515554201545692a08dab1bd6ff614430815eae5b1b66564c8b22c47a387a4c2e136685c43c5b283cbeb64b823607c16420f383559f372a8c8df0c51a37144a80d9f26c7ea5a9bf2e9061dd1c38155cd741ee21be52e"}, @NFTA_DATA_VALUE={0xe6, 0x1, "b97a407bfbd8377d7bdf20e381dfc0619664d57c7b5963c8a3a8631d29d984b80325ef102612d6f00da5254367d7ff959e8d47f57695946c8bdd3556fe088dbfd51fc732f86f2d9bf62bb915e0d3804d617151d369fe973b4c169894446f21366aa17f3cc432dbaddf9441d7a2a187150d4d79d443834422339dacc7f28bf03910d0461981e73c5ac5806b0577e75e63acf4edc553008c88c712e21b4f5a4bb31627f99fa0cbeeab39b04ce53178258afc6ae6b8f1aa462d0092c49946d454c0ac4f134d176d230e4cb9608a2f199b027b2b6d8a69a62d8bde834d3e69075de2a3f0"}]}, @NFTA_IMMEDIATE_DATA={0x168, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xeb, 0x1, "ef7aa78a695c9cb940e7558262668bacc91aff0be43d8ca4ca7eb6c28d0d9aaf3df0688fbf9ee75dabc050922a948a7005408f769e524c298c6a7951894e2af7e9fe193fa6e4bf90c678ef05dae13dc9c226beab0b417249a52e94c705a8f78785a4d0b1f88b55a7b5a418f768493d908d247aaae479ed8096517ebfc0ca4da329274e03287b0e96930bb511af2a32e570800c363168d121140499a6dee2e335944eef3bbeafd752890a6602ad9625613309c020cde07375355dce229aecaae8b24fb0363dfa82a8f84d342e975b87cd89cdbbe0f2d48d70e3fd14041a7f9d6a2ab764678f3af9"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x2c, 0x1, "45a28eb02f6c27f2d64cdc8593ef3382801dc507041545ad5f76d4be64eff3b5945b61c2c36cc431"}]}, @NFTA_IMMEDIATE_DATA={0xd8, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0xce, 0x1, "43e793e94001d8b6902cc014c3bdb0faa810685e4bf273862edf3320f7184bca1d51efbadf8061f546e45ff52723def42628e12a73f338a2206d83195a36f39209e5061e997d26df67b6808f76db35e0ecc254240f02f1a74780240092bbc376f8e2806a3271a14a720d71aae4bb2e311a09e9b952b67abfb584a52dc8706ffd28559fda085ac61711b40630b1b0e272295a63c835aea8bbe1e539c69555143d81a13ed25d5dc826a98ae0e0d8129b287132e4f403c9dbca09b625582e9fe5b8109ba7fe1d72f01f5838"}]}, @NFTA_IMMEDIATE_DATA={0x220, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x70, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x15, 0x1, "53c039b7ddf3a2546ea962d50c712be82c"}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x46, 0x1, "dd5788f0f1006102554c3f7c0ffcf0fdfb1e86c21303171eb4db870bae66f5fc15514e039205bb4440118165617a6a4744af869d7ff00da7fb32d6b735acfa360837"}, @NFTA_DATA_VALUE={0x1a, 0x1, "9344a8fd531f92d819e7ddc0f6c32f0b313e4faa94a7"}, @NFTA_DATA_VALUE={0x2e, 0x1, "a06af79638f3450bf8eb19908ec2d0580ec628ed4575ca75b18c57da19c7cda41f4a1280f6fca72ac006"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_IMMEDIATE_DATA={0x188, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x94, 0x1, "0c9034b4a516a5f3d63cacb1a2a50640bab25449a32ffb3c6ccbe01a70e57fd6da94edd085ac3a75c7fb533351939eaca5c58844747fda5b9c59a1798ccd7c69eddef736a27258f1f494d04288434acdb13dbdaaf6d78dc47b35d1adbd00086884b3c55f874f08e1b860e2b70911150986fef05f82254a61c353356bcee5fc587a70dc1febe7963ae8aeacccb8ae4624"}, @NFTA_DATA_VALUE={0xf0, 0x1, "9c2b39b3507849f9c3cd5360759deebc96dd0655abed57ef4a52f5d5088326624cf74cc1e82e3677f5a82d271c5db6978d1cbfecc5e88c9142e81e7ba88f0f52ed46f117839e3ba3dd70fd24dff9ca93db86ded2b6c4287d598e07c258563999168c87e762417f12907fc84de05da7521446c50cc8d2605175a956561cd770757486582f6e793c255763f13928a21f81543d5d3d2393e3d97edc60cecf618ed9dcde27f1d744a4d529eaf43be35b01db106d61b8f3f912e9b9158656b9f18aa68eb51d44412f646907d6fe1cedc67d5118e5b15c0396be10c1411f61a668b4f6f86ab7c4d20e9f352764b695"}]}]}}, @reject={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x2}]}}]}, {0x220, 0x1, 0x0, 0x1, [@reject={{0xb}, @void}, @target={{0xb}, @val={0x11c, 0x2, 0x0, 0x1, [@NFTA_TARGET_NAME={0x9, 0x1, '!]([\x00'}, @NFTA_TARGET_INFO={0x2f, 0x3, "d13039d58352b2adde6bc37ecba4d0d1536a83dd23f957979ccd8e9673abe39e0f47b4598bf4009b13bfdc"}, @NFTA_TARGET_INFO={0xa2, 0x3, "36051577e911b3fe6a48dd25718a43cecf73e18802e51141aff0ac32c9f78a68ee614e07f100043656b13e34a2296acc2e67eab5f9f99a1c0b015d6da564d07a848a8ed61933c1f5c3daf468c4411bd4f9fa82fdd7cea9ff4b594713808b7ac5a5bb0b5e08309965f1c9f5e3d56ba9c188536590f5788d85b09177737b3ee69cd60c322c14ef6bc0660af823a13ee2cc293ed9060351e43aeea1c4c488e3"}, @NFTA_TARGET_NAME={0x9, 0x1, ':\\^%\x00'}, @NFTA_TARGET_INFO={0x2c, 0x3, "28b518196d9c0474d560e8a371ec5912524e48ae51be6463cb9582d1672abe8621beb37aa4d141ad"}]}}, @ct={{0x7}, @void}, @tunnel={{0xb}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xe}]}}, @range={{0xa}, @val={0x8c, 0x2, 0x0, 0x1, [@NFTA_RANGE_OP={0x8}, @NFTA_RANGE_TO_DATA={0x30, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}, @NFTA_RANGE_OP={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_RANGE_SREG={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_RANGE_TO_DATA={0x40, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}]}}]}, {0x94, 0x1, 0x0, 0x1, [@dup={{0x8}, @void}, @counter={{0xc}, @void}, @ct={{0x7}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CT_DIRECTION={0x5, 0x3, 0x1}]}}, @quota={{0xa}, @val={0x5c, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x40}, @NFTA_QUOTA_FLAGS={0x8}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x327e}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0xfffffffffffffff9}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x40}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x8}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x1}]}}]}, {0x20, 0x1, 0x0, 0x1, [@ct={{0x7}, @void}, @flow_offload={{0x11}, @void}]}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x244, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@osf={{0x8}, @void}, @meta={{0x9}, @val={0x4}}]}, {0x224, 0x1, 0x0, 0x1, [@ct={{0x7}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xe3bbad5fbccb5a39}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0xd}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x11}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x4}]}}, @cmp={{0x8}, @val={0x140, 0x2, 0x0, 0x1, [@NFTA_CMP_DATA={0x134, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x8a, 0x1, "e07fbe9533a0b36d9b878ab433e95ba03b83c6a96bfc2d291664fa1ca069336547d3a52bd40f43f88b69b3f2583a2e0a9ad402412830bbf6c53562b0cfba1c2edc6b456fefeaee55ee2e976700d591771cf3e7cbe2566e57075f937dbcd9ca45fc8c35c78c4601d67d214c4da44abf6ebce75a5f3a8a3910fd166e7a70038ddb0b3862fb8423"}, @NFTA_DATA_VALUE={0xa2, 0x1, "48b128cb8138c2cb338bc4ba690e67fe9d6e92e2e0938651ab1e5d4abd55021167678f2effe324ee7e08cde8f4332f197c279c81e910325b3938f109027f9943ba23c82362c3cd02e7f34d6c64f4dae90a659baec4ff255582b2a72bcab1f5b27cb3c1ecb7b410c2b68a1b21689ef7c2fb29b35b5ebefa1f1fcae25b1197f92360519c1204977253f576d2bc996a238564286f6ceaf16e897c90577a2331"}]}, @NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0xd}]}}, @payload={{0xc}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_PAYLOAD_SREG={0x8, 0x5, 0x1, 0x0, 0xb}, @NFTA_PAYLOAD_CSUM_TYPE={0x8, 0x6, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_CSUM_OFFSET={0x8, 0x7, 0x1, 0x0, 0x3f}, @NFTA_PAYLOAD_CSUM_TYPE={0x8, 0x6, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0xfff}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0x100000}]}}, @queue={{0xa}, @void}, @redir={{0xa}, @void}, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", "", ""]}}, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x2}]}}]}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}]}, 0x12a8}, 0x1, 0x0, 0x0, 0x4}, 0x8000) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:27:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:27:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1546.420133] SELinux: duplicate or incompatible mount options 15:27:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x3f000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1546.452874] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:27:55 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x1001, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000001c0)=0x6e) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) [ 1546.465819] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:27:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x800000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:10 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x230f, 0x0}}], 0x324, 0x0) 15:28:10 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2403, 0x0}}], 0x324, 0x0) 15:28:10 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="630f6e746578743d73797361646d5f752c646566636f6e746578743d73797361646d5f752c6d61736b3d5e4d41595f524541441921d7c0ffa5be2c757569e43d34613238666535312d656265612d333862052d316638332d0034316231"]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x5, &(0x7f0000000440)=[{&(0x7f0000000180)="d8a80bdcabef57ba4af27365c6869be319feea99addb0dc12a79423b93fe7d7f34d45eaa49ea0b4e0ea6ab7662de6dd2efe7bc93c86fc202e5b3744f564d37dbb8ba8c0875f6bf22097b728b0679dbee3da6360d52e925c88e4a4d31202b4dd312fe5c5e1a30a0264827d03df965c47d975183821174f2018c62bc4835e0d9e2f3990a7f63ad8f21762e336b74fa36c67a083ac9c12cde76fd162da15ff2c88d6b28544f0668a0d3332b3888fdb3d4869c2e745aff", 0xb5, 0x7}, {&(0x7f0000000240)="28778a4eebef9a3587308cc66c9c8cc685a2c6ecb5dee8748426fbe502d787aca75567cff0460947fa8b56fb79c537c759d950314587554d2aae814aa723ffdcce1d8243dd31c91aa6191c0f133c8ba93321ca26b7d874f96b5a68dd9de84a6a77d34af5bb3800add0c9a68339a5e3ed9f84651dea68571b", 0x78, 0x8}, {&(0x7f00000002c0)="99c0492cc54fb5ef3449c30e25ccacb8e95ed46315b309a1c1f621d9b3f800ae1746570c882db8f6c75dbe118ca3614f1daebc3b33b3b47a5e75360f2d5597ed2dc1bb225000f128e94294c062bbb8efe61d4dcb918609c194da91dc21899d9afe826213877ad4b3f824d8c476477b746c377ef304333f2764878fb904a8467042edbc4f06eb545d8d3b690f", 0x8c, 0xc69}, {&(0x7f0000000380)="f4808c2a3d843595aea119125aae45aaee489a2fc878ac4f960c401e205a38bb1ba135231a7cc6330eadda7d875c8a82db7f68ed5cd49882d0e174e09c33819f8b9d2e8853769e692e29a6b70a093b8a9b2eae3f026a74e03c5e6da7856c44161f9f03", 0x63, 0xa1}, {&(0x7f0000000400)="c05b261c8f2714", 0x7, 0x1ff}], 0x200000, &(0x7f00000004c0)={[{@gid={'gid', 0x3d, 0xee00}}, {@huge_always}], [{@fsmagic={'fsmagic', 0x3d, 0x3a}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x61, 0x35, 0x62, 0x31, 0x55], 0x2d, [0x38, 0x32, 0x33, 0x39], 0x2d, [0x31, 0x0, 0x39, 0x35], 0x2d, [0x32, 0x4, 0x38, 0x54], 0x2d, [0x65, 0x64, 0x33, 0x61, 0x35, 0x38, 0x61, 0x35]}}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsname={'fsname', 0x3d, 'tmpfs\x00'}}, {@audit}, {@uid_gt={'uid>', r0}}]}) 15:28:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x40000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:10 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:28:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) [ 1562.173005] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1562.180630] tmpfs: Unknown parameter 'cntext' [ 1562.190667] FAULT_INJECTION: forcing a failure. [ 1562.190667] name failslab, interval 1, probability 0, space 0, times 0 [ 1562.193156] CPU: 1 PID: 15704 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1562.194617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1562.196360] Call Trace: [ 1562.196924] dump_stack+0x107/0x167 [ 1562.197694] should_fail.cold+0x5/0xa [ 1562.198517] ? create_object.isra.0+0x3a/0xa30 [ 1562.199479] should_failslab+0x5/0x20 [ 1562.200282] kmem_cache_alloc+0x5b/0x310 [ 1562.201147] create_object.isra.0+0x3a/0xa30 [ 1562.202084] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1562.203162] kmem_cache_alloc+0x159/0x310 [ 1562.204047] anon_vma_fork+0x1ff/0x640 [ 1562.204884] copy_process+0x72cd/0x78b0 [ 1562.205724] ? SOFTIRQ_verbose+0x10/0x10 [ 1562.206629] ? __cleanup_sighand+0xb0/0xb0 [ 1562.207546] ? _copy_from_user+0xfb/0x1b0 [ 1562.208434] kernel_clone+0xe7/0x980 [ 1562.209226] ? __lockdep_reset_lock+0x180/0x180 [ 1562.209292] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1562.210215] ? create_io_thread+0xf0/0xf0 [ 1562.210258] ? ksys_write+0x21a/0x260 [ 1562.213890] ? lock_downgrade+0x6d0/0x6d0 [ 1562.214782] __do_sys_clone3+0x1e5/0x320 [ 1562.215635] ? __do_sys_clone+0x110/0x110 [ 1562.216537] ? rcu_read_lock_any_held+0x75/0xa0 [ 1562.217509] ? vfs_write+0x354/0xb10 [ 1562.218300] ? fput_many+0x2f/0x1a0 [ 1562.219063] ? ksys_write+0x1a9/0x260 [ 1562.219864] ? __ia32_sys_read+0xb0/0xb0 [ 1562.220720] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1562.221825] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1562.222916] ? trace_hardirqs_on+0x5b/0x180 [ 1562.223826] do_syscall_64+0x33/0x40 [ 1562.224613] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1562.225688] RIP: 0033:0x7f4d52085b19 [ 1562.226487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1562.230374] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1562.231979] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1562.233479] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1562.234986] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1562.236494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1562.238003] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:28:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:11 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6d706f6c3d64656661756c743d72656c61746976652c687567653d77697468696e5f73697a652c6e725f696e6f6465733d6738072c636f6e746578743d73797361446d5f752c649f66636f6e746578743d73797361646d5f752c001238e16cdefce455f1591f6c10d9117d07f17f3e92abfda409eb00d73926627b9950a83d1ba37deeca49861535089e2ba62e875fa05e3f844aef0fe24e32dea197dadaf114d8e24b1750e34d3d89e4d8c817fa8e9dba13acf0d72bfa057f6252ff03660b08125842b45700387830253570a97d22fdeba4"]) 15:28:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4, 0x0, 0x0}, 0x58) 15:28:11 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1562.400242] tmpfs: Unsupported parameter 'huge' [ 1562.409923] tmpfs: Unsupported parameter 'huge' 15:28:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1562.434479] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:28:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1562.467809] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:28:11 executing program 7: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000180)="90becd621e82f5aef5c38f16bfb8a46c61b5a471bad8a63eb93080e7c4f93f70c66b85deb0e30794707c6339da831deda5895e3dff1c80afa47261efa8156e8f2b2b92afff9c8bddb134e18fb4dd6067901284863a21d84845551e0820b7457c820ac6dfbffd17ed5b3e929ba1cc43a7a56ed000b8b0c8640bb1c28df0823d4c4a55438b7afa", 0x3, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r1) keyctl$unlink(0x9, r1, r0) r2 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000002c0)="07287c0af095f645ab49d0b10fc9c645fd77f02646af6f612b8061d5237d9b037fdd66a99ddb66834415ea53730056cf5b82b3556fede56c6674bb088d2870b8c0257c624ed1563bbbae61635cd22a916488f3", 0x53, 0xfffffffffffffffd) keyctl$revoke(0x3, r2) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:28:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) [ 1562.592708] SELinux: duplicate or incompatible mount options [ 1562.607799] SELinux: duplicate or incompatible mount options [ 1562.669553] FAULT_INJECTION: forcing a failure. [ 1562.669553] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1562.672967] CPU: 1 PID: 15919 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1562.674891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1562.677181] Call Trace: [ 1562.677920] dump_stack+0x107/0x167 [ 1562.678956] should_fail.cold+0x5/0xa [ 1562.680035] __alloc_pages_nodemask+0x182/0x600 [ 1562.681336] ? __lockdep_reset_lock+0x180/0x180 [ 1562.682650] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1562.684353] ? copy_page_range+0x28e1/0x3810 [ 1562.685589] alloc_pages_current+0x187/0x280 [ 1562.686835] get_zeroed_page+0x14/0xb0 [ 1562.687923] __pud_alloc+0x33/0x270 [ 1562.688930] copy_page_range+0x2ca1/0x3810 [ 1562.689878] ? perf_trace_lock+0xac/0x490 [ 1562.691032] ? lock_chain_count+0x20/0x20 [ 1562.692218] ? lock_downgrade+0x6d0/0x6d0 [ 1562.693393] ? up_write+0x191/0x550 [ 1562.694414] ? vm_iomap_memory+0x190/0x190 [ 1562.695603] ? downgrade_write+0x3a0/0x3a0 [ 1562.696794] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1562.698317] ? __vma_link_rb+0x540/0x700 [ 1562.699476] copy_process+0x7658/0x78b0 [ 1562.700569] ? SOFTIRQ_verbose+0x10/0x10 [ 1562.701725] ? __cleanup_sighand+0xb0/0xb0 [ 1562.702721] ? _copy_from_user+0xfb/0x1b0 [ 1562.703878] kernel_clone+0xe7/0x980 [ 1562.704906] ? __lockdep_reset_lock+0x180/0x180 [ 1562.706230] ? create_io_thread+0xf0/0xf0 [ 1562.707394] ? ksys_write+0x21a/0x260 [ 1562.708448] ? lock_downgrade+0x6d0/0x6d0 [ 1562.709602] __do_sys_clone3+0x1e5/0x320 [ 1562.710733] ? __do_sys_clone+0x110/0x110 [ 1562.711921] ? rcu_read_lock_any_held+0x75/0xa0 [ 1562.713220] ? vfs_write+0x354/0xb10 [ 1562.714082] ? fput_many+0x2f/0x1a0 [ 1562.715083] ? ksys_write+0x1a9/0x260 [ 1562.716160] ? __ia32_sys_read+0xb0/0xb0 [ 1562.717297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1562.718770] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1562.720199] ? trace_hardirqs_on+0x5b/0x180 [ 1562.721403] do_syscall_64+0x33/0x40 [ 1562.722450] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1562.723855] RIP: 0033:0x7f4d52085b19 [ 1562.724891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1562.729985] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1562.732082] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1562.734063] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1562.736037] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1562.738018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1562.739984] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:28:29 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2500, 0x0}}], 0x324, 0x0) 15:28:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x200000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:29 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2310, 0x0}}], 0x324, 0x0) 15:28:29 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:28:29 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8, 0x0, 0x0}, 0x58) 15:28:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:29 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="61756469742c736d61636b667320000000723d2d000000aa42f485563cab9553ef1b"]) open(&(0x7f0000000080)='./file1\x00', 0x303200, 0x21) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) r2 = semget(0x2, 0x0, 0x20b) r3 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r3, r1, r4, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {0x1, 0x7}, [{0x2, 0x4, 0xee00}], {0x4, 0x2}, [{0x8, 0x3, r1}], {0x10, 0x2}, {0x20, 0x37e8bccf70015984}}, 0x34, 0x2) signalfd4(r0, &(0x7f0000000000)={[0x8001]}, 0x8, 0x80000) 15:28:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 39) [ 1580.606880] tmpfs: Unknown parameter 'audit' [ 1580.612470] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1580.622093] FAULT_INJECTION: forcing a failure. [ 1580.622093] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1580.624513] CPU: 0 PID: 15942 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1580.625854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.627019] tmpfs: Unknown parameter 'audit' [ 1580.627447] Call Trace: [ 1580.627477] dump_stack+0x107/0x167 [ 1580.627505] should_fail.cold+0x5/0xa [ 1580.630350] __alloc_pages_nodemask+0x182/0x600 [ 1580.631236] ? lock_acquire+0x197/0x470 [ 1580.631996] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1580.633150] ? lock_downgrade+0x6d0/0x6d0 [ 1580.633939] ? do_raw_spin_lock+0x121/0x260 [ 1580.634785] alloc_pages_current+0x187/0x280 [ 1580.635631] __pmd_alloc+0x37/0x630 [ 1580.636334] copy_page_range+0x2bd8/0x3810 [ 1580.637139] ? lock_chain_count+0x20/0x20 [ 1580.638000] ? up_write+0x191/0x550 [ 1580.638698] ? vm_iomap_memory+0x190/0x190 [ 1580.639508] ? downgrade_write+0x3a0/0x3a0 [ 1580.640321] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1580.641358] ? __vma_link_rb+0x540/0x700 [ 1580.641564] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1580.642150] copy_process+0x7658/0x78b0 [ 1580.644917] ? SOFTIRQ_verbose+0x10/0x10 [ 1580.645758] ? __cleanup_sighand+0xb0/0xb0 [ 1580.646609] ? _copy_from_user+0xfb/0x1b0 [ 1580.647416] kernel_clone+0xe7/0x980 [ 1580.648124] ? __lockdep_reset_lock+0x180/0x180 [ 1580.649014] ? create_io_thread+0xf0/0xf0 [ 1580.649830] ? ksys_write+0x21a/0x260 [ 1580.650565] ? lock_downgrade+0x6d0/0x6d0 [ 1580.651357] __do_sys_clone3+0x1e5/0x320 [ 1580.652122] ? __do_sys_clone+0x110/0x110 [ 1580.652942] ? rcu_read_lock_any_held+0x75/0xa0 [ 1580.653813] ? vfs_write+0x354/0xb10 [ 1580.654526] ? fput_many+0x2f/0x1a0 [ 1580.655190] ? ksys_write+0x1a9/0x260 [ 1580.655894] ? __ia32_sys_read+0xb0/0xb0 [ 1580.656651] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1580.657629] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1580.658580] ? trace_hardirqs_on+0x5b/0x180 [ 1580.659380] do_syscall_64+0x33/0x40 [ 1580.660065] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1580.661005] RIP: 0033:0x7f4d52085b19 [ 1580.661681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.665063] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1580.666465] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1580.667775] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1580.669086] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1580.670407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1580.671746] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:28:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xffffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:29 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f752c646566636f6e746578743d73797361646d5f752c0011a0cc5b21b11716838589bf74f690aa241fc47364780f304287e3"]) 15:28:29 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:28:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0ff1f, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1580.822921] SELinux: duplicate or incompatible mount options 15:28:29 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11, 0x0, 0x0}, 0x58) [ 1580.835638] SELinux: duplicate or incompatible mount options 15:28:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1580.866587] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1580.900007] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:28:29 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6c74658642c0080204ef264e8e12e98f78743df26f6f742c646566636f6e7465"]) 15:28:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 40) [ 1581.027677] tmpfs: Unknown parameter 'colte†BÀï&NŽéxt' [ 1581.037128] tmpfs: Unknown parameter 'colte†BÀï&NŽéxt' [ 1581.042930] FAULT_INJECTION: forcing a failure. [ 1581.042930] name failslab, interval 1, probability 0, space 0, times 0 [ 1581.045439] CPU: 1 PID: 16167 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1581.046984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1581.048810] Call Trace: [ 1581.049394] dump_stack+0x107/0x167 [ 1581.050199] should_fail.cold+0x5/0xa [ 1581.051043] ? __pmd_alloc+0x94/0x630 [ 1581.051883] should_failslab+0x5/0x20 [ 1581.052737] kmem_cache_alloc+0x5b/0x310 [ 1581.053680] __pmd_alloc+0x94/0x630 [ 1581.054515] copy_page_range+0x2bd8/0x3810 [ 1581.055497] ? perf_trace_lock+0xac/0x490 [ 1581.056456] ? lock_chain_count+0x20/0x20 [ 1581.057470] ? up_write+0x191/0x550 [ 1581.058325] ? vm_iomap_memory+0x190/0x190 [ 1581.059310] ? downgrade_write+0x3a0/0x3a0 [ 1581.060298] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1581.061573] ? __vma_link_rb+0x540/0x700 [ 1581.062549] copy_process+0x7658/0x78b0 [ 1581.063482] ? SOFTIRQ_verbose+0x10/0x10 [ 1581.064479] ? __cleanup_sighand+0xb0/0xb0 [ 1581.065498] ? _copy_from_user+0xfb/0x1b0 [ 1581.066490] kernel_clone+0xe7/0x980 [ 1581.067374] ? __lockdep_reset_lock+0x180/0x180 [ 1581.068476] ? create_io_thread+0xf0/0xf0 [ 1581.069483] ? ksys_write+0x21a/0x260 [ 1581.070394] ? lock_downgrade+0x6d0/0x6d0 [ 1581.071381] __do_sys_clone3+0x1e5/0x320 [ 1581.072340] ? __do_sys_clone+0x110/0x110 [ 1581.073363] ? rcu_read_lock_any_held+0x75/0xa0 [ 1581.074432] ? vfs_write+0x354/0xb10 [ 1581.075299] ? fput_many+0x2f/0x1a0 [ 1581.076168] ? ksys_write+0x1a9/0x260 [ 1581.077056] ? __ia32_sys_read+0xb0/0xb0 [ 1581.078023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1581.079250] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1581.080457] ? trace_hardirqs_on+0x5b/0x180 [ 1581.081495] do_syscall_64+0x33/0x40 [ 1581.082378] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1581.083553] RIP: 0033:0x7f4d52085b19 [ 1581.084427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1581.088819] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1581.090649] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1581.092370] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1581.094083] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1581.095804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1581.097545] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:28:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:47 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2600, 0x0}}], 0x324, 0x0) 15:28:47 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2400, 0x0}}], 0x324, 0x0) 15:28:47 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:28:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:47 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6390d59c6f6e746578743d73797361646d5f752c646506636f6e746578743d73797361646d5f"]) r1 = dup2(r0, 0xffffffffffffffff) statx(r0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x10, &(0x7f0000000180)) r2 = fsmount(r1, 0x1, 0x80) setsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f00000002c0)="00693f701d272263819d4b49de6ffaaeca0673d36d4c1eb7391069df97046d98f1965dbc38349d28b70e7b4f6d731d110ef42066e5ea196fc229f8b174167cde355e1f0549f08d50809764c10a743238211de65287ce084c6e3cd4e5c19203a695bd835804b2", 0x66) symlinkat(&(0x7f0000000000)='./file0/file0\x00', r1, &(0x7f0000000040)='./file0\x00') 15:28:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 41) 15:28:47 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100, 0x0, 0x0}, 0x58) [ 1598.631315] tmpfs: Unknown parameter 'cÕœontext' [ 1598.639636] FAULT_INJECTION: forcing a failure. [ 1598.639636] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1598.642059] tmpfs: Unknown parameter 'cÕœontext' [ 1598.642262] CPU: 0 PID: 16180 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1598.644695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1598.646478] Call Trace: [ 1598.646708] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1598.647057] dump_stack+0x107/0x167 [ 1598.649824] should_fail.cold+0x5/0xa [ 1598.650672] __alloc_pages_nodemask+0x182/0x600 [ 1598.651673] ? __lockdep_reset_lock+0x180/0x180 [ 1598.652685] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1598.654001] ? copy_page_range+0x28e1/0x3810 [ 1598.654971] alloc_pages_current+0x187/0x280 [ 1598.655923] get_zeroed_page+0x14/0xb0 [ 1598.656763] __pud_alloc+0x33/0x270 [ 1598.657557] copy_page_range+0x2ca1/0x3810 [ 1598.658486] ? lock_chain_count+0x20/0x20 [ 1598.659421] ? lock_downgrade+0x6d0/0x6d0 [ 1598.660350] ? up_write+0x191/0x550 [ 1598.661143] ? vm_iomap_memory+0x190/0x190 [ 1598.662052] ? downgrade_write+0x3a0/0x3a0 [ 1598.662988] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1598.664157] ? __vma_link_rb+0x540/0x700 [ 1598.665055] copy_process+0x7658/0x78b0 [ 1598.665911] ? SOFTIRQ_verbose+0x10/0x10 [ 1598.666873] ? __cleanup_sighand+0xb0/0xb0 [ 1598.667833] ? _copy_from_user+0xfb/0x1b0 [ 1598.668749] kernel_clone+0xe7/0x980 [ 1598.669553] ? __lockdep_reset_lock+0x180/0x180 [ 1598.670563] ? create_io_thread+0xf0/0xf0 [ 1598.671485] ? ksys_write+0x21a/0x260 [ 1598.672307] ? lock_downgrade+0x6d0/0x6d0 [ 1598.673214] __do_sys_clone3+0x1e5/0x320 [ 1598.674092] ? __do_sys_clone+0x110/0x110 [ 1598.675044] ? rcu_read_lock_any_held+0x75/0xa0 [ 1598.676042] ? vfs_write+0x354/0xb10 [ 1598.676859] ? fput_many+0x2f/0x1a0 [ 1598.677644] ? ksys_write+0x1a9/0x260 [ 1598.678481] ? __ia32_sys_read+0xb0/0xb0 [ 1598.679366] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1598.680498] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1598.681333] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1598.681596] ? trace_hardirqs_on+0x5b/0x180 [ 1598.681631] do_syscall_64+0x33/0x40 [ 1598.685310] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1598.686424] RIP: 0033:0x7f4d52085b19 [ 1598.687221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1598.691165] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1598.692799] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1598.694332] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1598.695870] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1598.697399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1598.698933] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:28:47 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001340)=[{&(0x7f0000000180)="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", 0x1000, 0x800}, {&(0x7f0000001180)="49f8074c5f59749da45074b9ddf79b4286af8d0c422f0744773fd75fd56453e5f06e79e07cc0c09cb0a4933ed14913a049031c1287a81f7e3e8b39528410dd016414d0ab5d4494d21e32333eb1fb905379e328f64dcca5e8", 0x58, 0x8}, {&(0x7f0000001200)="97b9fad51974b1d6244398d8877414ebc733aadf892aa71bca67820a9a58f06034765689b47d3138622f1f34a36b968189131a8086f1948e80e1819666762d03074f5b763f87a647fa0ac2d5eea6bcb99e5c3096a36190253cb9fea83cb6ede974a66aea0cb39394fc07df3e6eebaf1afb542e87aee070712f5b4787e1753b1211a7c86fee001c763e5ff4645f3e1fb90ceebe182edcde114ee1d7fecf397d56aae32b1820c7", 0xa6, 0x80000001}, {&(0x7f00000012c0)="e79a9edfb7452e80d11dae9aa010b589698269c283f909127bb82c90b809967cc5cd66207167eb4cb27f9fbf0cf88112b1484bbc2dd60f4b2c349c5ccce15f38eaf24dcd40dc2aa9ab86330fff1b21f01289", 0x52, 0x10001}], 0x19cc0a0, &(0x7f00000013c0)={[{}], [{@subj_role={'subj_role', 0x3d, 'tmpfs\x00'}}, {@dont_measure}, {@uid_gt={'uid>', r0}}, {@obj_type={'obj_type', 0x3d, ','}}, {@subj_role={'subj_role', 0x3d, 'context'}}]}) 15:28:47 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1598.839881] SELinux: duplicate or incompatible mount options 15:28:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:47 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000, 0x0, 0x0}, 0x58) [ 1598.891228] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1598.926347] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:28:47 executing program 7: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_READV=@pass_iovec={0x1, 0x1, 0x2000, @fd_index=0x2, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f0000000380)=""/193, 0xc1}, {&(0x7f0000000200)=""/54, 0x36}, {&(0x7f0000000480)=""/144, 0x90}], 0x4, 0x0, 0x1}, 0x9ec) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x54, r0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x10001}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xad2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x74}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7fffffff}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x81}]}, 0x54}, 0x1, 0x0, 0x0, 0x8010}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001d004527004000000000000006"], 0x14}}, 0x0) read(r1, &(0x7f0000000100)=""/153, 0x99) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x4}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40844) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:28:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:28:47 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:28:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 42) 15:28:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1599.089335] SELinux: duplicate or incompatible mount options [ 1599.170697] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1599.183992] FAULT_INJECTION: forcing a failure. [ 1599.183992] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1599.186483] CPU: 0 PID: 16423 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1599.187906] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1599.189601] Call Trace: [ 1599.190155] dump_stack+0x107/0x167 [ 1599.190917] should_fail.cold+0x5/0xa [ 1599.191715] __alloc_pages_nodemask+0x182/0x600 [ 1599.192679] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1599.193910] ? find_held_lock+0x2c/0x110 [ 1599.194779] ? __pmd_alloc+0x31d/0x630 [ 1599.195583] ? lock_downgrade+0x6d0/0x6d0 [ 1599.196434] ? do_raw_spin_lock+0x121/0x260 [ 1599.197331] alloc_pages_current+0x187/0x280 [ 1599.198242] pte_alloc_one+0x16/0x1a0 [ 1599.199031] __pte_alloc+0x1d/0x330 [ 1599.199793] copy_page_range+0x1b62/0x3810 [ 1599.200663] ? lock_chain_count+0x20/0x20 [ 1599.201603] ? up_write+0x191/0x550 [ 1599.202354] ? vm_iomap_memory+0x190/0x190 [ 1599.203226] ? downgrade_write+0x3a0/0x3a0 [ 1599.204106] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1599.205211] ? __vma_link_rb+0x540/0x700 [ 1599.206055] copy_process+0x7658/0x78b0 [ 1599.206865] ? SOFTIRQ_verbose+0x10/0x10 [ 1599.207764] ? __cleanup_sighand+0xb0/0xb0 [ 1599.208667] ? _copy_from_user+0xfb/0x1b0 [ 1599.209530] kernel_clone+0xe7/0x980 [ 1599.210296] ? __lockdep_reset_lock+0x180/0x180 [ 1599.211245] ? create_io_thread+0xf0/0xf0 [ 1599.212117] ? ksys_write+0x21a/0x260 [ 1599.212900] ? lock_downgrade+0x6d0/0x6d0 [ 1599.213758] __do_sys_clone3+0x1e5/0x320 [ 1599.214598] ? __do_sys_clone+0x110/0x110 [ 1599.215488] ? rcu_read_lock_any_held+0x75/0xa0 [ 1599.216428] ? vfs_write+0x354/0xb10 [ 1599.217191] ? fput_many+0x2f/0x1a0 [ 1599.217937] ? ksys_write+0x1a9/0x260 [ 1599.218731] ? __ia32_sys_read+0xb0/0xb0 [ 1599.219563] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1599.220626] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1599.221664] ? trace_hardirqs_on+0x5b/0x180 [ 1599.222547] do_syscall_64+0x33/0x40 [ 1599.223308] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1599.224331] RIP: 0033:0x7f4d52085b19 [ 1599.225092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.228816] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1599.230353] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1599.231782] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1599.233204] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.234650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1599.236083] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1599.255815] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:29:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00, 0x0, 0x0}, 0x58) 15:29:03 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2700, 0x0}}], 0x324, 0x0) 15:29:03 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2403, 0x0}}], 0x324, 0x0) 15:29:03 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048fff0f0000001c000000000000000000000008000000", @ANYRES32=r2], 0x38}}], 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000000)={@local, 0x70, r2}) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:29:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:03 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:29:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 43) [ 1614.289734] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1614.312160] SELinux: duplicate or incompatible mount options [ 1614.316877] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:29:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1614.332299] FAULT_INJECTION: forcing a failure. [ 1614.332299] name failslab, interval 1, probability 0, space 0, times 0 [ 1614.335194] CPU: 1 PID: 16449 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1614.336867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1614.338833] Call Trace: [ 1614.339466] dump_stack+0x107/0x167 [ 1614.340355] should_fail.cold+0x5/0xa [ 1614.341256] ? create_object.isra.0+0x3a/0xa30 [ 1614.342325] should_failslab+0x5/0x20 [ 1614.343238] kmem_cache_alloc+0x5b/0x310 [ 1614.344204] create_object.isra.0+0x3a/0xa30 [ 1614.345228] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1614.346424] kmem_cache_alloc+0x159/0x310 [ 1614.347413] __pmd_alloc+0x94/0x630 [ 1614.348294] copy_page_range+0x2bd8/0x3810 [ 1614.349290] ? perf_trace_lock+0xac/0x490 [ 1614.350257] ? lock_chain_count+0x20/0x20 [ 1614.351290] ? up_write+0x191/0x550 [ 1614.352150] ? vm_iomap_memory+0x190/0x190 [ 1614.353149] ? downgrade_write+0x3a0/0x3a0 [ 1614.354144] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1614.355449] ? __vma_link_rb+0x540/0x700 [ 1614.356431] copy_process+0x7658/0x78b0 [ 1614.357386] ? SOFTIRQ_verbose+0x10/0x10 [ 1614.358397] ? __cleanup_sighand+0xb0/0xb0 [ 1614.359435] ? _copy_from_user+0xfb/0x1b0 [ 1614.360415] kernel_clone+0xe7/0x980 [ 1614.361296] ? __lockdep_reset_lock+0x180/0x180 [ 1614.362385] ? create_io_thread+0xf0/0xf0 [ 1614.363375] ? ksys_write+0x21a/0x260 [ 1614.364263] ? lock_downgrade+0x6d0/0x6d0 [ 1614.365233] __do_sys_clone3+0x1e5/0x320 [ 1614.366178] ? __do_sys_clone+0x110/0x110 [ 1614.367189] ? rcu_read_lock_any_held+0x75/0xa0 [ 1614.368274] ? vfs_write+0x354/0xb10 [ 1614.369146] ? fput_many+0x2f/0x1a0 [ 1614.370011] ? ksys_write+0x1a9/0x260 [ 1614.370907] ? __ia32_sys_read+0xb0/0xb0 [ 1614.371871] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1614.373090] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1614.374286] ? trace_hardirqs_on+0x5b/0x180 [ 1614.375316] do_syscall_64+0x33/0x40 [ 1614.376183] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1614.377387] RIP: 0033:0x7f4d52085b19 [ 1614.378254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1614.382557] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1614.384358] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1614.386009] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1614.387661] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1614.389321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1614.390977] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:29:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1ffff000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:03 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:29:03 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6300000000646d5f752c816566633d8a2907a3f5ae2b602c00"/38]) [ 1614.530627] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1614.548593] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1614.561304] tmpfs: Unknown parameter 'c' [ 1614.569118] tmpfs: Unknown parameter 'c' 15:29:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x3f00}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:18 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2800, 0x0}}], 0x324, 0x0) 15:29:18 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2500, 0x0}}], 0x324, 0x0) 15:29:18 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:29:18 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f752c646566636f6e746578743d73797361646d5f752c0015dda3e57abc84f92e40f027dcc2e461a412c3ad2893ddbf17ffa9"]) 15:29:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 44) 15:29:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000, 0x0, 0x0}, 0x58) [ 1629.186054] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1629.190941] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1629.206640] SELinux: duplicate or incompatible mount options [ 1629.210507] SELinux: duplicate or incompatible mount options 15:29:18 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1629.239230] FAULT_INJECTION: forcing a failure. [ 1629.239230] name failslab, interval 1, probability 0, space 0, times 0 [ 1629.240942] CPU: 0 PID: 16591 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1629.241930] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1629.243135] Call Trace: [ 1629.243525] dump_stack+0x107/0x167 [ 1629.244055] should_fail.cold+0x5/0xa [ 1629.244618] ? create_object.isra.0+0x3a/0xa30 [ 1629.245279] should_failslab+0x5/0x20 [ 1629.245832] kmem_cache_alloc+0x5b/0x310 [ 1629.246422] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1629.247309] create_object.isra.0+0x3a/0xa30 [ 1629.247943] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1629.248682] kmem_cache_alloc+0x159/0x310 [ 1629.249295] ptlock_alloc+0x1d/0x70 [ 1629.249836] pte_alloc_one+0x68/0x1a0 [ 1629.250400] __pte_alloc+0x1d/0x330 [ 1629.250946] copy_page_range+0x1b62/0x3810 [ 1629.251573] ? lock_chain_count+0x20/0x20 [ 1629.252233] ? up_write+0x191/0x550 [ 1629.252773] ? vm_iomap_memory+0x190/0x190 [ 1629.253390] ? downgrade_write+0x3a0/0x3a0 [ 1629.254010] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1629.254809] ? __vma_link_rb+0x540/0x700 [ 1629.255425] copy_process+0x7658/0x78b0 [ 1629.255997] ? SOFTIRQ_verbose+0x10/0x10 [ 1629.256646] ? __cleanup_sighand+0xb0/0xb0 [ 1629.257301] ? _copy_from_user+0xfb/0x1b0 [ 1629.257911] kernel_clone+0xe7/0x980 [ 1629.258454] ? __lockdep_reset_lock+0x180/0x180 [ 1629.259151] ? create_io_thread+0xf0/0xf0 [ 1629.259775] ? ksys_write+0x21a/0x260 [ 1629.260329] ? lock_downgrade+0x6d0/0x6d0 [ 1629.260931] __do_sys_clone3+0x1e5/0x320 [ 1629.261527] ? __do_sys_clone+0x110/0x110 [ 1629.262156] ? rcu_read_lock_any_held+0x75/0xa0 [ 1629.262836] ? vfs_write+0x354/0xb10 [ 1629.263380] ? fput_many+0x2f/0x1a0 [ 1629.263909] ? ksys_write+0x1a9/0x260 [ 1629.264463] ? __ia32_sys_read+0xb0/0xb0 [ 1629.265056] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1629.265817] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1629.266563] ? trace_hardirqs_on+0x5b/0x180 [ 1629.267193] do_syscall_64+0x33/0x40 [ 1629.267724] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1629.268453] RIP: 0033:0x7f4d52085b19 [ 1629.268988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1629.271612] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1629.272709] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1629.273729] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1629.274745] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1629.275769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1629.276795] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:29:18 executing program 7: r0 = shmget$private(0x0, 0x2000, 0x78000000, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmctl$SHM_UNLOCK(r0, 0xc) r1 = shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmctl$SHM_LOCK(r1, 0xb) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRESOCT=r0, @ANYRES16=r1, @ANYRESHEX=r1, @ANYBLOB="a10c4c8d72fa0964040fbe29bdb2235a87823e777751743a4112530757db7fa1da2d6d3e049cd0552c18e7b5102dbc60c37e140aae4cccd496a86d110e2900a63bff86fced892b60f2d0d8fdb96baab275009647b85abf92e2b33f8d9965d75c9b45c7beaed9cccf0c48f3747bf629d11ec11a07b7cef624b9669d7b61af572f324e7aa99727fbe885c1fbba915784d7b5cfa2d129d2", @ANYRES32, @ANYRES64=r1]) 15:29:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1629.366849] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1629.382883] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:29:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20010, 0x0, 0x0}, 0x58) 15:29:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20010}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:18 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1629.490809] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:29:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 45) [ 1629.506865] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1629.615602] FAULT_INJECTION: forcing a failure. [ 1629.615602] name failslab, interval 1, probability 0, space 0, times 0 [ 1629.618206] CPU: 1 PID: 16818 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1629.619777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1629.621604] Call Trace: [ 1629.622228] dump_stack+0x107/0x167 [ 1629.623063] should_fail.cold+0x5/0xa [ 1629.623906] ? vm_area_dup+0x78/0x290 [ 1629.624765] should_failslab+0x5/0x20 [ 1629.625627] kmem_cache_alloc+0x5b/0x310 [ 1629.626561] vm_area_dup+0x78/0x290 [ 1629.627388] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1629.628437] ? lock_downgrade+0x6d0/0x6d0 [ 1629.629379] ? _cond_resched+0x10/0x30 [ 1629.630260] ? copy_page_range+0x24e9/0x3810 [ 1629.631289] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1629.632344] ? avc_has_extended_perms+0xf40/0xf40 [ 1629.633443] ? vm_area_alloc+0x110/0x110 [ 1629.634366] ? selinux_vm_enough_memory+0x114/0x180 [ 1629.635504] ? selinux_sb_statfs+0x250/0x250 [ 1629.636518] ? percpu_counter_add_batch+0x8b/0x140 [ 1629.637635] ? __vm_enough_memory+0x184/0x360 [ 1629.638647] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1629.639829] copy_process+0x298b/0x78b0 [ 1629.640729] ? SOFTIRQ_verbose+0x10/0x10 [ 1629.641697] ? __cleanup_sighand+0xb0/0xb0 [ 1629.642686] ? _copy_from_user+0xfb/0x1b0 [ 1629.643671] kernel_clone+0xe7/0x980 [ 1629.644520] ? __lockdep_reset_lock+0x180/0x180 [ 1629.645578] ? create_io_thread+0xf0/0xf0 [ 1629.646526] ? ksys_write+0x21a/0x260 [ 1629.647409] ? lock_downgrade+0x6d0/0x6d0 [ 1629.648357] __do_sys_clone3+0x1e5/0x320 [ 1629.649279] ? __do_sys_clone+0x110/0x110 [ 1629.650244] ? rcu_read_lock_any_held+0x75/0xa0 [ 1629.651294] ? vfs_write+0x354/0xb10 [ 1629.652120] ? fput_many+0x2f/0x1a0 [ 1629.652944] ? ksys_write+0x1a9/0x260 [ 1629.653785] ? __ia32_sys_read+0xb0/0xb0 [ 1629.654702] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1629.655869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1629.656993] ? trace_hardirqs_on+0x5b/0x180 [ 1629.657973] do_syscall_64+0x33/0x40 [ 1629.658825] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1629.659943] RIP: 0033:0x7f4d52085b19 [ 1629.660784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1629.664856] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1629.666540] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1629.668149] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1629.669729] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1629.671366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1629.672958] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:29:33 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2900, 0x0}}], 0x324, 0x0) 15:29:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 46) 15:29:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:33 executing program 7: r0 = syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x8000000) r4 = syz_io_uring_setup(0x522f, &(0x7f0000001540)={0x0, 0xcb65, 0x10, 0x3, 0x13}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000015c0), &(0x7f0000001600)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001780)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x2004, @fd=r0, 0x8000, 0x8, 0x40, 0x10, 0x1, {0x1}}, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x110, r4, 0x10000000) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r6, &(0x7f0000001700)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1, {0x0, r7}}, 0xf3) io_uring_enter(r4, 0x1e76, 0xe97b, 0x0, &(0x7f0000001740)={[0xffffffffffffff01]}, 0x8) r8 = syz_io_uring_setup(0x3e11, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, 0x3}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r8, 0x12, 0x0, r9) syz_io_uring_submit(r3, r5, &(0x7f0000001640)=@IORING_OP_FSYNC={0x3, 0x3, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r9}}, 0x7fff) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000001e00)=@IORING_OP_WRITEV={0x2, 0xb3730263a51aca06, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x5) syz_io_uring_submit(0x0, r2, &(0x7f0000001500)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/65, 0x41}, {&(0x7f0000000080)=""/9, 0x9}, {&(0x7f00000000c0)=""/34, 0x22}, {&(0x7f0000000180)=""/252, 0xfc}, {&(0x7f00000002c0)=""/161, 0xa1}, {&(0x7f0000000380)=""/186, 0xba}], 0x6, &(0x7f00000004c0)=""/4096, 0x1000}, 0x0, 0x100, 0x1, {0x2}}, 0x0) r10 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001680)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r11 = eventfd2(0x3, 0x801) ioctl$INCFS_IOC_PERMIT_FILL(r10, 0x40046721, &(0x7f00000016c0)={r11}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x2111, r0, 0x8000000) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='cYntext=sysa,defconbext=unconfined_u,\x00']) 15:29:33 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:29:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20200, 0x0, 0x0}, 0x58) 15:29:33 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2600, 0x0}}], 0x324, 0x0) 15:29:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20200}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1645.177264] FAULT_INJECTION: forcing a failure. [ 1645.177264] name failslab, interval 1, probability 0, space 0, times 0 [ 1645.180650] CPU: 1 PID: 16835 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1645.182526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1645.184779] Call Trace: [ 1645.185402] dump_stack+0x107/0x167 [ 1645.186258] should_fail.cold+0x5/0xa [ 1645.187325] ? create_object.isra.0+0x3a/0xa30 [ 1645.188644] should_failslab+0x5/0x20 [ 1645.189542] kmem_cache_alloc+0x5b/0x310 [ 1645.190506] create_object.isra.0+0x3a/0xa30 [ 1645.191647] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1645.193072] kmem_cache_alloc+0x159/0x310 [ 1645.194058] vm_area_dup+0x78/0x290 [ 1645.195025] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1645.196217] ? lock_downgrade+0x6d0/0x6d0 [ 1645.197383] ? _cond_resched+0x10/0x30 [ 1645.198312] ? copy_page_range+0x24e9/0x3810 [ 1645.199513] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1645.200630] ? avc_has_extended_perms+0xf40/0xf40 [ 1645.201902] ? vm_area_alloc+0x110/0x110 [ 1645.202923] ? selinux_vm_enough_memory+0x114/0x180 [ 1645.204236] ? selinux_sb_statfs+0x250/0x250 [ 1645.205444] ? percpu_counter_add_batch+0x8b/0x140 [ 1645.206766] ? __vm_enough_memory+0x184/0x360 [ 1645.207825] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1645.209176] copy_process+0x298b/0x78b0 [ 1645.210103] ? SOFTIRQ_verbose+0x10/0x10 [ 1645.211282] ? __cleanup_sighand+0xb0/0xb0 [ 1645.212426] ? _copy_from_user+0xfb/0x1b0 [ 1645.213577] kernel_clone+0xe7/0x980 [ 1645.214457] ? __lockdep_reset_lock+0x180/0x180 [ 1645.215565] ? create_io_thread+0xf0/0xf0 [ 1645.216549] ? ksys_write+0x21a/0x260 [ 1645.217619] ? lock_downgrade+0x6d0/0x6d0 [ 1645.218802] __do_sys_clone3+0x1e5/0x320 [ 1645.219908] ? __do_sys_clone+0x110/0x110 [ 1645.220917] ? rcu_read_lock_any_held+0x75/0xa0 [ 1645.222012] ? vfs_write+0x354/0xb10 [ 1645.223051] ? fput_many+0x2f/0x1a0 [ 1645.223899] ? ksys_write+0x1a9/0x260 [ 1645.224983] ? __ia32_sys_read+0xb0/0xb0 [ 1645.226099] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1645.227563] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1645.228800] ? trace_hardirqs_on+0x5b/0x180 [ 1645.229974] do_syscall_64+0x33/0x40 [ 1645.230853] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1645.232089] RIP: 0033:0x7f4d52085b19 [ 1645.233131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1645.237906] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1645.239948] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1645.241656] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1645.243495] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1645.245328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1645.247151] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:29:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1645.301318] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1645.346104] tmpfs: Unknown parameter 'cYntext' [ 1645.349313] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1645.375505] tmpfs: Unknown parameter 'cYntext' 15:29:34 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xff030000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:29:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x101000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1645.508662] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:29:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x80000, 0x0, 0x0}, 0x58) [ 1645.530290] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:29:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x100000800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 47) 15:29:34 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:29:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x200000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1645.660380] FAULT_INJECTION: forcing a failure. [ 1645.660380] name failslab, interval 1, probability 0, space 0, times 0 [ 1645.661726] CPU: 0 PID: 17033 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1645.662519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1645.663489] Call Trace: [ 1645.663801] dump_stack+0x107/0x167 [ 1645.664228] should_fail.cold+0x5/0xa [ 1645.664670] ? anon_vma_clone+0xdc/0x590 [ 1645.665139] should_failslab+0x5/0x20 [ 1645.665583] kmem_cache_alloc+0x5b/0x310 [ 1645.666061] anon_vma_clone+0xdc/0x590 [ 1645.666530] anon_vma_fork+0x82/0x640 [ 1645.666978] ? __vm_enough_memory+0x184/0x360 [ 1645.667501] copy_process+0x72cd/0x78b0 [ 1645.667957] ? SOFTIRQ_verbose+0x10/0x10 [ 1645.668476] ? __cleanup_sighand+0xb0/0xb0 [ 1645.668993] ? _copy_from_user+0xfb/0x1b0 [ 1645.669495] kernel_clone+0xe7/0x980 [ 1645.669926] ? __lockdep_reset_lock+0x180/0x180 [ 1645.670471] ? create_io_thread+0xf0/0xf0 [ 1645.670980] ? ksys_write+0x21a/0x260 [ 1645.671423] ? lock_downgrade+0x6d0/0x6d0 [ 1645.671907] __do_sys_clone3+0x1e5/0x320 [ 1645.672380] ? __do_sys_clone+0x110/0x110 [ 1645.672886] ? rcu_read_lock_any_held+0x75/0xa0 [ 1645.673424] ? vfs_write+0x354/0xb10 [ 1645.673854] ? fput_many+0x2f/0x1a0 [ 1645.674273] ? ksys_write+0x1a9/0x260 [ 1645.674716] ? __ia32_sys_read+0xb0/0xb0 [ 1645.675203] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1645.675814] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1645.676408] ? trace_hardirqs_on+0x5b/0x180 [ 1645.676908] do_syscall_64+0x33/0x40 [ 1645.677339] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1645.677926] RIP: 0033:0x7f4d52085b19 [ 1645.678355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1645.680461] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1645.681340] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1645.682159] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1645.682982] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1645.683798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1645.684613] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1645.705909] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1645.729224] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:29:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 48) 15:29:49 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2a00, 0x0}}], 0x324, 0x0) 15:29:49 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:29:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1b0c21f000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0xf0ff1f}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:49 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x101000, 0x0, 0x0}, 0x58) 15:29:49 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) r4 = semget(0x2, 0x0, 0x20b) r5 = getuid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r5, r3, r6, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) r8 = semget(0x2, 0x0, 0x20b) r9 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r9, r7, r10, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x2}, [{0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee00}, {0x2, 0x4, r1}, {0x2, 0x5}, {0x2, 0x4, r2}, {0x2, 0x2, 0xffffffffffffffff}], {0x4, 0x6}, [{0x8, 0x5, r3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x6, r7}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x6, r11}, {0x8, 0x2, r12}, {0x8, 0x1, 0xee01}], {0x10, 0x6}, {0x20, 0x2}}, 0x8c, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) 15:29:50 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2700, 0x0}}], 0x324, 0x0) [ 1661.171762] SELinux: duplicate or incompatible mount options [ 1661.209786] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1661.225193] FAULT_INJECTION: forcing a failure. [ 1661.225193] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.227852] CPU: 1 PID: 17093 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1661.229405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1661.231273] Call Trace: [ 1661.231875] dump_stack+0x107/0x167 [ 1661.232704] should_fail.cold+0x5/0xa [ 1661.233575] ? vm_area_dup+0x78/0x290 [ 1661.234442] should_failslab+0x5/0x20 [ 1661.235319] kmem_cache_alloc+0x5b/0x310 [ 1661.236245] vm_area_dup+0x78/0x290 [ 1661.237089] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1661.238163] ? lock_downgrade+0x6d0/0x6d0 [ 1661.239096] ? _cond_resched+0x10/0x30 [ 1661.239982] ? copy_page_range+0x24e9/0x3810 [ 1661.241005] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1661.242066] ? avc_has_extended_perms+0xf40/0xf40 [ 1661.243178] ? vm_area_alloc+0x110/0x110 [ 1661.244111] ? selinux_vm_enough_memory+0x114/0x180 [ 1661.245246] ? selinux_sb_statfs+0x250/0x250 15:29:50 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465764fc9ca5500716007"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ubifs\x00', 0x221004, &(0x7f00000000c0)='sysadm_u') [ 1661.246248] ? percpu_counter_add_batch+0x8b/0x140 [ 1661.247612] ? __vm_enough_memory+0x184/0x360 [ 1661.248618] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1661.249788] copy_process+0x298b/0x78b0 [ 1661.250687] ? SOFTIRQ_verbose+0x10/0x10 [ 1661.251659] ? __cleanup_sighand+0xb0/0xb0 [ 1661.252637] ? _copy_from_user+0xfb/0x1b0 [ 1661.253583] kernel_clone+0xe7/0x980 [ 1661.254420] ? __lockdep_reset_lock+0x180/0x180 [ 1661.255482] ? create_io_thread+0xf0/0xf0 [ 1661.256446] ? ksys_write+0x21a/0x260 [ 1661.257318] ? lock_downgrade+0x6d0/0x6d0 [ 1661.258276] __do_sys_clone3+0x1e5/0x320 [ 1661.259214] ? __do_sys_clone+0x110/0x110 15:29:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1661.260172] ? rcu_read_lock_any_held+0x75/0xa0 [ 1661.261392] ? vfs_write+0x354/0xb10 [ 1661.262262] ? fput_many+0x2f/0x1a0 [ 1661.263100] ? ksys_write+0x1a9/0x260 [ 1661.263995] ? __ia32_sys_read+0xb0/0xb0 [ 1661.264931] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1661.266132] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1661.267310] ? trace_hardirqs_on+0x5b/0x180 [ 1661.268302] do_syscall_64+0x33/0x40 [ 1661.269161] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1661.270341] RIP: 0033:0x7f4d52085b19 [ 1661.271199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1661.275420] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1661.277164] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1661.278804] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1661.280470] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1661.282132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1661.283778] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1661.300919] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:29:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1661.363388] SELinux: duplicate or incompatible mount options [ 1661.375750] SELinux: duplicate or incompatible mount options 15:29:50 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:29:50 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x484000, &(0x7f0000000000)=ANY=[@ANYBLOB="636ed6c36accb1e02a0b72e886746578743d73797361646d5f752c646566636f6e2874657874c99033569c4f8b96284791fd418838351014ce9d7952bb54e471de914943e07fa0be2a510565909e01fe5239d423cc2fc110bddbb60976c581871c8728ca01c57114ed602338b8f417aff5cb808a0e790e43710e5b5897de138a"]) 15:29:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2a4bf1632000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:29:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 49) 15:29:50 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x200000, 0x0, 0x0}, 0x58) 15:29:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1661.536289] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1661.579354] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1661.597015] FAULT_INJECTION: forcing a failure. [ 1661.597015] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.599446] CPU: 0 PID: 17210 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1661.600900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1661.602637] Call Trace: [ 1661.603213] dump_stack+0x107/0x167 [ 1661.603993] should_fail.cold+0x5/0xa [ 1661.604805] ? anon_vma_fork+0xf1/0x640 [ 1661.605648] should_failslab+0x5/0x20 [ 1661.606456] kmem_cache_alloc+0x5b/0x310 [ 1661.607341] anon_vma_fork+0xf1/0x640 [ 1661.608146] ? __vm_enough_memory+0x184/0x360 [ 1661.609107] copy_process+0x72cd/0x78b0 [ 1661.609958] ? SOFTIRQ_verbose+0x10/0x10 [ 1661.610889] ? __cleanup_sighand+0xb0/0xb0 [ 1661.611839] ? _copy_from_user+0xfb/0x1b0 [ 1661.612728] kernel_clone+0xe7/0x980 [ 1661.613531] ? __lockdep_reset_lock+0x180/0x180 [ 1661.614518] ? create_io_thread+0xf0/0xf0 [ 1661.615439] ? ksys_write+0x21a/0x260 [ 1661.616249] ? lock_downgrade+0x6d0/0x6d0 [ 1661.617143] __do_sys_clone3+0x1e5/0x320 [ 1661.618006] ? __do_sys_clone+0x110/0x110 [ 1661.618939] ? rcu_read_lock_any_held+0x75/0xa0 [ 1661.619944] ? vfs_write+0x354/0xb10 [ 1661.620743] ? fput_many+0x2f/0x1a0 [ 1661.621517] ? ksys_write+0x1a9/0x260 [ 1661.622323] ? __ia32_sys_read+0xb0/0xb0 [ 1661.623203] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1661.624307] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1661.625387] ? trace_hardirqs_on+0x5b/0x180 [ 1661.626310] do_syscall_64+0x33/0x40 [ 1661.627101] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1661.628184] RIP: 0033:0x7f4d52085b19 [ 1661.628971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1661.632835] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1661.634436] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1661.635946] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1661.637445] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1661.638940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1661.640467] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:30:04 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2800, 0x0}}], 0x324, 0x0) 15:30:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x8000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x553a5f4d9000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:04 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2b00, 0x0}}], 0x324, 0x0) 15:30:04 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6e956578743d73797361646d5f752c6465666a6f6e746578743d73797361646d5f752c00"]) 15:30:04 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:30:04 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f, 0x0, 0x0}, 0x58) 15:30:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 50) [ 1675.264170] tmpfs: Unknown parameter 'con•ext' [ 1675.270585] FAULT_INJECTION: forcing a failure. [ 1675.270585] name failslab, interval 1, probability 0, space 0, times 0 [ 1675.271458] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1675.273130] CPU: 1 PID: 17339 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1675.276459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1675.278101] tmpfs: Unknown parameter 'con•ext' [ 1675.278239] Call Trace: [ 1675.279895] dump_stack+0x107/0x167 [ 1675.280914] should_fail.cold+0x5/0xa [ 1675.281966] ? create_object.isra.0+0x3a/0xa30 [ 1675.283211] should_failslab+0x5/0x20 [ 1675.284280] kmem_cache_alloc+0x5b/0x310 [ 1675.285214] create_object.isra.0+0x3a/0xa30 [ 1675.286245] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1675.287401] kmem_cache_alloc+0x159/0x310 [ 1675.288392] anon_vma_fork+0xf1/0x640 [ 1675.289217] ? __vm_enough_memory+0x184/0x360 [ 1675.290186] copy_process+0x72cd/0x78b0 [ 1675.291036] ? SOFTIRQ_verbose+0x10/0x10 [ 1675.291951] ? __cleanup_sighand+0xb0/0xb0 [ 1675.292879] ? _copy_from_user+0xfb/0x1b0 [ 1675.293768] kernel_clone+0xe7/0x980 [ 1675.294563] ? __lockdep_reset_lock+0x180/0x180 [ 1675.295560] ? create_io_thread+0xf0/0xf0 [ 1675.296458] ? ksys_write+0x21a/0x260 [ 1675.297267] ? lock_downgrade+0x6d0/0x6d0 [ 1675.298155] __do_sys_clone3+0x1e5/0x320 [ 1675.299022] ? __do_sys_clone+0x110/0x110 [ 1675.299937] ? rcu_read_lock_any_held+0x75/0xa0 [ 1675.300920] ? vfs_write+0x354/0xb10 [ 1675.301716] ? fput_many+0x2f/0x1a0 [ 1675.302490] ? ksys_write+0x1a9/0x260 [ 1675.303316] ? __ia32_sys_read+0xb0/0xb0 [ 1675.304193] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1675.305305] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1675.306395] ? trace_hardirqs_on+0x5b/0x180 [ 1675.307323] do_syscall_64+0x33/0x40 [ 1675.308124] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1675.309217] RIP: 0033:0x7f4d52085b19 [ 1675.310007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.313218] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1675.313912] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1675.313935] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1675.313947] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1675.313968] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1675.322060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1675.323599] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:30:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x10000200}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2001000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:04 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x4000000006, 0x200000) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f00000002c0)) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0x200) r2 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="636f4e746578743d73797361646d5f752c646566636f6e746578743d73797361646d5f752c00ca124f3c524d8d6f75052f454889da66594036144805a3d9f14df4a88f353a7919f1c8a92c2e75c1e3a5664c3a2e2172aac5f5c95741366c14664deabebf47b10b763e120cdd5b3df283ebe3893ce6f536d7bac17f1973414da0b454148b61192eda31f50af9690dff6059e698e98b8f5d20c96a67ebb027e76a29de2e6e396b4739ac7556dc63a6059ab6d2c4dbd31305b4900d058720a66481ffe1a19b9527246932e25e277641e2e76ea749c9c9114791407984f43222eadd07fda084bfb87f7a98a962104bc9c3390bf4b223dfb036a2"]) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x40) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r3, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000280)='./file0/file0\x00') ioctl$AUTOFS_IOC_EXPIRE_MULTI(r2, 0x40049366, &(0x7f0000000040)=0x1) 15:30:04 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1675.461242] tmpfs: Unknown parameter 'coNtext' [ 1675.475071] tmpfs: Unknown parameter 'coNtext' 15:30:04 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000, 0x0, 0x0}, 0x58) [ 1675.521078] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:30:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2020000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x11000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:04 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6e74e578743d73797361646d5f752c646566636f6e746578743d73797361646d5f752c00"]) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) [ 1675.565962] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1675.644012] tmpfs: Unknown parameter 'contåxt' [ 1675.652611] tmpfs: Unknown parameter 'contåxt' 15:30:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 51) 15:30:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000, 0x0, 0x0}, 0x58) 15:30:21 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:30:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1ffff000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:21 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2c00, 0x0}}], 0x324, 0x0) 15:30:21 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2900, 0x0}}], 0x324, 0x0) 15:30:21 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x1040000, &(0x7f0000000080)=ANY=[@ANYBLOB="80"]) r1 = dup2(r0, r0) symlinkat(&(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') [ 1692.546955] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1692.550588] FAULT_INJECTION: forcing a failure. [ 1692.550588] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.553178] CPU: 1 PID: 17575 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1692.554676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1692.556472] Call Trace: [ 1692.557058] dump_stack+0x107/0x167 [ 1692.557838] should_fail.cold+0x5/0xa [ 1692.558667] ? anon_vma_fork+0x1ff/0x640 [ 1692.559575] should_failslab+0x5/0x20 [ 1692.560407] kmem_cache_alloc+0x5b/0x310 [ 1692.561295] anon_vma_fork+0x1ff/0x640 [ 1692.562147] copy_process+0x72cd/0x78b0 [ 1692.563018] ? SOFTIRQ_verbose+0x10/0x10 [ 1692.563949] ? __cleanup_sighand+0xb0/0xb0 [ 1692.564900] ? _copy_from_user+0xfb/0x1b0 [ 1692.565803] kernel_clone+0xe7/0x980 [ 1692.566611] ? __lockdep_reset_lock+0x180/0x180 [ 1692.567629] ? create_io_thread+0xf0/0xf0 [ 1692.568553] ? ksys_write+0x21a/0x260 [ 1692.569378] ? lock_downgrade+0x6d0/0x6d0 [ 1692.570278] __do_sys_clone3+0x1e5/0x320 [ 1692.571163] ? __do_sys_clone+0x110/0x110 [ 1692.572121] ? rcu_read_lock_any_held+0x75/0xa0 [ 1692.573104] ? vfs_write+0x354/0xb10 [ 1692.573896] ? fput_many+0x2f/0x1a0 [ 1692.574677] ? ksys_write+0x1a9/0x260 [ 1692.575506] ? __ia32_sys_read+0xb0/0xb0 [ 1692.576416] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1692.577544] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1692.578644] ? trace_hardirqs_on+0x5b/0x180 [ 1692.579589] do_syscall_64+0x33/0x40 [ 1692.580394] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1692.581503] RIP: 0033:0x7f4d52085b19 [ 1692.582309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1692.586981] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1692.588941] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1692.590481] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1692.592044] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1692.593564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1692.595113] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1692.608096] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:30:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000001000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:21 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f752c646566636f6e746578743d73797361646d5f752c00b62d8e6335043ba38ed44837f3a56db814b6e4a1f66772ce976b2f516eca56089e7758a44b6def"]) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000580)=@abs, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000600)=""/62, 0x3e}, {&(0x7f0000000640)=""/222, 0xde}, {&(0x7f0000000740)=""/160, 0xa0}, {&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/120, 0x78}, {&(0x7f0000000940)=""/200, 0xc8}], 0x6, &(0x7f0000000ac0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x40}, 0x40002020) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="a633fb2c19c29a3a62a3890b2976578bf89fe36bc5b8c3e370c1b65de9d491c266bce7973ec855da74be56a97431837e808ddb25b4455905869abb9593fc5de021db84060d80f6a60ba1f75070c0395f2b59912a6c20acaa89fee4e6a3b0582c0b3e87f683600866a966cc60867e37d88e99f51c5df8349de2defa63bd59a982865ce060ddf8b780885785bb33a29560723fda782066e7a730c59c294543c7f003ed3be2e8d821c0f66ab30466025b6a0369d762e717eb6b59cc45ab0bacc644dd043c3287af50ccf01f8cac01a4106ead14029d442ec20b3978adca9c46435cc8e463", 0xe3, 0xf9}, {&(0x7f00000002c0)="93c15b4ea95da9368130f85b1063b70bbf897f1840c8d4163380c6b10a6840d83939a6d1c016d37c46c47b14e8254da8f74c83a0de68f379d01ed63040dc3c60c55aeb9bb051c17a", 0x48, 0x1}, {&(0x7f0000000340)="d6224a51373c06f23652c4e1ff66d301431743125601fa54b7c218ae6e12f519534661908d6689e043731516570b54faf53874deba61b49c132b5ec9f7679826b61a86b6608bbf758c7b75e9370cf906", 0x50}], 0x3, &(0x7f0000000c00)={[{@nonumtail}, {@nonumtail}, {@shortname_win95}, {@shortname_mixed}, {@uni_xlateno}], [{@euid_eq={'euid', 0x3d, r0}}, {@euid_gt={'euid>', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\f$&&&\x16\xc8\xfe\xa4\xb0\xd6\xf8\xed\xf0\x1dG\xc8\'\x89\xa1\xbc\xd9\xf4\xcc\x82\xb3{VGn\xa5\'\xebKXi\xd1\x02\x99%s\xa7\xabM\xfd\xa6]X\xeax\x81\x1f-&\xab\x85=\xa8\xb6\xf0\x1d\x90\xe0XC\xb7$\xdc\xf0\x97\x9f\xc6\xa8n'}}, {@dont_measure}]}) chroot(&(0x7f0000000540)='./file0\x00') symlinkat(&(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000500)='./file0\x00') 15:30:21 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:30:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000, 0x0, 0x0}, 0x58) [ 1692.807419] SELinux: duplicate or incompatible mount options [ 1692.816764] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:30:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x3f000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1692.853064] FAT-fs (loop7): Unrecognized mount option "nnonumtail=1" or missing value 15:30:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10100000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 52) [ 1692.884077] SELinux: duplicate or incompatible mount options [ 1692.893611] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1693.000189] FAULT_INJECTION: forcing a failure. [ 1693.000189] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.002784] CPU: 0 PID: 17764 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1693.004249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1693.005982] Call Trace: [ 1693.006551] dump_stack+0x107/0x167 [ 1693.007328] should_fail.cold+0x5/0xa [ 1693.008151] ? create_object.isra.0+0x3a/0xa30 [ 1693.009124] should_failslab+0x5/0x20 [ 1693.009927] kmem_cache_alloc+0x5b/0x310 [ 1693.010810] create_object.isra.0+0x3a/0xa30 [ 1693.011739] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1693.012822] kmem_cache_alloc+0x159/0x310 [ 1693.013724] anon_vma_fork+0x1ff/0x640 [ 1693.014568] copy_process+0x72cd/0x78b0 [ 1693.015429] ? SOFTIRQ_verbose+0x10/0x10 [ 1693.016365] ? __cleanup_sighand+0xb0/0xb0 [ 1693.017300] ? _copy_from_user+0xfb/0x1b0 [ 1693.018192] kernel_clone+0xe7/0x980 [ 1693.018980] ? __lockdep_reset_lock+0x180/0x180 [ 1693.019970] ? create_io_thread+0xf0/0xf0 [ 1693.020883] ? ksys_write+0x21a/0x260 [ 1693.021685] ? lock_downgrade+0x6d0/0x6d0 [ 1693.022572] __do_sys_clone3+0x1e5/0x320 [ 1693.023430] ? __do_sys_clone+0x110/0x110 [ 1693.024360] ? rcu_read_lock_any_held+0x75/0xa0 [ 1693.025344] ? vfs_write+0x354/0xb10 [ 1693.026138] ? fput_many+0x2f/0x1a0 [ 1693.026911] ? ksys_write+0x1a9/0x260 [ 1693.027741] ? __ia32_sys_read+0xb0/0xb0 [ 1693.028616] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1693.029728] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1693.030823] ? trace_hardirqs_on+0x5b/0x180 [ 1693.031752] do_syscall_64+0x33/0x40 [ 1693.032549] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1693.033630] RIP: 0033:0x7f4d52085b19 [ 1693.034427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.038277] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1693.039898] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1693.041429] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1693.042940] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.044468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1693.045981] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:30:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:21 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1693.157691] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1693.171688] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:30:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000200, 0x0, 0x0}, 0x58) [ 1708.041669] tmpfs: Unknown parameter 'cmntext' 15:30:36 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2a00, 0x0}}], 0x324, 0x0) 15:30:36 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2d00, 0x0}}], 0x324, 0x0) 15:30:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2063f14b2a0000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='cmntext=sysadm_u,defcontext=sysadm_u,\x00']) 15:30:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x40000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 53) 15:30:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1708.045271] tmpfs: Unknown parameter 'cmntext' [ 1708.052698] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1708.057987] FAULT_INJECTION: forcing a failure. [ 1708.057987] name failslab, interval 1, probability 0, space 0, times 0 [ 1708.060510] CPU: 1 PID: 17832 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1708.061966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1708.063715] Call Trace: [ 1708.064281] dump_stack+0x107/0x167 [ 1708.065057] should_fail.cold+0x5/0xa [ 1708.065867] ? anon_vma_fork+0x1ff/0x640 [ 1708.066718] should_failslab+0x5/0x20 [ 1708.067519] kmem_cache_alloc+0x5b/0x310 [ 1708.068382] anon_vma_fork+0x1ff/0x640 [ 1708.069209] copy_process+0x72cd/0x78b0 [ 1708.070051] ? SOFTIRQ_verbose+0x10/0x10 [ 1708.070951] ? __cleanup_sighand+0xb0/0xb0 [ 1708.071872] ? _copy_from_user+0xfb/0x1b0 [ 1708.072761] kernel_clone+0xe7/0x980 15:30:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x904d5f3a550000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1708.073545] ? __lockdep_reset_lock+0x180/0x180 [ 1708.074613] ? create_io_thread+0xf0/0xf0 [ 1708.075508] ? ksys_write+0x21a/0x260 [ 1708.076329] ? lock_downgrade+0x6d0/0x6d0 [ 1708.077210] __do_sys_clone3+0x1e5/0x320 [ 1708.078060] ? __do_sys_clone+0x110/0x110 [ 1708.078968] ? rcu_read_lock_any_held+0x75/0xa0 [ 1708.079956] ? vfs_write+0x354/0xb10 [ 1708.080741] ? fput_many+0x2f/0x1a0 [ 1708.081507] ? ksys_write+0x1a9/0x260 [ 1708.082314] ? __ia32_sys_read+0xb0/0xb0 [ 1708.083187] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1708.084304] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1708.085393] ? trace_hardirqs_on+0x5b/0x180 [ 1708.086305] do_syscall_64+0x33/0x40 [ 1708.087096] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1708.088207] RIP: 0033:0x7f4d52085b19 [ 1708.089010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1708.092936] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1708.094568] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1708.096101] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1708.097619] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1708.099137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1708.100670] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1708.121816] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:30:36 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f752c646566637f6e746578743d73797361646d5f752c00"]) 15:30:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4, 0x0, 0x0}, 0x58) [ 1708.172453] tmpfs: Unknown parameter 'defcntext' [ 1708.177989] tmpfs: Unknown parameter 'defcntext' 15:30:37 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11000000, 0x0, 0x0}, 0x58) 15:30:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0210c1b000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:37 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:30:37 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1708.260557] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:30:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 54) [ 1708.287618] SELinux: duplicate or incompatible mount options [ 1708.288819] SELinux: duplicate or incompatible mount options [ 1708.302676] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1708.393085] FAULT_INJECTION: forcing a failure. [ 1708.393085] name failslab, interval 1, probability 0, space 0, times 0 [ 1708.394445] CPU: 0 PID: 18049 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1708.395253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1708.396229] Call Trace: [ 1708.396545] dump_stack+0x107/0x167 [ 1708.396979] should_fail.cold+0x5/0xa [ 1708.397426] ? create_object.isra.0+0x3a/0xa30 [ 1708.397957] should_failslab+0x5/0x20 [ 1708.398398] kmem_cache_alloc+0x5b/0x310 [ 1708.398877] create_object.isra.0+0x3a/0xa30 [ 1708.399386] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1708.399984] kmem_cache_alloc+0x159/0x310 [ 1708.400469] ? copy_page_range+0x28e1/0x3810 [ 1708.400992] vm_area_dup+0x78/0x290 [ 1708.401432] ? copy_page_range+0x24e9/0x3810 [ 1708.401948] ? lock_chain_count+0x20/0x20 [ 1708.402467] ? vm_area_alloc+0x110/0x110 [ 1708.402948] ? up_write+0x191/0x550 [ 1708.403373] ? vm_iomap_memory+0x190/0x190 [ 1708.403871] ? downgrade_write+0x3a0/0x3a0 [ 1708.404367] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1708.404995] ? __vma_link_rb+0x540/0x700 [ 1708.405478] copy_process+0x298b/0x78b0 [ 1708.405937] ? SOFTIRQ_verbose+0x10/0x10 [ 1708.406454] ? __cleanup_sighand+0xb0/0xb0 [ 1708.406971] ? _copy_from_user+0xfb/0x1b0 [ 1708.407466] kernel_clone+0xe7/0x980 [ 1708.407904] ? __lockdep_reset_lock+0x180/0x180 [ 1708.408447] ? create_io_thread+0xf0/0xf0 [ 1708.408943] ? ksys_write+0x21a/0x260 [ 1708.409395] ? lock_downgrade+0x6d0/0x6d0 [ 1708.409888] __do_sys_clone3+0x1e5/0x320 [ 1708.410361] ? __do_sys_clone+0x110/0x110 [ 1708.410865] ? rcu_read_lock_any_held+0x75/0xa0 [ 1708.411401] ? vfs_write+0x354/0xb10 [ 1708.411843] ? fput_many+0x2f/0x1a0 [ 1708.412268] ? ksys_write+0x1a9/0x260 [ 1708.412709] ? __ia32_sys_read+0xb0/0xb0 [ 1708.413189] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1708.413797] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1708.414390] ? trace_hardirqs_on+0x5b/0x180 [ 1708.414893] do_syscall_64+0x33/0x40 [ 1708.415328] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1708.415927] RIP: 0033:0x7f4d52085b19 [ 1708.416358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1708.418487] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1708.419369] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1708.420201] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1708.421027] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1708.421854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1708.422687] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:30:51 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2b00, 0x0}}], 0x324, 0x0) 15:30:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 55) 15:30:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8, 0x0, 0x0}, 0x58) 15:30:51 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1ffff000, 0x0, 0x0}, 0x58) 15:30:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0ff1f00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:51 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:30:51 executing program 7: getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) r1 = semget(0x2, 0x0, 0x20b) r2 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r2, r0, r3, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) fchown(0xffffffffffffffff, 0xee00, r0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:30:51 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2e00, 0x0}}], 0x324, 0x0) [ 1722.514077] SELinux: duplicate or incompatible mount options [ 1722.526008] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1722.528246] SELinux: duplicate or incompatible mount options [ 1722.545289] FAULT_INJECTION: forcing a failure. [ 1722.545289] name failslab, interval 1, probability 0, space 0, times 0 [ 1722.547908] CPU: 1 PID: 18090 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1722.549363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1722.549546] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1722.551098] Call Trace: [ 1722.551127] dump_stack+0x107/0x167 [ 1722.551153] should_fail.cold+0x5/0xa [ 1722.554602] ? vm_area_dup+0x78/0x290 [ 1722.555409] should_failslab+0x5/0x20 [ 1722.556218] kmem_cache_alloc+0x5b/0x310 [ 1722.557068] ? copy_page_range+0x28e1/0x3810 [ 1722.557992] vm_area_dup+0x78/0x290 [ 1722.558769] ? copy_page_range+0x24e9/0x3810 [ 1722.559682] ? perf_trace_lock+0xac/0x490 [ 1722.560555] ? lock_chain_count+0x20/0x20 [ 1722.561462] ? vm_area_alloc+0x110/0x110 [ 1722.562321] ? up_write+0x191/0x550 [ 1722.563087] ? vm_iomap_memory+0x190/0x190 [ 1722.564009] ? downgrade_write+0x3a0/0x3a0 [ 1722.564909] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1722.566054] ? __vma_link_rb+0x540/0x700 [ 1722.566938] copy_process+0x298b/0x78b0 [ 1722.567784] ? SOFTIRQ_verbose+0x10/0x10 [ 1722.568713] ? __cleanup_sighand+0xb0/0xb0 [ 1722.569639] ? _copy_from_user+0xfb/0x1b0 [ 1722.570548] kernel_clone+0xe7/0x980 [ 1722.571347] ? __lockdep_reset_lock+0x180/0x180 [ 1722.572336] ? create_io_thread+0xf0/0xf0 [ 1722.573243] ? ksys_write+0x21a/0x260 [ 1722.574062] ? lock_downgrade+0x6d0/0x6d0 [ 1722.574966] __do_sys_clone3+0x1e5/0x320 [ 1722.575846] ? __do_sys_clone+0x110/0x110 [ 1722.576776] ? rcu_read_lock_any_held+0x75/0xa0 [ 1722.577775] ? vfs_write+0x354/0xb10 [ 1722.578580] ? fput_many+0x2f/0x1a0 [ 1722.579366] ? ksys_write+0x1a9/0x260 [ 1722.580204] ? __ia32_sys_read+0xb0/0xb0 [ 1722.581091] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1722.582203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1722.583295] ? trace_hardirqs_on+0x5b/0x180 [ 1722.584211] do_syscall_64+0x33/0x40 [ 1722.584988] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1722.586063] RIP: 0033:0x7f4d52085b19 [ 1722.586844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1722.590913] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1722.592934] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1722.594794] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1722.596680] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1722.598535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1722.600218] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:30:51 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f752c6465e6636f6e746578743d73797361646d5f752c00"]) [ 1722.638141] tmpfs: Unknown parameter 'deæcontext' 15:30:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:51 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1722.652527] tmpfs: Unknown parameter 'deæcontext' 15:30:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11, 0x0, 0x0}, 0x58) [ 1722.731659] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:30:51 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000040)='./file0\x00', 0x3f, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='huge=never,huge=advise,size=123,mode=00000000000000000000001,uid<', @ANYRESDEC=0x0, @ANYBLOB="6eb195232229afc6f0c71e"]) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x8000000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x21) 15:30:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x400000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:30:51 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000, 0x0, 0x0}, 0x58) 15:30:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100, 0x0, 0x0}, 0x58) [ 1722.786023] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1722.806149] tmpfs: Unsupported parameter 'huge' [ 1722.807753] tmpfs: Unsupported parameter 'huge' 15:31:08 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:31:08 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2f00, 0x0}}], 0x324, 0x0) 15:31:08 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2c00, 0x0}}], 0x324, 0x0) 15:31:08 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@reiserfs_6={0x18, 0x6, {0x7, 0x7, 0x7, 0xfffffff7, 0x2, 0x7ff}}, &(0x7f0000000080), 0x1000) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x100, 0x3, &(0x7f0000000380)=[{&(0x7f00000001c0)="53863ff51b18d582074afd7a27d758d73671b84e0318e8eb19744d815807808604f97ab8382c8277144dcaf99dec747f91df774586b6ecdfaee59bb9b13e0e56dfdf72d5af0344ee96bedb85fcd6d575f5db7bda4d83317274938911fcca0bfc9b2e924a913f2930fc90a8b0dedd6d4241c116ef35e702f1c878a6ce", 0x7c, 0x80000000}, {&(0x7f00000002c0)="64ba46a1a6de3f1b4faf1f2da89c9e53746090baac73f6f313fa555430342eae8ac6720f68ff95523808b76f5cb33cc82be75a4a900113496b8d40e1d277698386118851c1972b171f9fd87dc3d4a42b48b9e8f17321e377d6d1f4800d320a852a5aa494e390adb5d0e8a14aae77861ddc4a96ae40dab7d9add7760198e03c2e96c46e05af02118a2350ed64a715a8f0333e3b01c3eb42d0d787ff09349827edf1eded86", 0xa4, 0x7}, {&(0x7f0000000240)="ea8941bf1b204f2d0c813ad3708c7a7f33d9", 0x12, 0x1}], 0x300400, &(0x7f00000004c0)={[{@uid={'uid', 0x3d, 0xee00}}, {@utf8}, {@sbsector={'sbsector', 0x3d, 0xffffffffffffff88}}, {@unhide}, {@unhide}], [{@obj_role}, {@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_lt={'euid<', r0}}, {@dont_hash}, {@permit_directio}, {@seclabel}, {@obj_type={'obj_type', 0x3d, '!'}}]}) 15:31:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x800000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 56) 15:31:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000, 0x0, 0x0}, 0x58) 15:31:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f000000, 0x0, 0x0}, 0x58) [ 1739.613453] SELinux: duplicate or incompatible mount options [ 1739.622952] FAULT_INJECTION: forcing a failure. [ 1739.622952] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.624890] CPU: 0 PID: 18332 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1739.625988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.627290] Call Trace: [ 1739.627711] dump_stack+0x107/0x167 [ 1739.628313] should_fail.cold+0x5/0xa [ 1739.628918] ? vm_area_dup+0x78/0x290 [ 1739.629522] should_failslab+0x5/0x20 [ 1739.630126] kmem_cache_alloc+0x5b/0x310 [ 1739.630752] ? copy_page_range+0x28e1/0x3810 [ 1739.630882] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1739.631452] vm_area_dup+0x78/0x290 [ 1739.631500] ? copy_page_range+0x24e9/0x3810 [ 1739.634919] ? vm_area_alloc+0x110/0x110 [ 1739.635568] ? vm_iomap_memory+0x190/0x190 [ 1739.636266] ? __vma_link_rb+0x540/0x700 [ 1739.636935] copy_process+0x298b/0x78b0 [ 1739.637555] ? SOFTIRQ_verbose+0x10/0x10 [ 1739.638234] ? __cleanup_sighand+0xb0/0xb0 [ 1739.638932] ? _copy_from_user+0xfb/0x1b0 [ 1739.639606] kernel_clone+0xe7/0x980 [ 1739.640227] ? __lockdep_reset_lock+0x180/0x180 [ 1739.640968] ? create_io_thread+0xf0/0xf0 [ 1739.641642] ? ksys_write+0x21a/0x260 [ 1739.642236] ? lock_downgrade+0x6d0/0x6d0 [ 1739.642887] __do_sys_clone3+0x1e5/0x320 [ 1739.643525] ? __do_sys_clone+0x110/0x110 [ 1739.644213] ? rcu_read_lock_any_held+0x75/0xa0 [ 1739.644937] ? vfs_write+0x354/0xb10 [ 1739.645523] ? fput_many+0x2f/0x1a0 [ 1739.646087] ? ksys_write+0x1a9/0x260 [ 1739.646683] ? __ia32_sys_read+0xb0/0xb0 [ 1739.647332] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1739.648148] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1739.648947] ? trace_hardirqs_on+0x5b/0x180 [ 1739.649619] do_syscall_64+0x33/0x40 [ 1739.650209] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1739.651001] RIP: 0033:0x7f4d52085b19 [ 1739.651579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.654474] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1739.655649] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1739.656754] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1739.657853] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1739.658944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1739.660050] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1739.663102] loop7: detected capacity change from 0 to 135266304 [ 1739.680217] SELinux: duplicate or incompatible mount options [ 1739.681935] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1739.695074] loop7: detected capacity change from 0 to 135266304 15:31:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00, 0x0, 0x0}, 0x58) 15:31:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:08 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:31:08 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) symlinkat(&(0x7f0000000080)='\x00', r0, &(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='.\x00') faccessat(r0, &(0x7f0000000180)='./file0\x00', 0x18) 15:31:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x40000000, 0x0, 0x0}, 0x58) [ 1739.866002] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:31:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 57) [ 1739.889721] SELinux: duplicate or incompatible mount options 15:31:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000, 0x0, 0x0}, 0x58) [ 1739.905915] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1739.906427] SELinux: duplicate or incompatible mount options 15:31:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1739.989551] FAULT_INJECTION: forcing a failure. [ 1739.989551] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.992059] CPU: 1 PID: 18465 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1739.993545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.995312] Call Trace: [ 1739.995878] dump_stack+0x107/0x167 [ 1739.996668] should_fail.cold+0x5/0xa [ 1739.997497] ? create_object.isra.0+0x3a/0xa30 [ 1739.998456] should_failslab+0x5/0x20 [ 1739.999283] kmem_cache_alloc+0x5b/0x310 [ 1740.000172] create_object.isra.0+0x3a/0xa30 [ 1740.001102] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1740.002185] kmem_cache_alloc+0x159/0x310 [ 1740.003055] ? copy_page_range+0x28e1/0x3810 [ 1740.003988] vm_area_dup+0x78/0x290 [ 1740.004793] ? copy_page_range+0x24e9/0x3810 [ 1740.005722] ? perf_trace_lock+0xac/0x490 [ 1740.006628] ? lock_chain_count+0x20/0x20 [ 1740.007548] ? vm_area_alloc+0x110/0x110 [ 1740.008438] ? up_write+0x191/0x550 [ 1740.009222] ? vm_iomap_memory+0x190/0x190 [ 1740.010121] ? downgrade_write+0x3a0/0x3a0 [ 1740.011026] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1740.012177] ? __vma_link_rb+0x540/0x700 [ 1740.013056] copy_process+0x298b/0x78b0 [ 1740.013912] ? SOFTIRQ_verbose+0x10/0x10 [ 1740.014828] ? __cleanup_sighand+0xb0/0xb0 [ 1740.015749] ? _copy_from_user+0xfb/0x1b0 [ 1740.016643] kernel_clone+0xe7/0x980 [ 1740.017438] ? __lockdep_reset_lock+0x180/0x180 [ 1740.018443] ? create_io_thread+0xf0/0xf0 [ 1740.019339] ? ksys_write+0x21a/0x260 [ 1740.020155] ? lock_downgrade+0x6d0/0x6d0 [ 1740.021061] __do_sys_clone3+0x1e5/0x320 [ 1740.021925] ? __do_sys_clone+0x110/0x110 [ 1740.022831] ? rcu_read_lock_any_held+0x75/0xa0 [ 1740.023810] ? vfs_write+0x354/0xb10 [ 1740.024612] ? fput_many+0x2f/0x1a0 [ 1740.025382] ? ksys_write+0x1a9/0x260 [ 1740.026199] ? __ia32_sys_read+0xb0/0xb0 [ 1740.027076] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1740.028207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1740.029306] ? trace_hardirqs_on+0x5b/0x180 [ 1740.030232] do_syscall_64+0x33/0x40 [ 1740.031020] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1740.032101] RIP: 0033:0x7f4d52085b19 [ 1740.032896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1740.036849] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1740.038473] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1740.039998] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1740.041534] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1740.043062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1740.044594] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 15:31:24 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3000, 0x0}}], 0x324, 0x0) 15:31:24 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:31:24 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2d00, 0x0}}], 0x324, 0x0) 15:31:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20010, 0x0, 0x0}, 0x58) 15:31:24 executing program 7: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000040)={0x3, 0x28, [0xfff, 0x8, 0x330a], &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:31:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000800, 0x0, 0x0}, 0x58) 15:31:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 58) [ 1756.049062] FAULT_INJECTION: forcing a failure. [ 1756.049062] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.050687] CPU: 0 PID: 18579 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 1756.051658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1756.052843] Call Trace: [ 1756.053225] dump_stack+0x107/0x167 [ 1756.053752] should_fail.cold+0x5/0xa [ 1756.054306] ? create_object.isra.0+0x3a/0xa30 [ 1756.054953] should_failslab+0x5/0x20 [ 1756.055494] kmem_cache_alloc+0x5b/0x310 [ 1756.056085] create_object.isra.0+0x3a/0xa30 [ 1756.056720] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1756.057452] kmem_cache_alloc+0x159/0x310 [ 1756.058048] vm_area_dup+0x78/0x290 [ 1756.058571] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1756.059226] ? lock_downgrade+0x6d0/0x6d0 [ 1756.059807] ? perf_trace_lock+0xac/0x490 [ 1756.060410] ? copy_page_range+0x24e9/0x3810 [ 1756.061030] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1756.061769] ? __lockdep_reset_lock+0x180/0x180 [ 1756.062430] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1756.063086] ? avc_has_extended_perms+0xf40/0xf40 [ 1756.063763] ? copy_process+0x2be1/0x78b0 [ 1756.064362] ? vm_area_alloc+0x110/0x110 [ 1756.064946] ? selinux_vm_enough_memory+0x114/0x180 [ 1756.065648] ? selinux_sb_statfs+0x250/0x250 [ 1756.066271] ? up_write+0x191/0x550 [ 1756.066790] ? percpu_counter_add_batch+0x8b/0x140 [ 1756.067487] ? __vm_enough_memory+0x184/0x360 [ 1756.068111] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1756.068852] copy_process+0x298b/0x78b0 [ 1756.069466] ? __cleanup_sighand+0xb0/0xb0 [ 1756.070100] ? _copy_from_user+0xfb/0x1b0 [ 1756.070685] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1756.070696] kernel_clone+0xe7/0x980 [ 1756.070717] ? __lockdep_reset_lock+0x180/0x180 [ 1756.074174] ? create_io_thread+0xf0/0xf0 [ 1756.074781] ? ksys_write+0x21a/0x260 [ 1756.075314] ? lock_downgrade+0x6d0/0x6d0 [ 1756.075903] __do_sys_clone3+0x1e5/0x320 [ 1756.076482] ? __do_sys_clone+0x110/0x110 [ 1756.077097] ? rcu_read_lock_any_held+0x75/0xa0 [ 1756.077756] ? vfs_write+0x354/0xb10 [ 1756.078285] ? fput_many+0x2f/0x1a0 [ 1756.078797] ? ksys_write+0x1a9/0x260 [ 1756.079344] ? __ia32_sys_read+0xb0/0xb0 [ 1756.079921] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1756.080664] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1756.081377] ? trace_hardirqs_on+0x5b/0x180 [ 1756.081991] do_syscall_64+0x33/0x40 [ 1756.082508] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1756.083230] RIP: 0033:0x7f4d52085b19 [ 1756.083758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1756.086317] RSP: 002b:00007f4d4f5fb188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1756.087371] RAX: ffffffffffffffda RBX: 00007f4d52198f60 RCX: 00007f4d52085b19 [ 1756.088371] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000340 [ 1756.089360] RBP: 00007f4d4f5fb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1756.090369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1756.091364] R13: 00007ffff357c8af R14: 00007f4d4f5fb300 R15: 0000000000022000 [ 1756.096652] SELinux: duplicate or incompatible mount options [ 1756.116139] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:31:24 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x200008, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x3a, 0x45}}}}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockname(r1, &(0x7f0000000040)=@sco, &(0x7f00000000c0)=0x80) 15:31:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1b0be1f000, 0x0, 0x0}, 0x58) 15:31:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20200, 0x0, 0x0}, 0x58) [ 1756.178000] tmpfs: Unknown parameter 'mask' [ 1756.185039] tmpfs: Unknown parameter 'mask' 15:31:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:25 executing program 7: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000580)={[0x7]}, 0x8) fchmodat(r0, &(0x7f00000005c0)='./file0\x00', 0x22) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:31:25 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1756.276201] SELinux: duplicate or incompatible mount options [ 1756.290461] SELinux: duplicate or incompatible mount options [ 1756.300284] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1756.324896] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:31:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x80000, 0x0, 0x0}, 0x58) 15:31:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xffffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:40 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3100, 0x0}}], 0x324, 0x0) 15:31:40 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2e00, 0x0}}], 0x324, 0x0) 15:31:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:40 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xbf}}, './file0\x00'}) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000001e00)=@IORING_OP_WRITEV={0x2, 0xb3730263a51aca06, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x5) syz_io_uring_submit(r3, 0x0, &(0x7f0000001300)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}, 0x5) renameat2(r2, &(0x7f0000000240)='./file0\x00', r0, &(0x7f00000012c0)='./file0\x00', 0x2) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f0000000080)=[{&(0x7f00000002c0)="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", 0x1000, 0x5bdd85}], 0x2, &(0x7f0000001340)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c73786f72746e616d653d77696e6e742c696f636861727365743d63703836312c646973636172642c756e695f786c6174653d312c756e695f786c6174653d312c757466383d302c736d61636b6673666c6f6f723d636f6e7465983db643dd3ff1d6633d4b455845435f494e495452414d46535f434845434b2c66756e633d46494c455f4d4d41502c756964", @ANYRESDEC=r1, @ANYBLOB=',audit,\x00']) 15:31:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:31:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000000000, 0x0, 0x0}, 0x58) [ 1771.398429] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1771.408485] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1771.421082] SELinux: duplicate or incompatible mount options 15:31:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:31:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2a017d481000, 0x0, 0x0}, 0x58) 15:31:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) [ 1771.511845] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1771.522745] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:31:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x101000, 0x0, 0x0}, 0x58) 15:31:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1771.607856] SELinux: duplicate or incompatible mount options [ 1771.619577] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1771.620879] SELinux: duplicate or incompatible mount options 15:31:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x553a6314c000, 0x0, 0x0}, 0x58) [ 1771.645272] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:31:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1771.738446] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:31:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:31:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1771.769186] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1771.795969] SELinux: duplicate or incompatible mount options [ 1771.798006] SELinux: duplicate or incompatible mount options [ 1785.233904] tmpfs: Unknown parameter 'obj_role' [ 1785.235398] tmpfs: Unknown parameter 'obj_role' 15:31:54 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3200, 0x0}}], 0x324, 0x0) 15:31:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x200000, 0x0, 0x0}, 0x58) 15:31:54 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2f00, 0x0}}], 0x324, 0x0) 15:31:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2001000000000, 0x0, 0x0}, 0x58) 15:31:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:31:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:54 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f752c6f626a5f726f6c653d746d706673002c6f626a5f726f6c653d2c009448f46de70a11a8019477f7b2d3fde406d803088531b488c9e90c3701ee42253f4a2b237b281114edb55253f0d206c0b154e2bbb5a912953af077f4ec65b96184523f947c3cfa57cbc9ce0fd389f7a60246b15ef4ad8e7a1f7734080ea2f4e6e674c5ca842ac1ef497c324e1dce4eebcf9e3c36e018970a733e48b41238263d9ca58f709a564a0b0682382d0c31140f50000eef127da83ffb2b7655d734698b35a036f679b4593b205253bd44cb3d46711eb3bc83b718453703e94fce7fc1624b76f5c3e2772e"]) [ 1785.251788] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1785.268105] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:31:54 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0xbe) 15:31:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1785.328416] SELinux: duplicate or incompatible mount options [ 1785.333332] SELinux: duplicate or incompatible mount options 15:31:54 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@audit}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1785.381029] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:31:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f, 0x0, 0x0}, 0x58) [ 1785.405876] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:31:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:31:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1785.450927] tmpfs: Unknown parameter 'audit' [ 1785.457490] tmpfs: Unknown parameter 'audit' 15:31:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2020000000000, 0x0, 0x0}, 0x58) 15:31:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1785.570942] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1785.608162] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:09 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3000, 0x0}}], 0x324, 0x0) 15:32:09 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f7509646566636f66746578543d73797361646d5f752c007d62d03a6fb5664550577fea63bb10a2f6c1834d81089c99ec84e08462410ebf2dd61b1b92219b6cf67f4a60637630c7c58d151ec08b812489e0f1114dde92c5da6afd4b0d237128096877c69917c1ffc1ccddddd4b4e413e6781ff27a31c0d0c8c4a470cea0a63b0e5468f8475ddb712bfb1ac982c253ca1691c32fb268dd0a245262a9c7f071372d28283f4225ef0fed29ccf7cacd379151b85485e4d1f5fce9dcc6c3b2181e4941a2f238a4d2c07ef8dac2c803cf"]) 15:32:09 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3300, 0x0}}], 0x324, 0x0) 15:32:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000, 0x0, 0x0}, 0x58) 15:32:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x11, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:09 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000000000, 0x0, 0x0}, 0x58) 15:32:09 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1800.937900] SELinux: security_context_str_to_sid(sysadm_u defcoftexT=sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1800.951982] SELinux: security_context_str_to_sid(sysadm_u defcoftexT=sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1800.957609] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000, 0x0, 0x0}, 0x58) 15:32:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1800.997272] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:09 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setsig(r0, 0xa, 0x17) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) write$rfkill(r0, &(0x7f0000000180)={0x4, 0x4, 0x2, 0x0, 0x1}, 0x8) r1 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xfedd, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="637379726164f3eb242fac8c8b6245096d5f736164545f"]) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000000)) 15:32:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1801.049636] tmpfs: Unknown parameter 'csyradóë$/¬Œ‹bE m_sadT_' [ 1801.058497] tmpfs: Unknown parameter 'csyradóë$/¬Œ‹bE m_sadT_' 15:32:23 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3100, 0x0}}], 0x324, 0x0) 15:32:23 executing program 7: keyctl$join(0x1, &(0x7f00000003c0)={'syz', 0x3}) keyctl$join(0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x8001, 0x2, &(0x7f0000000080)=[{&(0x7f0000000180)="030a0c39dcd4b2c496c6883dcd698d7c07290a2d7bf8bf7d83e6310db825de69cced0509684bf75ee522f0e452edd7a4944bdba4293937031e75bd291b71033c047725cc7ac0cc7ca8ef606c36b8e59c5758b0669b772cab53ddf4c7cafdd6e9ffc63c0afa85c128648e3eea03d44a339c4c86bbc484f505808cc543b571277a2e4d2e9821b18c9ffc6a5f239252e9bca78425963471feefd54d48fb2d5cd3a608d36ede0cfc204ac25628d28acca57a9faf25e9052f966d081ddb3c2fbcaacb29733ce3939f250eebdd634b36a52f100de98e92e69d786a2f44b4018e2f13311ec45d6d30306b152b76f5aa705bd50f", 0xf0, 0x40}, {&(0x7f00000002c0)="1271b8670188b4531fe22b66a30f4c780afbbc4ab5be73c0ccceb0a9aa755900a51af03515c668ed322524f7fdbb12479977f53c6a8ebc73f14067b32f3b6995134a19239413c7b38275a79bf3066e94702e12afff43f939ee53eb8f2dd8eac5e99252a4da8aa61b4f32722f9f46b9a14043c7e9effe86a99710d445d5b2cbd311dd2272d9ead4acf4fecb2fe52b3d5347937c74ebb5ed3c5cf94df42664e31a21292e925ac148172f6e9a6fb94192e41e11f8305f241d496f29e3c5ddefad4538e4cad3a102189a3f74fa9de74fcfa6", 0xd0, 0x8}], 0x2012088, &(0x7f0000000600)=ANY=[@ANYBLOB="67727069642c6a6f75726e616c5f6173796e635f636f6d6d69742c6d696e5f62617463685f74696d653d3078303030303030303030303030303030342c67727071756f74612c6e6f646973636172642c6d296e5f62617463685f74696d653d3078303030303030303030303030303030382c6772706a71756f74613d2e2f66696c65302c6e6f696e69745f697461626c652c61756469742c7375626a5fff6f6c653d646566636f6e746578742c666f776e65723c", @ANYRESDEC=0xee00, @ANYBLOB="70653d2c000001000000000000084713c1d8e7f1a08e550800e16f1b25c8ce43cb82a1"]) fsetxattr$security_capability(r0, &(0x7f00000000c0), &(0x7f00000004c0)=@v3={0x3000000, [{0x4}, {0x80000000, 0x8001}], 0xffffffffffffffff}, 0x18, 0x1) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) keyctl$join(0x1, &(0x7f0000000440)={'syz', 0x1}) signalfd(r1, &(0x7f0000000400)={[0x7fffffff]}, 0x8) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:23 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3400, 0x0}}], 0x324, 0x0) 15:32:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:23 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000001000000, 0x0, 0x0}, 0x58) 15:32:23 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000, 0x0, 0x0}, 0x58) 15:32:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x3f00}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1814.933212] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1814.960756] loop7: detected capacity change from 0 to 32768 [ 1814.972671] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1814.988538] SELinux: duplicate or incompatible mount options 15:32:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000200, 0x0, 0x0}, 0x58) 15:32:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:23 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10100000000000, 0x0, 0x0}, 0x58) 15:32:23 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 15:32:23 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20010}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1815.161455] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1815.170113] tmpfs: Bad value for 'uid' [ 1815.178983] tmpfs: Bad value for 'uid' [ 1815.191116] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:40 executing program 7: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@private2}}, &(0x7f0000000080)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000280)={[{@uid={'uid', 0x3d, r0}}, {@huge_advise}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20200}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11000000, 0x0, 0x0}, 0x58) 15:32:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:40 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3200, 0x0}}], 0x324, 0x0) 15:32:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10487d012a0000, 0x0, 0x0}, 0x58) 15:32:40 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3500, 0x0}}], 0x324, 0x0) [ 1831.882481] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1831.902439] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000040)=@generic={0x29, "6ee8ae697eafb0b8e2f1cb4c4a9e3c5092d4a79fef291762f1ea01a61868ca4503caacb776bab3672c193db37a1fb2b3473e074d21011fa817473cfae16120866a2e0ef8c21891edf0e0781657149302c00d337dd2f7b94b7ff0b1371aa5105013b0ba24e2db76f646d441bec87333e85f43adb83d772ccf6f6b6e8f4b58"}, 0x80, &(0x7f0000001300)=[{&(0x7f00000000c0)="402910aaad6fe1d10cc741a9f3d77352d7f0a0", 0x13}, {&(0x7f0000000180)="2e54130e36544422c6446cd58be4a2b5c51f615c8ce6a6c9dc4830655272d15b8df95aebd58a4e2c8b930e1cfcceb55a088d398e4434c8d199b2e8394425b34ad9f7573d6a8b6c2368493e886616b69cdbae00d6b47e15f11fe28f25a5433100f5968b317aa2b608c2c660c1bc12f156e5c8f4106d2439a7dd1fc6d08e018a2be61d9890e0a47d5d69f4492159c580b0755fa348188b42824f72034fbad0093e1627c7a441e5daf909407b98d939d1a2089b6a9cf58e78e423a5f09d5c7d7bb53a6c38f19d95dfd53a7202ad9e676e516ceddcb499665eeaeda6fe2bf1", 0xdd}, {&(0x7f00000002c0)="a0227b59", 0x4}, {&(0x7f0000000300)="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", 0x1000}], 0x4}, 0x41) 15:32:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1ffff000, 0x0, 0x0}, 0x58) 15:32:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1832.057504] SELinux: duplicate or incompatible mount options [ 1832.065830] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1832.067908] SELinux: duplicate or incompatible mount options [ 1832.090121] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x101000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000000000, 0x0, 0x0}, 0x58) 15:32:40 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x80000) 15:32:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000, 0x0, 0x0}, 0x58) [ 1832.196978] SELinux: duplicate or incompatible mount options [ 1832.210910] SELinux: duplicate or incompatible mount options [ 1832.236820] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x200000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1832.274709] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xc014633a550000, 0x0, 0x0}, 0x58) 15:32:55 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3300, 0x0}}], 0x324, 0x0) 15:32:55 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3600, 0x0}}], 0x324, 0x0) [ 1846.634759] tmpfs: Unknown parameter 'contexu' [ 1846.650134] tmpfs: Unknown parameter 'contexu' [ 1846.650286] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:55 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6e746578753d73797361646d411d334e81f85e707e265007743d8c797361646d5f752c0020a93683f23d024fe1eb1d70d4958694dc013d6ffdbb0daa8a83f36d85dc5bb38734bcd0c990e8a5673f508dd3c6d28d056c8c512e09b7cc0dd3ce98a0e640a8dfc56e8e1d9a0196eb7bd6bf72c2572ad9e39e46e934d802655efd06921bc0be7974110a4bb5320c62f6739281"]) 15:32:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f000000, 0x0, 0x0}, 0x58) 15:32:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0xf0ff1f}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1846.669225] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:32:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x40000000, 0x0, 0x0}, 0x58) 15:32:55 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) rmdir(&(0x7f0000000000)='./file0\x00') 15:32:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x200000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1846.796177] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0e10b1b000000, 0x0, 0x0}, 0x58) [ 1846.808179] SELinux: duplicate or incompatible mount options [ 1846.814767] SELinux: duplicate or incompatible mount options 15:32:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1846.820053] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:32:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:32:55 executing program 7: pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4f2d3a41e03e150c, 0xffffffffffffffff) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='context=sysacou,\x00\x00\x00']) [ 1846.916172] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1846.924495] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1846.976191] SELinux: security_context_str_to_sid(sysacou) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1846.986527] SELinux: security_context_str_to_sid(sysacou) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:14 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3400, 0x0}}], 0x324, 0x0) 15:33:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000800, 0x0, 0x0}, 0x58) 15:33:14 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000240)={'U-', 0x1ff}, 0x16, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x40020, &(0x7f0000000180)={[{@xattr}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@subsystem='devices'}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@clone_children}, {@none}, {@subsystem='perf_event'}], [{@fsname={'fsname', 0x3d, '@'}}, {@euid_lt={'euid<', 0xee01}}, {@pcr}]}) 15:33:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0ff1f, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x8000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:14 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:33:14 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f00000000, 0x0, 0x0}, 0x58) 15:33:14 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3700, 0x0}}], 0x324, 0x0) [ 1866.100577] SELinux: duplicate or incompatible mount options [ 1866.109709] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1866.114833] SELinux: duplicate or incompatible mount options [ 1866.146296] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1b0bd1f000, 0x0, 0x0}, 0x58) 15:33:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x10000200}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:15 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:15 executing program 7: stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@huge_always}, {@huge_always}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) 15:33:15 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:33:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000000000000, 0x0, 0x0}, 0x58) [ 1866.306108] SELinux: duplicate or incompatible mount options [ 1866.354002] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000000000, 0x0, 0x0}, 0x58) [ 1866.393647] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:29 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3800, 0x0}}], 0x324, 0x0) 15:33:29 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3500, 0x0}}], 0x324, 0x0) 15:33:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x11000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:29 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xff03000000000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:33:29 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f79da82a4743d73797361646d5f752c646566636f6e746578743d73797361646d5f752c001e1f188866150fc1e288af0a298326d9737fc1b94b18ac0b2eb34165e1a901980cc6ebd8249b9e9ea7a942f5e775af6c7dbfcee8b1b3a26682001ba9ee"]) 15:33:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2a3a2c653000, 0x0, 0x0}, 0x58) 15:33:29 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x400000000000000, 0x0, 0x0}, 0x58) [ 1880.740921] tmpfs: Unknown parameter 'coyÚ‚¤t' [ 1880.753296] tmpfs: Unknown parameter 'coyÚ‚¤t' [ 1880.766735] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1880.802597] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x553a5e7f8000, 0x0, 0x0}, 0x58) 15:33:29 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="687567653d6e657665852cef006e74b0cd74b352646566636f6e746578743d73797361646d5f752c00d74693160a47aab559a643fd3496fed4cc0416125c1facf33ae4ad7fa5b24364566b52"]) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x20, 0x3, &(0x7f0000000300)=[{&(0x7f0000000180)="b1505120a388492e81dc456eacfe0bbb6b8182b6f38f570f3985b906ba989e39480f2d469b3bc0f2c493e34cd6d6bc8febefdd5d7b219c7c47402e1e24d47d74884c6ba37e1b605888b7bdf0769e082492e2fb3382d766f2614cc75f7334f49691e4427b6cdb0588442182a8b76bc6c9cc8d055771b299e5cc1de70f79f2679a541da22af8926a1198be8ff96697cfa7f7df31b02605f5a9e212d0093773deaad40020f7b68f662299654597da3b2ba75782e92230ddf5efb50e00ecefa197838c8d29a4eb", 0xc5, 0x7}, {&(0x7f0000000280)="57db16edcebbf56000248c28a3f67f2c373908f3955e6d9b6a8ed137fc36", 0x1e, 0xe0000000000}, {&(0x7f00000002c0)="9561d247f4b46b18ae37895aca54847a2afa7324420e30f3161ccd35818f98dd98", 0x21}], 0x800000, &(0x7f0000000380)={[], [{@subj_user}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 15:33:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1ffff000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:29 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1880.916506] tmpfs: Bad value for 'huge' 15:33:29 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x800000000000000, 0x0, 0x0}, 0x58) [ 1880.945775] loop7: detected capacity change from 0 to 135266304 [ 1880.948025] tmpfs: Unknown parameter 'subj_user' [ 1880.955716] tmpfs: Bad value for 'huge' 15:33:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2001000000000, 0x0, 0x0}, 0x58) [ 1881.024873] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1881.068431] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:44 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3900, 0x0}}], 0x324, 0x0) 15:33:44 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x56, 0x6, 0xbf3, 0x28, @empty, @loopback, 0x8, 0x7, 0x5b, 0x3}}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={@private2, 0x36, r1}) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 15:33:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2020000000000, 0x0, 0x0}, 0x58) 15:33:44 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:33:44 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100000000000000, 0x0, 0x0}, 0x58) 15:33:44 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3600, 0x0}}], 0x324, 0x0) [ 1895.518826] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1895.523418] SELinux: duplicate or incompatible mount options [ 1895.545782] SELinux: duplicate or incompatible mount options [ 1895.553561] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x3f000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000000000, 0x0, 0x0}, 0x58) 15:33:44 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000000000000, 0x0, 0x0}, 0x58) 15:33:44 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f752c646566637f6e746578743d73797361646d5f752c00"]) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="4646acbb69b4e3a5b68701fe030bdcbcc8b8872c85eda9f319f70e1f68163013394678166d84211629e2596a71236eb64cb5a8fa059e793b14115f9fc7c1aa8e253c4064234bba4a91d42c1dd6383bc0cd82c9626b86950032d5e9e64ff2c727975e222021e95bd704435d5a6db8d07730d075c2b3a729ee", 0x78, 0x8}], 0x40000, &(0x7f00000002c0)={[{@huge_always}, {@uid={'uid', 0x3d, r1}}, {@nr_inodes={'nr_inodes', 0x3d, [0x78, 0x6b, 0x65, 0x74]}}, {@huge_always}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x0, 0x70, 0x39, 0x39, 0x2d, 0x78, 0x39, 0x25, 0x36]}}, {@uid={'uid', 0x3d, r2}}, {@nr_blocks={'nr_blocks', 0x3d, [0x67, 0x36]}}], [{@audit}, {@hash}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x61, 0x90, 0x61, 0x63, 0x65, 0x36, 0x33], 0x2d, [0x56, 0x0, 0x38, 0x64], 0x2d, [0x0, 0x38, 0x39, 0x30], 0x2d, [0x35, 0x63, 0x37, 0x31], 0x2d, [0x67, 0x36, 0x32, 0x33, 0x65, 0x30, 0x31, 0x33]}}}, {@hash}, {@subj_user={'subj_user', 0x3d, 'sysadm_u'}}, {@appraise}, {@appraise_type}, {@hash}, {@appraise_type}, {@obj_role={'obj_role', 0x3d, '\\:\x95}%@#'}}]}) 15:33:44 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:33:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x40000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:44 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1ffff000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1895.730836] tmpfs: Unknown parameter 'defcntext' [ 1895.740966] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1895.762096] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1910.360897] tmpfs: Unknown parameter 'fowner' 15:33:59 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3700, 0x0}}], 0x324, 0x0) 15:33:59 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00000000000000, 0x0, 0x0}, 0x58) 15:33:59 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3a00, 0x0}}], 0x324, 0x0) 15:33:59 executing program 7: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000080)={[], [{@fowner_eq={'fowner', 0x3d, r0}}, {@obj_type}, {@fsname={'fsname', 0x3d, 'tmpfs\x00'}}, {@fowner_eq={'fowner', 0x3d, r0}}]}) 15:33:59 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:33:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000001000000, 0x0, 0x0}, 0x58) 15:33:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4, 0x0, 0x0}, 0x58) [ 1910.402143] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8, 0x0, 0x0}, 0x58) 15:33:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10100000000000, 0x0, 0x0}, 0x58) [ 1910.447881] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:59 executing program 7: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8, 0xc00}], 0x1) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:33:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:33:59 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:33:59 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000000000000, 0x0, 0x0}, 0x58) [ 1910.600736] SELinux: duplicate or incompatible mount options 15:33:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11, 0x0, 0x0}, 0x58) [ 1910.658844] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:33:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000000000, 0x0, 0x0}, 0x58) [ 1910.699412] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:34:16 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:34:16 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:34:16 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3800, 0x0}}], 0x324, 0x0) 15:34:16 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3b00, 0x0}}], 0x324, 0x0) 15:34:16 executing program 7: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@nr_inodes={'nr_inodes', 0x3d, [0x65]}}, {@uid={'uid', 0x3d, r1}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6d, 0x30, 0xe8, 0x34]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x37, 0x37, 0x39]}}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x5, &(0x7f0000000400)=[{&(0x7f0000000080)="7b91ed95699bdf65105ab42da8a47cf654e5ba4cfd11b1be7f079332bee9b83675e001f19f559af857f8a4ea756b15557e3e3ca23b13fc113348bd722629daabb9a52360d65e82b4ab7647389734e6615f3909464ad63f94271924d56c759226a051d7ced302367b58be2b", 0x6b, 0x4}, {&(0x7f0000000180)="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", 0xfd, 0x5}, {&(0x7f00000002c0)="4486846601875870b33ccff62aaa8937431c156f6a49f87511e435fd6d34fdb8d1051aaa338623b7e7fcf2b8ecf7340863761829966154b1d66445c872c61db2fb64f7a35037df2d29ef8b38983810cb2f51147d5509c8cfcbf38a3ea602c232818ace8c7f0f3fa7c710", 0x6a}, {&(0x7f0000000340)="a91cf7ca38904fb0d71366", 0xb, 0x3fffffffc0}, {&(0x7f0000000380)="7a6d0394a746b9838c9841317b7be1d61f16c743431dcfc4741d17f6f242076a3046ce4f632ca88610065f137f6113986bcb20d3ae63da780bd4bdaf1ef71eac3e79abc00cbb1d5dc5d517897eb4b0689f7f2fb7", 0x54, 0x7}], 0x40001, &(0x7f0000000480)={[{@shortname_lower}, {@nonumtail}], [{@appraise_type}]}) 15:34:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x30652c3a2a0000, 0x0, 0x0}, 0x58) 15:34:16 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffff00000000, 0x0, 0x0}, 0x58) 15:34:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100, 0x0, 0x0}, 0x58) [ 1927.599908] tmpfs: Bad value for 'nr_blocks' [ 1927.601629] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1927.643008] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:34:16 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfstransmute}]}) 15:34:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x807f5e3a550000, 0x0, 0x0}, 0x58) 15:34:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000, 0x0, 0x0}, 0x58) 15:34:16 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1927.756509] tmpfs: Unknown parameter 'smackfstransmute' [ 1927.769067] tmpfs: Unknown parameter 'smackfstransmute' 15:34:16 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x58) 15:34:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0d10b1b000000, 0x0, 0x0}, 0x58) [ 1927.855691] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:34:16 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6e74657a7494d3619961646d5f752c646566636f6e746578743d73797361646d5f752c00"]) 15:34:16 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x100000800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1927.900884] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:34:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00, 0x0, 0x0}, 0x58) [ 1927.956783] tmpfs: Unknown parameter 'contezt”Óa™adm_u' [ 1927.967143] tmpfs: Unknown parameter 'contezt”Óa™adm_u' 15:34:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1b0c01f000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:34:39 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3c00, 0x0}}], 0x324, 0x0) 15:34:39 executing program 7: ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, &(0x7f0000000000)=0x2) 15:34:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000, 0x0, 0x0}, 0x58) 15:34:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x58) 15:34:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f00000000, 0x0, 0x0}, 0x58) 15:34:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:34:39 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3900, 0x0}}], 0x324, 0x0) [ 1950.854968] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:34:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000000000000, 0x0, 0x0}, 0x58) 15:34:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20010, 0x0, 0x0}, 0x58) [ 1950.884261] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:34:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:34:39 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1e2) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x0, 0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) creat(&(0x7f0000000040)='./file0\x00', 0x80) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0), 0xc04, 0x0) 15:34:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1950.955199] SELinux: duplicate or incompatible mount options [ 1951.005202] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1951.018840] SELinux: duplicate or incompatible mount options [ 1951.044266] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:34:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x400000000000000, 0x0, 0x0}, 0x58) 15:34:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x29f7e1eb2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:34:53 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3a00, 0x0}}], 0x324, 0x0) 15:34:53 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3d00, 0x0}}], 0x324, 0x0) 15:34:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20200, 0x0, 0x0}, 0x58) 15:34:54 executing program 7: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x0) fsync(r0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:34:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:34:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x58) [ 1965.190201] SELinux: duplicate or incompatible mount options [ 1965.212571] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1965.251628] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:34:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x800000000000000, 0x0, 0x0}, 0x58) 15:34:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x553a3f6e7000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:34:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x80000, 0x0, 0x0}, 0x58) 15:34:54 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x5) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r3, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x8}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x6040084) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000000000000002000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000100000009000000001000000000000004000000000000000200000000000000000000006000000000000000000000000000000000000000000000000000000080000000f30000000000000000000000ffffffff000000000900000000000000ff0300"/320]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000001c0)={{0x40, 0x8}, 'port0\x00', 0xee, 0x461, 0x1000, 0x7, 0xc5c, 0xbef5, 0x3, 0x0, 0x1, 0x4}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001d004527004000000000000006"], 0x14}}, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r7, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x1}, {0x2, 0x8, r5}, {0x2, 0xb, 0xee00}, {0x2, 0x4, r6}, {0x2, 0x0, r7}], {0x4, 0x5}, [{0x8, 0x2, 0xee01}, {0x8, 0x6, 0xee01}], {0x10, 0x6}}, 0x5c, 0x3) read(r4, &(0x7f0000000100)=""/153, 0x99) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r4) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:34:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:34:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x58) 15:34:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x101000, 0x0, 0x0}, 0x58) 15:34:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2001000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1965.505675] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1965.521911] SELinux: duplicate or incompatible mount options 15:34:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100000000000000, 0x0, 0x0}, 0x58) [ 1965.537861] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:34:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x200000, 0x0, 0x0}, 0x58) 15:35:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x58) 15:35:08 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:35:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2020000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:35:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000000000000, 0x0, 0x0}, 0x58) 15:35:08 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000080)='./file0/file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, 'tmpfs\x00'}}]}) openat(r0, &(0x7f0000000040)='./file1\x00', 0x10000, 0x24) 15:35:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f, 0x0, 0x0}, 0x58) 15:35:08 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3b00, 0x0}}], 0x324, 0x0) 15:35:08 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3e00, 0x0}}], 0x324, 0x0) [ 1979.794029] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1979.809000] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:35:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00000000000000, 0x0, 0x0}, 0x58) 15:35:08 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:35:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000, 0x0, 0x0}, 0x58) 15:35:08 executing program 7: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8041}, 0x20008040) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:35:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1979.931701] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1979.946302] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:35:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x58) 15:35:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000000000000, 0x0, 0x0}, 0x58) 15:35:08 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2e, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1980.014661] SELinux: duplicate or incompatible mount options 15:35:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffff00000000, 0x0, 0x0}, 0x58) 15:35:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000, 0x0, 0x0}, 0x58) [ 1980.056937] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:35:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x8000001000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1980.073031] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:35:24 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3c00, 0x0}}], 0x324, 0x0) 15:35:24 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3f00, 0x0}}], 0x324, 0x0) 15:35:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000, 0x0, 0x0}, 0x58) 15:35:24 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:35:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x58) 15:35:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x58) 15:35:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x10100000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:35:24 executing program 7: stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x80000000) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nr_blocks={'nr_blocks', 0x3d, [0x78]}}, {@huge_never}, {@mode={'mode', 0x3d, 0xfffffffffffffffc}}, {@huge_advise}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 1995.904601] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1995.927129] SELinux: duplicate or incompatible mount options 15:35:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000200, 0x0, 0x0}, 0x58) [ 1995.945014] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:35:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:35:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x58) 15:35:24 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000180)="89fa3cecbcf081502540dea7963b3db6994544f752dae8322400f2dced8a6caba28a226def0fb2108cdbc6c07e78559abca8593a74065ca8b490a7961b6adc237a01db9a0b8fe03d545489fc417350dc141c43b140cb24e2076eb231d8f09221ab04a95ab0b9c2806ff36e3ef4f8187f8fc0f1017ae36871c67f6fe391fe0556eb02986687e7", 0x86, 0x100000000}, {&(0x7f0000000080)="32efe06476a41223ea5eeebef205fe6358efe11a66799a0a0c6e167e069fec603065825facbe66a251b00c7c3e9c837e74", 0x31, 0x1f}], 0x2084080, &(0x7f00000002c0)={[{'sysadm_u'}, {'/]-\\'}, {}, {'$&*-]-&\x9d+%'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'defcontext'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x64, 0x37, 0x34, 0x65, 0x62, 0x38], 0x2d, [0x66, 0x38, 0x39, 0x35], 0x2d, [0x34, 0x66, 0x37, 0x30], 0x2d, [0x30, 0x36, 0x52, 0x39], 0x2d, [0x63, 0x38, 0x61, 0x64, 0x39, 0x62, 0x34, 0x37]}}}]}) 15:35:24 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:35:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20010}, 0x58) [ 1996.129925] SELinux: duplicate or incompatible mount options [ 1996.146165] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1996.157099] loop7: detected capacity change from 0 to 135266304 [ 1996.177341] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 1996.192377] SELinux: duplicate or incompatible mount options 15:35:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x20ebe1f7290000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:35:40 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4000, 0x0}}], 0x324, 0x0) 15:35:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11000000, 0x0, 0x0}, 0x58) 15:35:40 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3d00, 0x0}}], 0x324, 0x0) 15:35:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x706e3f3a550000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:35:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x58) 15:35:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x8020, 0x0) 15:35:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:35:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20200}, 0x58) 15:35:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x58) [ 2011.310707] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:35:40 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xfffffffffffffe00, 0x10, 0x0, 0x8002, &(0x7f0000000280)) [ 2011.355757] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:35:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0010c1b000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:35:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1ffff000, 0x0, 0x0}, 0x58) 15:35:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x58) 15:35:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:35:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x58) 15:35:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000, 0x0, 0x0}, 0x58) [ 2011.524272] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2011.555480] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:35:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xf0ff1f00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:35:56 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4100, 0x0}}], 0x324, 0x0) 15:35:56 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3e00, 0x0}}], 0x324, 0x0) 15:35:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x101000}, 0x58) 15:35:56 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:35:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f000000, 0x0, 0x0}, 0x58) 15:35:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x58) 15:35:56 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') [ 2027.820591] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2027.844993] SELinux: duplicate or incompatible mount options [ 2027.855682] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2027.858175] SELinux: duplicate or incompatible mount options 15:35:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:35:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x40000000, 0x0, 0x0}, 0x58) 15:35:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x58) 15:35:56 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:35:56 executing program 7: sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000500)={&(0x7f0000000040)={0x490, 0xa, 0xa, 0x3, 0x0, 0x0, {0x6, 0x0, 0x9}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x71}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_DESC={0x454, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x194, 0x2, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7f6d}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x263}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2b}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x29}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x81}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10001}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffff2c2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x934}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x81}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xcf2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5188}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1f}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffff8}, @NFTA_SET_FIELD_LEN={0x8}]}, {0x4c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}]}, @NFTA_SET_DESC_CONCAT={0x98, 0x2, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x85f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6264}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5a}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9b4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fff}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x68}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_DESC_CONCAT={0xa0, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10000}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1ffc000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x30}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x59d}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xff}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x101}]}]}, @NFTA_SET_DESC_CONCAT={0x16c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1adabbae}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x101}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xff}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x101}]}, {0x54, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x81}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x624}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x81}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xd62}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x86c}, @NFTA_SET_FIELD_LEN={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8001}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2c2a}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xc1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8000}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xf0000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x400}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x400}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xde5}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x400}]}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x3f}]}, 0x490}, 0x1, 0x0, 0x0, 0x1}, 0x20044040) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x100, 0x0) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)={0x158, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x6e}}}}, [@NL80211_ATTR_STA_EXT_CAPABILITY={0x33, 0xac, "74aa9af96d4dc0cacaa9a8d5282a4c3fc9dc6ba23ff8c77757e2ae8f713da1f945ab61ffaebc55eed97e6e6e9cc251"}, @NL80211_ATTR_STA_SUPPORTED_RATES={0x22, 0x13, [{0x30, 0x1}, {0x12}, {0x1}, {0x3}, {0x16, 0x1}, {0x18, 0x1}, {0x5}, {0xb}, {0x1b, 0x1}, {0x36, 0x1}, {0x9, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x4}, {0x18}, {0xb, 0x1}, {0x12, 0x1}, {0x6, 0x1}, {}, {0x48}, {0x16, 0x1}, {0x6}, {0x5}, {0x1b, 0x1}, {0x36, 0x1}, {0x2}, {0x36, 0x1}, {0x48}, {0x48}, {0xc, 0x1}]}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x8}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x9}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xa, 0xbd, [0x80, 0x3, 0xfffe]}, @NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xa3, 0xbe, "0cd868e873883e8e62484a32c684b0eacd38383e809395c64844a99765398dd8fc68a07c6fc2bd0b5f6be5d06b0b07845024a77072d1df1030ea69049cbd4c8acd473e2b6989bef4c7ab0a47108493a3f4560479ab40fcdcd78ade15601bd9d3eb68068d81c0ad04e2f136a8615ae43410ce0f8cf5a4c1420243b4c3827e5b2314991b4a54d6c61a5e005f6002bff0c724fb13164a4da598b4d446d4b39b40"}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x4}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xc}]}, 0x158}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x20, 0x6, 0x6, 0x101, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000804}, 0x20844) [ 2028.017130] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2028.046682] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:36:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000800, 0x0, 0x0}, 0x58) 15:36:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4200, 0x0}}], 0x324, 0x0) 15:36:12 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3f00, 0x0}}], 0x324, 0x0) 15:36:12 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:36:12 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x58) 15:36:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x400000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:36:12 executing program 7: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000002c0)={0x1, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e20, @multicast1}}}, 0x108) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:36:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20010}, 0x58) 15:36:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1b0c21f000, 0x0, 0x0}, 0x58) [ 2043.839204] SELinux: duplicate or incompatible mount options [ 2043.842552] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2043.849596] SELinux: duplicate or incompatible mount options [ 2043.869751] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:36:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20200}, 0x58) 15:36:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x800000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:36:12 executing program 7: r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x9, 0x111101) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x40047211, &(0x7f0000000180)=0x20) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) 15:36:12 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:36:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000000000, 0x0, 0x0}, 0x58) 15:36:12 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ff1f}, 0x58) [ 2044.007221] tmpfs: Unknown parameter 'contdxt' [ 2044.010600] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2044.032031] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2044.033708] tmpfs: Unknown parameter 'contdxt' 15:36:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x1100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:36:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x58) 15:36:26 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4000, 0x0}}], 0x324, 0x0) 15:36:26 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:36:26 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4300, 0x0}}], 0x324, 0x0) 15:36:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x2000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:36:26 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x58) 15:36:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2a4bf1632000, 0x0, 0x0}, 0x58) 15:36:26 executing program 7: ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) [ 2058.150924] tmpfs: Unsupported parameter 'huge' [ 2058.158318] tmpfs: Unsupported parameter 'huge' sendmmsg$inet6(r0, &(0x7f00000034c0)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0xfffff800, @remote, 0x4}, 0x1c, &(0x7f00000007c0)=[{&(0x7f0000000380)="d4b405008be0cf775e9cbfcc1b017843e6d99200f42af37a4b0f6a32e11d14060f399b32e67644fd3cf0472adb110a458b8453dbfb7fceb4eb1134f2c24cf3176a7a2c72ca0b7ee8a51588810052c8334e835c732fdba0746c9951f58d8bc4bfe5d688955493f311c6f618575176d3a2007f6ea7d4581e4b462c14bc2173d9f433ab19454265b3538632fca92c19c9b9165b00f5da29b138da620079e841ca5d6e2b0e16319f8f9cadd102bea0b04711df26b58c626207c16f494183385400a90022a3964322932b47398a4dda5243b23f27aa", 0xd3}, {&(0x7f0000003600)="411a539884c57f2ca403ea642d5f7462ac805d1a92c09922224c32a4c947fd9ab4983526af7d2f5f399c00cf48765c1d53c00401c54f19cf7964d328f3df77aa0708088e2adf99f57e330164ebff303b81328c1f6a7cbca6bf9944fc4e0e9655c112c0d85ea8122237664a1dd429488b42e71fef5819fd9dbb8a3d4ec2561f7b", 0x80}, {&(0x7f0000000480)="8f82dea788e8cfff5e460da769728049c1662bb04ab5b08abb3782be92282da32cce1337d0c261e1e5e98e38321eb9772a23d7910056", 0x36}, {&(0x7f00000004c0)="73938e9c908017923b55854b0aae158abad113c1c4653f664b8dc6ef73a3329bf46fb1cdccc39058fa77b901b1b92e2f92bd308fdeb8d4", 0x37}, {&(0x7f0000000500)="a1", 0x1}, {&(0x7f0000000540)="167de833f015e238dc079abaa79106bae1175a9192cb8833ab6d916125deb24f1c92b386c1a7225e0d9b308940f2b710ed2e86ac14b35cf473365e00336a197df31452c0d4a26b40d6e1ea44191ddc0d26e4fb5b1600746c393e7ea8a0340df239a57e8fb50de57f9a00fcf68f89e5b2c511e37fa6ca8270aee15d1660d540ec38471dcb0a081becaba3bf45e612718f3e424e4e37eff3f43bf55b9ee020cccfa8915e3b389be4bd8fb3f44848c551c5ea26ed1df80390651deb57a92441164ee535c0e40e06e60acbab1ce5248417c04666aa3e9e0c853695", 0xd9}, {&(0x7f0000000640)="a74e7f583271fee9adb33630fe905bd9198baf5879ba314803a4de93baa9af4bee8ca4b1399dd767164fda24e5e9491a747af89d8430c32a99a369", 0x3b}, {&(0x7f0000000680)="b1c7d3714b1c15e20d35bb43036295abe67aa3f03c207a2aa9e5265143cf2f105ad13a87049636a3bae80f1c74cc3eb5ba975534131a9f96aa96e367ceb27a602ec4965ccf1c34d0d960db571bc804bd04fed44437f8576605f3f2618d429a2cc19618b2d618568f59e11a5b63b7965e5f8c76997141bb80be79e95dc91fed70f3d9155f7645b73222c6f83ef8fc8265d5f4945e53cd3394918e76b9cd70ddfa2fb0ee085e95c138348473ba15513e7c9469cb5ba8616bba5e097051ee05f923c41983df0e550e08bdcaba34aabbc5177ebbc4901e7fb7787f", 0xd9}, {&(0x7f0000000780)="337ff165bb0c24ce3c3914b03cefdb2bd182bf88bde61cb1ee8697232b0f99", 0x1f}], 0x9, &(0x7f0000000880)=[@rthdr={{0x48, 0x29, 0x39, {0xf1, 0x6, 0x2, 0x0, 0x0, [@mcast2, @mcast2, @loopback]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private1={0xfc, 0x1, '\x00', 0x1}}}}], 0x70}}, {{&(0x7f0000000900)={0xa, 0x4e20, 0x6, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3f}}, 0x8000}, 0x1c, &(0x7f0000001b00)=[{&(0x7f0000000940)="c59fabba141ad6559d16b1348f626c2b638ac635951f29dc8694548a0aedc79a14c09bdecbb60188d0c2c346dd3b6e947750d7eef55f92f78f1664550e40921c549e9f00d7b40cf6f26d9d2ab38d38c76daa313a010e7529a2518c73b123479b5b396770d9f0bf39d4ba24a7a5b8db4ff52ac4329b92f43f0c48e0a9898568128b3d99a9b968ab2bf56f4c975c57f4b9ad28e5b021b55fdb905fc71015b3b74036ddc332e5ae04d1759326", 0xab}, {&(0x7f0000000a00)="35f26b91ef6e1732e22833ffd3bb58083916803fd3fd6aeee55e338a8c997e37625d4c60b8210ee1d685923752d2a5b960d42db0a8d325ba5238186f0c29ecb79dff9086d07dd776769f779d7ad09e3078395212ba33a2512bd7935c925a5bb2633f152e0a846cdbee47a0b92c9341c51daf2fc620721c0fc21918a70f7f34ef1318dde4f0ac389cf0888d67f96701c64a8a09438e8ca88cb4c70ba9b6fb00a524f9eb0718002f9b4b69c60ea16d03136890e236aeee3effe3ba609aa8f378a415a9299ed393326f097110ec11b3", 0xce}, {&(0x7f0000000b00)="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", 0x1000}], 0x3, &(0x7f0000001b40)=[@flowinfo={{0x14, 0x29, 0xb, 0x2}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001b80)="bfee0f0a48e0414933c75d1da694ede9f3af5fce8ac3624c4bfdc7851d5b751c00227c7d24d1fe429e12ac5c20e74b3570d2c074176ea7b93a00e77a0db4a09bd1bcc4ab6b5f88606fd3ae8c136dbba7263a6391fe0764596067be9e594c4e330e79afeb4a68b19303f97781cc15f4552ec175d2277dea92f5874032033ff05196fb2bdb5822a48dd0c061f6cbcf56d76444338de2b2acc6b3a48a363622fd0b59ba3ae8553064b34df62bbef1feb07cd5fe3070113eb3ce28423469f59854652435a1b68e0f75a0b4ba64ddd7b0be", 0xcf}, {&(0x7f0000001c80)="e71197f14ef06e68b6595b52781c3c819ff1a4db2d1b64036fc673d805e35431e4f8523554ca22b83a2905ce11212a", 0x2f}, {&(0x7f0000001cc0)="96f4", 0x2}, {&(0x7f0000001d00)="d98499aade482137bb08e514a7efd7f13bcd65846d137742b04b8744934169cb2057fd9fd22f288bab", 0x29}, {&(0x7f0000001d40)="92160341a3e582d877c00ac374ce94d1a2feb1f0e754f8c720f76c6a747d74e33500b1fce480e08b957bba4a2e9a1d0f74fe0926a6936dcb687c29815b5d616be5cf389959b759e383927bda77c0759617ba83e62a2e785a35cf5b0f069b4a4b9b789ad153ce6d1315bf2a1dfc06a9ba4fe1e40eaaa148b808b91ccf4815720c836153434cccfcecb9ea0be574d6cdd690493e08f7f6de3194c05770c398e5ae560148b6134d32689329a9a018c34c1811bafc0d53698248e3e7de46f66a3b95b8e0255e2c0cff38d0d1bc70d48a3a4be7a260c670a94c0b38bd16399a31c5e2182176433522c7cf3d", 0xe9}], 0x5, &(0x7f0000001ec0)=[@rthdr={{0x98, 0x29, 0x39, {0x2f, 0x10, 0x1, 0x9, 0x0, [@remote, @remote, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, @mcast1, @mcast2, @local, @empty, @remote]}}}, @hopopts={{0x78, 0x29, 0x36, {0x0, 0xb, '\x00', [@calipso={0x7, 0x20, {0x3, 0x6, 0xa, 0x0, [0x7ff, 0xfffffffffffffff9, 0x8000]}}, @padn={0x1, 0x1, [0x0]}, @hao={0xc9, 0x10, @remote}, @hao={0xc9, 0x10, @private2}, @hao={0xc9, 0x10, @remote}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @hopopts_2292={{0x48, 0x29, 0x36, {0x16, 0x6, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x1}, @enc_lim={0x4, 0x1, 0x2}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @hao={0xc9, 0x10, @private2}]}}}, @hoplimit_2292={{0x14}}, @dstopts={{0x78, 0x29, 0x37, {0x29, 0xb, '\x00', [@jumbo={0xc2, 0x4, 0x9}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @broadcast}}, @hao={0xc9, 0x10, @mcast2}, @ra={0x5, 0x2, 0x8001}, @pad1, @calipso={0x7, 0x20, {0x3, 0x6, 0x7f, 0x1f, [0x1f, 0x9, 0xfffffffffffffff7]}}]}}}], 0x200}}, {{&(0x7f00000020c0)={0xa, 0x4e22, 0xb5e, @private0, 0xffffffa9}, 0x1c, &(0x7f00000021c0)=[{&(0x7f0000002100)="d457b8d631a813f9788da54694e4654c3a383c34989bf38181a043295af8fdb974cd5b27aa2c742a65122cce8b093f95ca68bbdb36dd65a0a5b3795086700a7abba45e997d1a474b23d1be2772635f936d44fd716e46be869488f0c11fb53042b922db8c6a5eebcb83f8690f28eaf9c214496d681130c88f4f01397b771c2fbd7ae1efc1dcd9c76c5c24673b169549953caa85f8cced606b7856890614009f9e79af27cfe9df3a15641030bd23f3e09f45aaf7b1be0414b11ca55ce9908dd0", 0xbf}], 0x1, &(0x7f0000002200)=[@dontfrag={{0x14, 0x29, 0x3e, 0x4}}], 0x18}}, {{&(0x7f0000002240)={0xa, 0x4e22, 0x1, @empty, 0x401}, 0x1c, &(0x7f0000003400)=[{&(0x7f0000002280)="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", 0x1000}, {&(0x7f0000003280)="b903570a6d23ff3ed984697867a731792c509f02241dd81c638949abe723d19f81b388d66f4637482faf7f4d87688de4c8f5f9acfb67eaa554ebdfbf4b160596ed73e1721dfaa899a8f7f64eb15b972112023216ab857ce2dea5eca0e07e372cd355", 0x62}, {&(0x7f0000003300)="c934f2803d18f8e65ccd16fb8934c3b460abc9ae66fc7e47e60ddd49fd9468a6c97b8e52a78b", 0x26}, {&(0x7f0000003340)=')g', 0x2}, {&(0x7f0000003380)="625cd6fd7aa118d57aa7325451931f8bedc18d921bee07b98a26900d4796e9c6bd157ffaf5ca21c55a66cd09a2ca7143c1f988d2ae826ba58e0889a310125e09db81b2f46c2c6c1d5444911eaff0a5395d48c5abc215f3cdf063cf779900c9aa7714dd38d7716b7467bed3f79e3ca085e9a6b9425961c682035d", 0x7a}], 0x5, &(0x7f0000003480)=ANY=[@ANYBLOB="2400000000000000290000003200000020010000000000000000000000000001", @ANYRES32=0x0, @ANYBLOB="000001001400000000000000290000000000000007ff00000000"], 0x40}}], 0x5, 0x4) move_mount(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x14000, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) 15:36:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x101000}, 0x58) [ 2058.159943] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2058.200362] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:36:27 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f752c646566636f6e746578743d73797361646d5f752c00821ac8011116f03c9c777350e383de2d864fe629d1ba5dc52829ad44765240d94b1eae07ef9f14fd01339f596cf3d05ed45e89f866f93f2efaaddad30eac2733dad35c5f783e51b185c3c83b3e66eface11cc68c0034820b7208e99bc3fbbe8fd1cb6bd45a4ebb2f55f514f3970811a080c715e34a63b4823f0a1e51e3600a604b2cfae3a05ed4c4e78e0f0d0dca6706fffb379383acc78cc0fe70710fbef833e7b09dca077a7f4144bfa100d9e403d8e2d86ff6da18c8"]) quotactl(0xac, &(0x7f0000000000)='./file0\x00', 0xee01, &(0x7f0000000040)="393a700bffc08cf6a8") 15:36:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x58) 15:36:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x553a5f4d9000, 0x0, 0x0}, 0x58) [ 2058.269427] SELinux: duplicate or incompatible mount options [ 2058.275387] SELinux: duplicate or incompatible mount options 15:36:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x3f00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:36:27 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) 15:36:27 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:36:27 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x58) 15:36:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2001000000000, 0x0, 0x0}, 0x58) [ 2058.383924] SELinux: duplicate or incompatible mount options [ 2058.407532] SELinux: duplicate or incompatible mount options [ 2058.423537] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2058.467617] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:36:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x4000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:36:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2020000000000, 0x0, 0x0}, 0x58) 15:36:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ff1f}, 0x58) 15:36:42 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4400, 0x0}}], 0x324, 0x0) 15:36:42 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4100, 0x0}}], 0x324, 0x0) 15:36:42 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x58) 15:36:42 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:36:42 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001d004527004000000000000006"], 0x14}}, 0x0) read(r0, &(0x7f0000000100)=""/153, 0x99) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX={0x5, 0xc, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2}, 0x40000) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2073.869434] SELinux: duplicate or incompatible mount options [ 2073.878088] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2073.940722] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:36:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0xffffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:36:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x58) 15:36:42 executing program 7: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa0}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000011c0)=""/86, &(0x7f00000000c0)=0x56) ptrace$getregset(0x4204, 0xffffffffffffffff, 0x6, &(0x7f0000000080)={&(0x7f00000001c0)=""/4096, 0x1000}) r1 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@dont_appraise}]}) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') 15:36:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000000000, 0x0, 0x0}, 0x58) 15:36:42 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:36:42 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000200}, 0x58) [ 2074.093769] tmpfs: Unknown parameter 'dont_appraise' [ 2074.104475] tmpfs: Unknown parameter 'dont_appraise' 15:36:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2074.149671] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:36:43 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0), 0x5010, 0x0) signalfd4(r0, &(0x7f0000000000)={[0x4]}, 0x8, 0x80800) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/189, 0xbd) [ 2074.190218] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:36:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x58) [ 2074.269498] SELinux: duplicate or incompatible mount options [ 2074.285001] SELinux: duplicate or incompatible mount options 15:36:58 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x58) 15:36:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000001000000, 0x0, 0x0}, 0x58) 15:36:58 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4200, 0x0}}], 0x324, 0x0) 15:36:58 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4500, 0x0}}], 0x324, 0x0) 15:36:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x58) 15:36:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:36:58 executing program 7: syz_emit_ethernet(0xe, &(0x7f00000001c0)={@dev, @multicast, @void, {@generic={0x88ca}}}, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000002c0)={{0x1, 0x0, 0x0, r1, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000500), 0x80081, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, @in_args={0x4}}, './file1\x00'}) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r4, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) r6 = accept$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @remote}}, &(0x7f0000000640)=0x1c) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r7, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r8, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) r10 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r10, 0x0) r11 = accept(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000700)=0x80) r12 = accept4$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000780)=0x14, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000080)="60a36a7162831721c31be209b695996b6a598eaa9d3e9cbc895215d9fe02f71495f785a9938985cfc4dc87572193bece63a8f134aa46", 0x36}, {&(0x7f00000000c0)="784145b5041b9659a73798303eabfd759ed6e50c96e7822e6e88b1f6d86416928be4b6a8992b51903dac51d2fb1a6bf24053f0dec38eb40029a451", 0x3b}, {&(0x7f0000000200)="4363c5b57a8f81c3b24afd89fccf3cce84394120aa77f4e92b413774beecca10353d2c4c44a45e3b841477c956077805ad0d0db92577a8bb7c87bd7268ee1d0a8f982a5e4d13b6577c592c45ac5c21722de32543d23a6c98cbc42a2346805b19a6069e306928f7552a2491e066a89e527db24a274831ab89", 0x78}, {&(0x7f00000002c0)="f1cef98f8207f71e147d01df2dc7b468258d2653d0b53987791af99496f295cedd315ee2227e3c8ec195fb74ac4bca5267891437afeee3c10b7dbffbe92e160581820d4863c6d37f13a0bf11cc65acbd737e7b13dd1b4a968fab3053725ecb0ac61e2db7f7230d8688", 0x69}, {&(0x7f0000000340)="43631ef6a5d3b027bd1bc82f24bb47b606383d8e579c9ee5bfba781ff353da9406c4fcdc8f67554ffddddb7ba66d211353973c9b0b9658f025568d1b2744859bf3aff365741190c345e9d6788336e8d0295cd97383dd770301fee3924100750f1b1faf79ce7e11085cf0461c097f", 0x6e}, {&(0x7f00000003c0)="c94c4bdc8b57f00aff61dd4d2cdc9bf20b3ec6c1b3ae2cc94c143fe5ec5a1d3c7059537ab68e55c938f39688f201c96a59bdb555d706707ece23e11014fff685478e7fbb80ce0b258d5cf225bf25f244309a6d90d5078abcd61d", 0x5a}], 0x6, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x24, 0x1, 0x1, [r2, 0xffffffffffffffff, r3, r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r4, r5]}}, @rights={{0x2c, 0x1, 0x1, [r6, r0, r7, r0, r0, r8, r9]}}, @rights={{0x38, 0x1, 0x1, [r0, r0, r0, r0, r10, 0xffffffffffffffff, r11, 0xffffffffffffffff, r12, r0]}}], 0x138, 0x40068c2}, 0x40010) 15:36:58 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2089.580598] SELinux: duplicate or incompatible mount options [ 2089.595778] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2089.624013] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:36:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000200}, 0x58) [ 2089.654510] SELinux: duplicate or incompatible mount options 15:36:58 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:36:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10100000000000, 0x0, 0x0}, 0x58) 15:36:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:36:58 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1ffff000}, 0x58) 15:36:58 executing program 7: sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100029bd7010fddbdf25010000000800060007000000500003800500080009000000140002006772657461703000000000000000000014000200776c616e300000000000000000000000910007004e21000014000600ff010000000000000000000000008c2e"], 0x6c}, 0x1, 0x0, 0x0, 0x4004004}, 0x15) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x42) 15:36:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x58) [ 2089.823130] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2089.852644] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2089.895896] SELinux: duplicate or incompatible mount options [ 2089.904970] SELinux: duplicate or incompatible mount options [ 2098.430626] kworker/dying (309) used greatest stack depth: 22632 bytes left 15:37:13 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4300, 0x0}}], 0x324, 0x0) 15:37:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000000000, 0x0, 0x0}, 0x58) 15:37:13 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4600, 0x0}}], 0x324, 0x0) 15:37:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1ffff000}, 0x58) [ 2104.421725] SELinux: duplicate or incompatible mount options [ 2104.434974] SELinux: duplicate or incompatible mount options 15:37:13 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:37:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:37:13 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x10, 0x0) 15:37:13 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x58) [ 2104.453524] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2104.476255] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:37:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2063f14b2a0000, 0x0, 0x0}, 0x58) 15:37:13 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="cf8b37eadefedbbee9401541335c9d1ecad0671369f27a3828d11f08d69747d80f1abd3ef6ecee9be990314738cc2e78dce51e5cb9dd284072b01ada09313201682562668da8fedbfd2262cb2a025a34469a62533bfc450cf052151281dbda9677dd84f364604161a9e47016e72f37e1522c0145055d97bdc2fa5a3c7a6cc5480a8e6f1cd7ef351562ffed30f8469ac51b8e353f14df18bd5c5041e6df2602545279f5e431e9a7d97df5856bb6812b4d75d3b161c18a081fde32bdd4218cecc3a442b7214e1ed4c244b1352d6ac1dfa2e429856054fe0fce3442acb075a78516c68aa1727f2bfc92"]) 15:37:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x58) 15:37:13 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:37:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:37:13 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x58) [ 2104.642834] tmpfs: Unknown parameter 'Ï‹7êÞþÛ¾é@A3\ÊÐgiòz8(ÑÖ—Gؽ>öìî›é1G8Ì.xÜå\¹Ý(@r°Ú 12h%bf¨þÛý"bË*Z4FšbS;üE ðRÛÚ–wÝ„ód`Aa©äpç/7áR' [ 2104.657636] tmpfs: Unknown parameter 'Ï‹7êÞþÛ¾é@A3\ÊÐgiòz8(ÑÖ—Gؽ>öìî›é1G8Ì.xÜå\¹Ý(@r°Ú 12h%bf¨þÛý"bË*Z4FšbS;üE ðRÛÚ–wÝ„ód`Aa©äpç/7áR' [ 2104.666230] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:37:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x904d5f3a550000, 0x0, 0x0}, 0x58) 15:37:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x58) [ 2104.710619] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:37:32 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4700, 0x0}}], 0x324, 0x0) 15:37:32 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4400, 0x0}}], 0x324, 0x0) 15:37:32 executing program 7: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [0x7, 0x800, 0x72201f6f, 0x3, 0xb41e, 0x9], 0x2, &(0x7f0000000040)=[{}], 0x0, [{}, {}]}, 0x98) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6e746578743d0000743d73797361646d67752c8000000000000000000000e6390000e000"]) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000240)=0x80) 15:37:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:37:32 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:37:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0210c1b000000, 0x0, 0x0}, 0x58) 15:37:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x58) [ 2123.965903] SELinux: security_context_str_to_sid() failed for (dev tmpfs, type tmpfs) errno=-22 [ 2123.967957] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2123.993106] SELinux: security_context_str_to_sid() failed for (dev tmpfs, type tmpfs) errno=-22 [ 2124.014763] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:37:32 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x58) 15:37:32 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:37:32 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:37:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000800}, 0x58) 15:37:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x3f00}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2124.134074] SELinux: duplicate or incompatible mount options [ 2124.147366] SELinux: duplicate or incompatible mount options [ 2124.155986] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2124.203928] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:37:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f00000000, 0x0, 0x0}, 0x58) 15:37:49 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4800, 0x0}}], 0x324, 0x0) 15:37:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:37:49 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4500, 0x0}}], 0x324, 0x0) 15:37:49 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2e00, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:37:49 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x3, 0x0, 0x0, 0x6000, &(0x7f0000000040)={[{@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x31]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x70]}}, {@huge_never}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 15:37:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1b0bd1f000}, 0x58) 15:37:49 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000800}, 0x58) 15:37:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000000000000, 0x0, 0x0}, 0x58) [ 2140.971895] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2141.001239] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:37:49 executing program 7: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x0) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000040)={{}, 0x4, &(0x7f0000000000)=[0x1f72, 0x40, 0x0, 0x4], 0x2, 0x4, [0xffffffffffff8de5, 0x2, 0x0, 0x3]}) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:37:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20010}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:37:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x58) 15:37:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x400000000000000, 0x0, 0x0}, 0x58) [ 2141.099234] SELinux: duplicate or incompatible mount options 15:37:49 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:37:49 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1b0be1f000}, 0x58) 15:37:50 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x305900) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) [ 2141.218737] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:37:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2a3a2c653000}, 0x58) [ 2141.237920] SELinux: duplicate or incompatible mount options [ 2141.247141] SELinux: duplicate or incompatible mount options [ 2141.255788] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:04 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4600, 0x0}}], 0x324, 0x0) 15:38:04 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='context&sysadm_u,defcontext=sysadm_u,\x00']) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4, 0x8, &(0x7f00000016c0)=[{&(0x7f0000000180)="209d1d47f9e23c75b195784660ebacab8ca831fa2cf2be8574de3182b25c0525d85f280303f58d1ca6b18d599e3ffbfdef50668d84c09d9554b1df52644b605d3af1c1a1ce3e2f50909011a3907eeffa846b42969d664f4079eb887ccd60e885f97ddb85f7c4d9e244eb6f15abe5fe01ac7ec2f809623c3048e7010875cfd4a61921438477029bc1461cc02d77c1eceb9ac0b1689e7599c61169a64550f2a4b1509d7089aba6dd977a1318aa1ed81914e4e2405d675a3349da24", 0xba, 0x8001}, {&(0x7f00000002c0)="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", 0x1000, 0xffffffff80000000}, {&(0x7f00000000c0)="e7fb11c04fc95346f902e8254220b54f894fc39f85be", 0x16, 0xff}, {&(0x7f00000012c0)="d4c9fac749afa93c707a06a61094e39c91e2d3fd8bcdfc7db741d826d7fc0fff61d261e609420c98a8d182dca1988930371667b5839f90abd209cd18549ed2f419059dd1428964e75893ba3b3a33d3039667a5d662602e43c742350839bff8ad808a822cebfb3c73c542f6f252ebe9641df40715c9b10a13317fc85532f3fd52e8a24b3c383bb45e1c508d1a", 0x8c, 0x2}, {&(0x7f0000001380)="ae12b0687614084831e6ecb43ca2f7b77a5f5d3f905717fca215908a43f6957a4efec345f6faf0bd4570888b2cd2dc1011b733f9d6446d7b91f6fc589eb96a9da21b6f4ff770b04265a82c265212ddd0de2811e31f2eeb505c0112120312173338d50cc30b2e17fcd913607516e1d591f1386350f7593008f2e4f7f585a32ce44ae748b450228bb975dc6838341b2b6c000e64d4739b8b65c9d46f7ee5037d9ee8a851624282f81f7c9e7ba306a24db2ea46d340c48077b442e36cf19bdbbea4d313c1d12600a046c083f1e8a46f50a3c3", 0xd1, 0xfff}, {&(0x7f0000001480)="62e98147dc4fcd4fdb799f61aeeee2c5419e3ea71324dbaa15bdb66d90c9832de4f922be18da01ef16f09b7de3d3dfe8a2482932521b68f7c5281d292b5a8973fe3e20b1ccea207cca0f12179433637da5c3dad48927b952626a296bed98c4ab3cd82678dece0feea0ff8cc4a5af48dcd90be079d99032a4d6ea937187de4164ef09687900be81b520b10b8954eb893aea2c9634ade7eaeeebc0fe1e96a8df7cb329472e718bcbf85e47f6b4c1b855c67a558d18847efaf014ca63508511", 0xbe, 0x7}, {&(0x7f0000001540)="f9ccdc074ae04cad45f0545aa494ccff8f5f3771a5a93b85e145bebf30f290f211526f04ec2abb314c39b1d9f9c565d585ee83bdfd41a107465755668d7a86434d2e90", 0x43}, {&(0x7f00000015c0)="624b53a8c359105b742270e48a907a4f71d6540fc9a77a3bc18fbf3aa81d2200d913285be91d8b54fe492f371f0d13bca5df91d7287ec82608f05f5e3493486bacbfab34f9d51bb93dd4540e86864e670ae1cfdb9ff16b5d759ba93342cbb7a98ec1c9c31a074aa2ff1cdc52c01ee1d0c7fcf84b87a3e20d4dfe9cb9b9c42e182cac5f317a1edef5b1082285f60119c52d232baffce6ad34e2bbefdcdc186707e0fb233f8342fff2348c642f52af521f190ff8b5279a69400c3b1493eab9bffff8a53de92122ddc02779cc9c0a", 0xcd, 0x7}], 0x800000, &(0x7f0000001800)={[{@uni_xlateno}], [{@pcr={'pcr', 0x3d, 0x6}}, {@obj_role}, {@fowner_lt={'fowner<', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@obj_type={'obj_type', 0x3d, '-,$]\xc6]^!'}}, {@subj_role={'subj_role', 0x3d, '-\x14'}}]}) r2 = dup3(r0, 0xffffffffffffffff, 0x0) inotify_add_watch(r2, &(0x7f00000018c0)='./file0\x00', 0x409) mkdirat(r0, &(0x7f0000001900)='./file1\x00', 0x10) r3 = openat(r2, &(0x7f0000001880)='./file0\x00', 0x240000, 0x102) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r4, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) openat(r4, &(0x7f00000019c0)='./file0\x00', 0x404000, 0x9) renameat(r4, &(0x7f0000001940)='./file1\x00', r3, &(0x7f0000001980)='./file1\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8100) 15:38:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20200}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x800000000000000, 0x0, 0x0}, 0x58) 15:38:04 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:38:04 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x58) 15:38:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x553a5e7f8000}, 0x58) 15:38:04 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4900, 0x0}}], 0x324, 0x0) [ 2155.393919] tmpfs: Unknown parameter 'context&sysadm_u' [ 2155.394981] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2001000000000}, 0x58) [ 2155.405181] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2155.408035] loop7: detected capacity change from 0 to 41943040 [ 2155.412092] FAT-fs (loop7): Unrecognized mount option "pcr=00000000000000000006" or missing value [ 2155.421387] tmpfs: Unknown parameter 'context&sysadm_u' [ 2155.428738] loop7: detected capacity change from 0 to 41943040 [ 2155.434874] FAT-fs (loop7): invalid media value (0x7a) [ 2155.435522] FAT-fs (loop7): Can't find a valid FAT filesystem 15:38:04 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:38:04 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@fsname={'fsname', 0x3d, '#'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:38:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2155.514516] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100000000000000, 0x0, 0x0}, 0x58) [ 2155.520296] tmpfs: Unknown parameter 'fsname' [ 2155.528583] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2020000000000}, 0x58) [ 2155.558685] tmpfs: Unknown parameter 'fsname' 15:38:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x101000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:04 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2155.635015] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2155.660025] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:23 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2a017d481000}, 0x58) 15:38:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x200000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:23 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='context=sysadm_u,twfcontext=sysadm_u,\x00']) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x9) 15:38:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000000000000, 0x0, 0x0}, 0x58) 15:38:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x58) 15:38:23 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:38:23 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4700, 0x0}}], 0x324, 0x0) 15:38:23 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4a00, 0x0}}], 0x324, 0x0) [ 2174.603764] tmpfs: Unknown parameter 'twfcontext' [ 2174.613270] tmpfs: Unknown parameter 'twfcontext' [ 2174.615880] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2174.651518] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:23 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) unlink(&(0x7f0000000000)='./file0\x00') 15:38:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000001000000}, 0x58) 15:38:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00000000000000, 0x0, 0x0}, 0x58) 15:38:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0xf0ff1f}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:23 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:38:23 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x553a6314c000}, 0x58) [ 2174.815730] SELinux: duplicate or incompatible mount options [ 2174.824875] SELinux: duplicate or incompatible mount options [ 2174.856221] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000000000000, 0x0, 0x0}, 0x58) [ 2174.891228] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:23 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x416880, 0x108) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) close(r2) write$P9_RREADDIR(r1, &(0x7f0000000180)={0xc5, 0x29, 0x1, {0x7fffffff, [{{0x0, 0x2, 0x2}, 0x1f, 0x1, 0x7, './file0'}, {{0x20}, 0x4, 0x3f, 0x7, './file0'}, {{0x40, 0x3, 0x1}, 0x10000, 0x3, 0x7, './file0'}, {{0x80}, 0x4, 0x2, 0x7, './file0'}, {{0xb68411eac610b7a, 0x3, 0x2}, 0x2, 0x26, 0x7, './file0'}, {{0x2, 0x1, 0x2}, 0x9, 0x9, 0x7, './file0'}]}}, 0xc5) 15:38:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10100000000000}, 0x58) 15:38:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:23 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2175.025651] SELinux: duplicate or incompatible mount options [ 2175.040914] SELinux: duplicate or incompatible mount options [ 2175.126861] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2175.163902] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:39 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4800, 0x0}}], 0x324, 0x0) 15:38:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffff00000000, 0x0, 0x0}, 0x58) 15:38:39 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4b00, 0x0}}], 0x324, 0x0) 15:38:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x58) 15:38:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2001000000000}, 0x58) 15:38:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x4000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:39 executing program 7: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x100, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc800}, 0x400c004) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r3, @ANYBLOB='\b\x00?\x00\x00@'], 0x24}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000002c0), 0xc, &(0x7f00000013c0)={&(0x7f0000000300)={0x1088, r2, 0x1, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x2, 0x8}}}}, [@NL80211_ATTR_IE={0xa, 0x2a, [@ext_channel_switch={0x3c, 0x4, {0x0, 0x7, 0x4, 0x7f}}]}, @NL80211_ATTR_IE={0x1052, 0x2a, [@measure_req={0x26, 0x1003, {0x3, 0x11, 0x1, "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"}}, @supported_rates={0x1, 0x2, [{0xc, 0x1}, {0x1, 0x1}]}, @ssid={0x0, 0x6, @default_ap_ssid}, @peer_mgmt={0x75, 0x4, {0x1, 0x0, @void, @void, @void}}, @ssid={0x0, 0x1e, @random="ef72100d6a8fd0a68e5fd2e41887da5063c31e36d1c911b9689effaca84d"}, @link_id={0x65, 0x12, {@from_mac=@device_b, @broadcast, @broadcast}}, @challenge={0x10, 0x1, 0x51}]}, @NL80211_ATTR_IE={0x7, 0x2a, [@dsss={0x3, 0x1, 0x9}]}]}, 0x1088}, 0x1, 0x0, 0x0, 0x8000}, 0x4) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) symlinkat(&(0x7f00000001c0)='./file0\x00', r4, &(0x7f0000000240)='./file0\x00') 15:38:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2190.764022] SELinux: duplicate or incompatible mount options [ 2190.780638] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2190.794567] SELinux: duplicate or incompatible mount options [ 2190.822132] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x58) 15:38:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x30652c3a2a0000}, 0x58) 15:38:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x8000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:39 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="636f6e746578743d73797361646d5f752c646d66436f01746578743d73ae04c449d5acda5d1ff04239b2eca8a2797361646d5f752c006e61c2bf4770f76e0b8022503b544865e435e68413557b1374923734395d02ccc69119e1d5b363752ae4281e2ecdfa149079437af6651a480000000000"]) openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x200000, 0x172, 0x1}, 0x18) r0 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x40, 0x0, &(0x7f0000000080), 0x20, &(0x7f0000000180)=ANY=[@ANYBLOB="6572726f72733d72656d6f756e742d726f2c6e6f646f74732c6e6f631d3c433b6173652c646f74732c040000002c706372dc30303030303030303030303030303030303030352c65", @ANYRESDEC=0xee01, @ANYBLOB="2c006d61636b66ffffffff6e736d7574653d646566636f6e749565fd18686198682c00"]) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0xbaa6971ebc753720, 0x0) mknodat$loop(r1, &(0x7f00000002c0)='./file1\x00', 0x40, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/module/pata_sch', 0x0, 0x84) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) linkat(r0, &(0x7f00000000c0)='./file0/file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x1000) 15:38:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2191.002134] tmpfs: Unknown parameter 'dmfCotext' 15:38:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x10000200}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2020000000000}, 0x58) [ 2191.043078] tmpfs: Unknown parameter 'dmfCotext' [ 2191.045097] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x807f5e3a550000}, 0x58) [ 2191.086555] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:56 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4c00, 0x0}}], 0x324, 0x0) 15:38:56 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4900, 0x0}}], 0x324, 0x0) 15:38:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x58) 15:38:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0d10b1b000000}, 0x58) 15:38:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x11000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x58) 15:38:56 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xff03, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2207.699395] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2207.731941] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x58) 15:38:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x1ffff000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:38:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ff1f00000000}, 0x58) 15:38:56 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:38:56 executing program 7: getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) r1 = semget(0x2, 0x0, 0x20b) r2 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r2, r0, r3, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) r4 = geteuid() clone3(&(0x7f0000000880)={0x800000, &(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)=0x0, {0x34}, &(0x7f0000000700)=""/109, 0x6d, &(0x7f0000000780)=""/143, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x58) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) clone3(&(0x7f0000000980)={0x21a000000, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x1d}, &(0x7f00000004c0)=""/107, 0x6b, &(0x7f0000000540)=""/208, &(0x7f0000000900)=[r5, 0x0, 0x0, 0x0], 0x4, {r6}}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000080)={{0x1, 0xffffffffffffffff, r0, r4, 0xee00, 0x10, 0x7f}, 0x0, 0x0, 0xf9, 0x4, 0x2, 0x10000000000, 0x8, 0x8, 0x0, 0x8, r5, r7}) pipe(&(0x7f00000001c0)) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6e746578743d73798be2737a646b5f7540646566636f6e746578743d736d5f75"]) 15:38:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x20000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2207.914260] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000001000000}, 0x58) [ 2207.937261] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:38:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x58) 15:38:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x58) [ 2208.095389] SELinux: security_context_str_to_sid(sy‹âszdk_u@defcontext=sm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2208.320943] SELinux: security_context_str_to_sid(sy‹âszdk_u@defcontext=sm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x3f000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:39:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4d00, 0x0}}], 0x324, 0x0) 15:39:12 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4a00, 0x0}}], 0x324, 0x0) 15:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x58) 15:39:12 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:39:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x58) 15:39:12 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10100000000000}, 0x58) 15:39:12 executing program 7: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x3c00, 0x0}}], 0x324, 0x0) [ 2224.122957] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2224.147905] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x58) 15:39:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x58) 15:39:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x40000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:39:13 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:39:13 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10487d012a0000}, 0x58) [ 2224.343779] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}, 0x58) 15:39:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x58) [ 2224.370836] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4, 0x0, 0x0}, 0x58) 15:39:28 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4e00, 0x0}}], 0x324, 0x0) 15:39:28 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:39:28 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4b00, 0x0}}], 0x324, 0x0) 15:39:28 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x58) 15:39:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x58) 15:39:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20010}, 0x58) 15:39:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8, 0x0, 0x0}, 0x58) 15:39:28 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) [ 2239.295793] tmpfs: Bad value for 'uid' [ 2239.313006] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2239.357159] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:28 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 15:39:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11, 0x0, 0x0}, 0x58) 15:39:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20200}, 0x58) 15:39:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x58) [ 2239.450474] tmpfs: Bad value for 'uid' 15:39:28 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:39:28 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc014633a550000}, 0x58) 15:39:28 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 15:39:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x58) [ 2239.589860] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2239.628647] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2239.638029] tmpfs: Bad value for 'uid' 15:39:42 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4c00, 0x0}}], 0x324, 0x0) 15:39:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x58) 15:39:42 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4f00, 0x0}}], 0x324, 0x0) 15:39:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100, 0x0, 0x0}, 0x58) 15:39:42 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0e10b1b000000}, 0x58) 15:39:42 executing program 7: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 15:39:42 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:39:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x101000}, 0x58) [ 2253.853023] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000, 0x0, 0x0}, 0x58) 15:39:42 executing program 7: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 15:39:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x58) [ 2253.909465] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x58) 15:39:42 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ff1f00000000}, 0x58) 15:39:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00, 0x0, 0x0}, 0x58) 15:39:42 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:39:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ff1f}, 0x58) [ 2254.117303] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2254.134775] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:57 executing program 7: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 15:39:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x57) 15:39:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000, 0x0, 0x0}, 0x58) 15:39:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x58) 15:39:57 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4d00, 0x0}}], 0x324, 0x0) 15:39:57 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5000, 0x0}}], 0x324, 0x0) 15:39:57 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:39:57 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x58) 15:39:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20010, 0x0, 0x0}, 0x58) [ 2268.860981] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:57 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) [ 2268.899537] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20200, 0x0, 0x0}, 0x58) 15:39:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x58) 15:39:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x20000398) 15:39:57 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:39:57 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x58) [ 2269.338784] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x80000, 0x0, 0x0}, 0x58) [ 2269.370921] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:39:58 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 15:40:17 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 15:40:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x58) 15:40:17 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5100, 0x0}}], 0x324, 0x0) 15:40:17 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:40:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:40:17 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4e00, 0x0}}], 0x324, 0x0) 15:40:17 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x58) 15:40:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x101000, 0x0, 0x0}, 0x58) [ 2288.216468] loop0: detected capacity change from 0 to 131072 [ 2288.233672] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2288.245421] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:40:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x200000, 0x0, 0x0}, 0x58) 15:40:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000200}, 0x58) [ 2288.295846] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:40:17 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:17 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}, 0x58) 15:40:17 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:40:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f, 0x0, 0x0}, 0x58) [ 2288.529026] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2288.562686] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:40:34 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:34 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x4f00, 0x0}}], 0x324, 0x0) 15:40:34 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5200, 0x0}}], 0x324, 0x0) 15:40:34 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:40:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x58) 15:40:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000, 0x0, 0x0}, 0x58) 15:40:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x0) vmsplice(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="a7e4b660adc22c536dbe4970a801dc9c8e4eb5f81693ca8c5ddc237fc167ff1c7daa61382cca5e243b8af3fb2ea17c683680cbdbdbbfdc63912aa0d653a553d92357ef3dceb03195755ae38fe17436c540ddbf8b2cb3b7ef9d252af24d2ba0124c24c0765fb61923cb7410af7de85f55b83e2a72f866f17d7bd511daaf502e212bc2acc8381ee925129123d65297acb65ed272be98dbc1c4076287dc492a6cb142899ba1c072fb09", 0xa8}, {&(0x7f0000000100)="269091828b31ed53d5bf84124ad4ce13a214d0077c592c4c9b5c297793399debf95aef0cd6d0a29ad9eb0c671de20c98b4bf410ef6cb120020e32806b3d2522f39b3b6f55cd4fb129af08f2e9e4fe28eabd6ca14d6e2ca148619af1051d418", 0x5f}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000000180)="9b26ae2e33a9b26578ec29b38ad7deb6837ee8aecbbcacacfbf74ea0937080446940", 0x22}, {&(0x7f00000001c0)="f2059fcc80dbf96ed451893edf42a83758091615e37e6644442b4cebec66c2b8fe9178f7e25607975d558ad9d13f7f1410ce2a82f65c0e5dc61d524f5099a20302eee15c6df0428b50908b9d0769e94b7dee1a824f9cbd", 0x57}, {&(0x7f0000000240)="72d0692452b09d9522793113d2ee704091", 0x11}], 0x7, 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000300)='ns/cgroup\x00') clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:40:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x58) [ 2305.288148] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:40:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000, 0x0, 0x0}, 0x58) 15:40:34 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1ffff000}, 0x58) [ 2305.357006] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:40:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0xc82c2, 0x0) r1 = io_uring_setup(0x4a, &(0x7f0000000040)={0x0, 0xc47a, 0x4, 0x0, 0x4a, 0x0, r0}) io_uring_enter(r1, 0x1548, 0xfe67, 0x0, &(0x7f00000000c0)={[0x9]}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000001e00)=@IORING_OP_WRITEV={0x2, 0xb3730263a51aca06, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x5) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000006c00", @ANYRES32=r0, @ANYBLOB="03000000000000002e2f66696c6531009299763eedfb8a63953f1b273e5f38a7baad902c3868ab0bdab295cf7af9eb4882d9fbfb359baf"]) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd=r5, 0x100, 0x0, 0x9, 0x0, 0x0, {0x0, r6}}, 0xffffffff) openat(r0, &(0x7f0000000100)='./file1\x00', 0x820080, 0x100) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r1, 0x0) 15:40:34 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:40:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x58) 15:40:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x58) 15:40:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000, 0x0, 0x0}, 0x58) 15:40:34 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2305.512885] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2305.546092] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2305.592765] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:40:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x58) 15:40:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = open_tree(r0, &(0x7f0000000040)='./file1\x00', 0x80000) ioctl$BTRFS_IOC_INO_PATHS(r2, 0xc0389423, &(0x7f00000000c0)={0x8, 0x10, [0xc26, 0x6bf3, 0xdc9, 0x20], &(0x7f0000000080)=[0x0, 0x0]}) 15:40:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x58) 15:40:48 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:40:48 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5300, 0x0}}], 0x324, 0x0) 15:40:48 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5000, 0x0}}], 0x324, 0x0) 15:40:48 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 15:40:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000200, 0x0, 0x0}, 0x58) [ 2319.675014] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2319.692859] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:40:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x58) [ 2319.720007] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:40:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11000000, 0x0, 0x0}, 0x58) 15:40:48 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 15:40:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x58) 15:40:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:40:48 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:40:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000800}, 0x58) [ 2319.885295] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2319.890158] cgroup: fork rejected by pids controller in /syz0 [ 2319.902522] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2319.903836] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:40:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1ffff000, 0x0, 0x0}, 0x58) 15:40:48 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@uid_eq={'uid', 0x3d, 0xee00}}]}) 15:40:48 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:40:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0x0, 0x1f, 0xf7, 0x20, 0x2, 0x3, 0xb0c, 0x124, 0x40, 0x284, 0x8, 0x9, 0x38, 0x1, 0x9, 0x8000, 0x200}, [{0x6474e551, 0xc0e, 0x6, 0xc3, 0x3f, 0x8, 0x9, 0x8000}], "aec9c0c6a0a2f0a5614fa66f9c92511ea567c62ce305be92b6725b89dcca74827bffd41278fcf65e127c68340b52c9316a2c060c2e41b1c68ffb75a05606dc28be307721da74ed864a24dfbd16a18ca61ddb2d8e79cea2583beab5636839a9edc27baccc085e3bcbaf3c4a1babc4d00d87cf6fa4c80e42d1dbdd87b953b837830b2a250dfae25586d0d1c0cacfd01dad283b1bb96c48c3f3e06d004acd855190b07099446bdcb161859304e68c35cd862763a2a9564c40164b690bd5503a84f03022ee17ea70ca63c5f0c77745f759b0bc2ec2d5290eeef255", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa51) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) open_tree(r2, &(0x7f0000000040)='./file1\x00', 0x9000) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:40:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1b0c21f000}, 0x58) [ 2320.025813] tmpfs: Bad value for 'uid' [ 2320.105593] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2320.140291] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:05 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x57) 15:41:05 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5100, 0x0}}], 0x324, 0x0) 15:41:05 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5400, 0x0}}], 0x324, 0x0) 15:41:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x58) 15:41:05 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000, 0x0, 0x0}, 0x58) 15:41:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) fcntl$getflags(r0, 0x408) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0xe0000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="380100003100000425bd7000fcdbdf250100000079530a8dfb930b9490a17b63df80e5d8989ca86bd6d70c62447464e9c4cc7f04dd2efbaa9649158b876e2116714de27eb061438052f3ea1b6ad272cde002ca4a049d07c80965d88813fcf35bcd1b2c0c5888071d80659921e62924ffc6f267f6410d689189fd0fdd772db1b7828f7e776dc4ac8286dcd3d4a6a863e0be6bd8a045193b73da058dcc4641ba8b4ee746eef64f6fe5891ab6a55465badd71fd99c8ff71798c666d00d47c93a7f0e8b906ff3b116e0d8f00000000000000005ece3cf5ebb1ebc553bb4ec87c90e765b0d3f00700198d58a1ef3a68511930d333d7f1c27ac6f3b0f87315dd30556c114c678d787b759b4a5e68c13fc97e5da9a3b4213e4fcb663a435e5eaae4f79730ab15194dde3d6c18516d3705ac23a7a402f80ddc82bfee"], 0x138}, 0x1, 0x0, 0x0, 0x48100}, 0x40000) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$cgroup_int(r1, &(0x7f00000055c0)='io.weight\x00', 0x2, 0x0) open_by_handle_at(r3, &(0x7f0000005600)=@xfs={0x1c, 0x81, {0x9, 0x7, 0xf1e, 0x7}}, 0x40000) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000280)) 15:41:05 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:41:05 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2336.648445] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2336.655763] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2336.679111] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:05 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f000000, 0x0, 0x0}, 0x58) 15:41:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2a4bf1632000}, 0x58) 15:41:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2336.892812] loop7: detected capacity change from 0 to 131072 [ 2336.903008] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2352.065984] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:20 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:41:20 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5200, 0x0}}], 0x324, 0x0) 15:41:20 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5500, 0x0}}], 0x324, 0x0) 15:41:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x20000398) 15:41:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x40000000, 0x0, 0x0}, 0x58) 15:41:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x553a5f4d9000}, 0x58) 15:41:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:41:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2352.091655] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000800, 0x0, 0x0}, 0x58) 15:41:20 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:41:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2001000000000}, 0x58) 15:41:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1b0c01f000, 0x0, 0x0}, 0x58) [ 2352.240429] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2352.266844] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:41:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7fffffff) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x7fffffff}}, './file0\x00'}) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2000, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid}, {@cache_fscache}, {@mmap}, {@posixacl}, {@loose}, {@nodevmap}, {@cache_loose}, {@afid={'afid', 0x3d, 0x3}}], [{@obj_user={'obj_user', 0x3d, '-'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash}, {@context={'context', 0x3d, 'unconfined_u'}}, {@obj_type}]}}) 15:41:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10000000000, 0x0, 0x0}, 0x58) 15:41:21 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2352.397419] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2352.418097] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2020000000000}, 0x58) 15:41:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x10a0, &(0x7f0000000040)={0x0, 0x3, 0x1, 0x1, 0x3bf}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000140)=@IORING_OP_MADVISE={0x19, 0x6, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, 0x1, {0x0, r3}}, 0x8) 15:41:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x29f7e1eb2000, 0x0, 0x0}, 0x58) 15:41:38 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5600, 0x0}}], 0x324, 0x0) 15:41:38 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x502a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x40000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, @in_args={0x4}}, './file0\x00'}) fcntl$addseals(r2, 0x409, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$binfmt_elf32(r0, &(0x7f0000000ac0)={{0x7f, 0x45, 0x4c, 0x46, 0x12, 0x2, 0x8f, 0x77, 0x4, 0x3, 0x3, 0x7f, 0x119, 0x38, 0x1ff, 0xb7, 0x401, 0x20, 0x2, 0x5e, 0x4000, 0x100}, [{0x3, 0x5, 0x6, 0x0, 0x3f, 0x0, 0x2149e29f, 0x7}, {0x4, 0x6, 0x9, 0x2, 0x1, 0x6, 0x7ff, 0x620b}], "95eefae201f53e19944eba6b73d39a62eacf84f196c8031876e43472728ceb7005881d60fa58a2e58c271a52a891bd4b94cc910cbca8938b5c19333c55b83b080c2d2cb8e8c610355f0357d0f35cb3a0a23e472a7348aed59285ef4212743d358542076c56557883de13271ba247ab40d8e6dc60870153e9403a5b412f7f48baf754668b7c68d80ea0274b26b89bb961b24155df3653b5f1bfaa863c0edc75d1b498390c8bd0336233ee0bd939c50aa7a7e18df65dc6bf07fcc990db3e9e52712f50c3ffc9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x73d) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r3, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r3, 0x80189439, &(0x7f00000002c0)) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8600}, 0xc, &(0x7f0000000040)={&(0x7f0000001200)={0x70c, 0x0, 0x432, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x16}}}}, [@NL80211_ATTR_IE={0x55, 0x2a, [@measure_req={0x26, 0x39, {0x3, 0x3f, 0x5, "e7fc363f0d15ff8d8ef58c145fff08d8099b8155c1887444d39e52ada0447d26cf1616a67a68e28d3f1a3b52cd9b445148d616c4a152"}}, @ext_channel_switch={0x3c, 0x4, {0x1, 0x3, 0x64, 0x7e}}, @ssid={0x0, 0x6, @default_ap_ssid}, @cf={0x4, 0x6, {0x4, 0x3, 0xfff8, 0x1}}]}, @NL80211_ATTR_IE={0x12, 0x2a, [@chsw_timing={0x68, 0x4, {0x1, 0x9}}, @peer_mgmt={0x75, 0x6, {0x0, 0xfffc, @void, @val=0x21, @void}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x81, 0xfa, "c57069c42ae1b777d646142836d26d38c38a8ab882404c0121387966eb2ecd77ac453c25459e6299fadc04c2b832df48d1e8bb5a57e1b36c0304fe8b258aed6b7369d5363e8bc7d929f2e91a011143557396b61426f2ce62d62d55f2db7aff89af7b8a37ddf630541216e1c158c8dd86c614204812f598a71e608bbafc"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x8}], @NL80211_ATTR_IE={0x445, 0x2a, [@preq={0x82, 0x5c, @not_ext={{0x1, 0x1, 0x1}, 0x91, 0x15, 0x0, @broadcast, 0xfffffa61, "", 0x400, 0x8, 0x6, [{{0x1}, @device_b, 0xe80b}, {{}, @broadcast, 0x96c7}, {{0x1, 0x0, 0x1}, @broadcast, 0x81}, {{}, @broadcast, 0xa77}, {{}, @device_b, 0x7ff}, {{0x1}, @device_b, 0x8}]}}, @mesh_chsw={0x76, 0x6, {0x6, 0x9, 0x20, 0xbd1}}, @rann={0x7e, 0x15, {{0x0, 0x40}, 0x0, 0x0, @broadcast, 0x7fff, 0x1, 0xffffffff}}, @random_vendor={0xdd, 0xd5, "eccb9316cacf3430ab9a5f67fcc7b83fbbddd3426c9a32de6a412d7f42d5d6a8871c106811e833b36ba1191a3ce1dfe266facabdd0708a13afeb612efc21a22d70ed79acdf4adcf3921baef1e433861148df2a2b22d05ace62183f0ed07b79bae3ce4e2aa64078eb6b86be603044111d7e2ed2342f63737b02c085ea7db4d714ecdc19fa100c85bda6df5fe608a6500b52fbe28ccdfa257ad57da3b4afd0690d5f72038748bde44655cc231b39e07a22cb8782dced2dfc953177d3c2b30830e84819c1a70f2093dad8d643d2ca31986ad908eccba6"}, @random_vendor={0xdd, 0xe7, "f323119036e20ef66a5b38138156adba59ad2bed11bca7d49e9354a2dfac06a5d9b2b22220ea8721fb443156fb2a0d4f9c3454eb9cc324d9f18e4c48aa18061867f4b649b033bb43ba68f9cd5906a64840786c0a09afff9a7137117a543da74a21b5400c0b44b610bceca538d0fa3a8e3a233e242c76b44352afd274bdd0a308b264c1e77cdba571d49a27628364ac1d50d35157470510169a1d8af9fc88134335242ba3129864b41a95676fdd90a7d25155b499f4901798bb1fc62ec4bd01998e385d851db8f028691e2558a5d02a59e4454724ce32e29902a3ff2c95d6bd64727e425d414801"}, @measure_req={0x26, 0xc8, {0x27, 0x6, 0x0, "56e696ea38ae3931f3690f34f7b73858c24866fb10c9e33a71ca5692345b8d25cb1e011fc15607e8c39ffd03e6c25d5c700a9c68ba88b6f0d2b8bf2c3d218bc8efde71721c8808f7358024ec114c109470532bcb2a74ee01a8cb58e17b5dfed2b4a4f68f484bd2b1db97386ab841a885bd6f8ca179038a2972f3c69456e31a5898d95a499d865d684e2a6380d7687aa2a9ed7c3d671a61889fbb9782451606c29462cfee4acf15262def8d2d26032f732caff3b55c4f610d83f5fe5e7ed766d8faf13f9333"}}, @mesh_config={0x71, 0x7, {0x1, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x8}}, @fast_bss_trans={0x37, 0x109, {0x2, 0x7, "cc03bc82caf62bd26a2dea2706cb247a", "4a148d76491eb7df81ffbc0a168484337e3d1de39fc579b3a37e2ac895bba44b", "ce43dc8fe762e66a8585c2af8b59053c143c7c3cbf20ba01d8eee531ac5ccab6", [{0x1, 0x1a, "9aa33d451fef3c0525e3b7c1c33cb3718028615e4f3d7339e46e"}, {0x3, 0x1c, "1565542c26aa13f914c2d988391683a628f67ef171fa2b7303550e23"}, {0x4, 0x1f, "11bc5bff51eb3fe460c83aaa0f67b6da1fd52d8afe65387d83b1d3f9156b9d"}, {0x3, 0x13, "358079b672a47e4cf16553b4e4dcbce1adc002"}, {0x1, 0x12, "5f908316ea4a5dc8ae9eb0ce722546c9b8c4"}, {0x3, 0x28, "29e14c1bd4a42074364c45fd5aff6db82ac67432bf4ee801b3a6e41c023841e436e1556c733ba6a8"}, {0x2, 0x7, "434019aa244cad"}]}}, @prep={0x83, 0x1f, @not_ext={{}, 0x80, 0x3, @device_a, 0x3f, "", 0x8, 0x8, @device_a, 0xb0a2}}, @channel_switch={0x25, 0x3, {0x0, 0xb4, 0x7}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x96, 0xfc, "f3b4eef6ef2046a49ed451e41235b6e3093956e9d27776f03a49f51ecad93c9f2a8020a5445bfc836c8652995b695492cd2ccfed0b1cf863d32552e3655029f4f418457f86e8a77b4f6015a21fb72278e57a3058211f0cdc143c7bafe9119804becaf35b3968b5b60e9842400dbd3af23d757218f5c6ce6018ce5c9e667da8102d7e1dff14daf3a8af713cbc2e8686a95eeb"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x100}, @NL80211_ATTR_FILS_ERP_RRK={0x51, 0xfc, "db522b11784c55dbc5b3fde552f5bc6e21c7c95dfab61d3292b92b8c37d28cbdd0c7d25c40437c44b0ee425124637469f69ccc37af049a407bba69338e9d36eb30f53ea887d1fc370059b7d68c"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x1}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}], @NL80211_ATTR_IE={0x8b, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x1}, @gcr_ga={0xbd, 0x6, @device_b}, @random={0x6, 0x67, "cfa14560a8ebd56845b4f300ecd81b62861af51b03dfb1c315e44f12f8c3fc352bbee2eef20b1548e6c259cfe2694b29ca3db264ac14381412adf4ab3ccf34d2c17847d57c39f295ba5b60be046a6d5d4703c49ed7792f206a3af9630e0767941ed73823e59650"}, @mesh_chsw={0x76, 0x6, {0xde, 0xff, 0x10, 0x3e}}, @sec_chan_ofs={0x3e, 0x1, 0x3}, @gcr_ga={0xbd, 0x6, @device_b}]}, @NL80211_ATTR_IE={0xb, 0x2a, [@supported_rates={0x1, 0x5, [{0x36, 0x1}, {0x24}, {0xb, 0x1}, {0x2, 0x1}, {0x3, 0x1}]}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x2}]]}, 0x70c}, 0x1, 0x0, 0x0, 0x800}, 0x200000c0) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r4, 0x80106720, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x6, 0xb9, &(0x7f00000000c0)="9ff8e968580101d420e2f51c3237b375456f605fd300b43c5a73f0892b1a4ef78668516f3a19002472716337d1982d290cd11b25dbd469b9e4a96a7c76640129705eb90ba3acfc4d6035c1abb0e87f779623c7a75d2345fa7a5a8858d2db9115c0df7011feb1b12de9390327f2f09a3978135ebf1a51329084edf6e22e8d5ec574f75f2f202c8c5be74eaf6579b177f293b09dfe257118a9125aeec5bf953fdc4d81c12c71fddff168e92f5c3949d537f0d7c1ec15de801f24"}, {0x800, 0x1000, &(0x7f0000001e00)="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", 0x1, 0x1}]}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x811}}, './file0\x00'}) 15:41:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 15:41:38 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:41:38 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5300, 0x0}}], 0x324, 0x0) [ 2370.069717] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2370.095919] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x58) 15:41:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x553a3f6e7000, 0x0, 0x0}, 0x58) 15:41:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:41:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x19006, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x4, 0x2, 0x81, 0x0, 0x5, 0x183, 0xd, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xdad, 0x1, @perf_config_ext={0x9, 0x7}, 0x6c955c3114e4d174, 0xfffffffffffffffa, 0x0, 0x0, 0xe17, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1}, r1, 0xa, 0xffffffffffffffff, 0x1) [ 2370.307264] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 15:41:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000001000000}, 0x58) 15:41:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2001000000000, 0x0, 0x0}, 0x58) [ 2370.358500] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) setns(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000001e00)=@IORING_OP_WRITEV={0x2, 0xb3730263a51aca06, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x5) syz_io_uring_submit(0x0, r2, &(0x7f0000001700)=@IORING_OP_WRITEV={0x2, 0x1, 0x6000, @fd_index=0x8, 0x7, &(0x7f00000016c0)=[{&(0x7f00000006c0)="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", 0x1000}, {&(0x7f0000000280)="af2dbbb3", 0x4}, {&(0x7f00000002c0)="5ad28487b6c5887d22922374253b1c6957e81cab20ff4c4466cfa96b5dfbb6bf1ab04eac633973c4f63b670bfad7ec75aa6f4fcd5dde97292ae1360ea5a8acd2c128f9eb01eb29db99da2a4b8c4d6a5efcd339756f", 0x55}], 0x3, 0x12, 0x0, {0x2}}, 0x9) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r4, 0x0) read(r4, &(0x7f0000000000)=""/31, 0x1f) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) setns(r3, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x0, 0xa, 0xa6, 0x4, 0x3, 0x3, 0x400, 0x330, 0x40, 0x121, 0x5, 0x4, 0x38, 0x2, 0x2, 0x6}, [{0x4, 0x349, 0x9, 0x6, 0xef, 0x80000, 0x2000000000000000, 0x8}], "e45428f3171d90220867ea402d420c09154bc5fc26a3cf495bc17be6e64ca74676afc9337ac445752f82b79fbd62a4f90d310ea012c2642b55dd7d176154d28b43c838af0ef1d9b04ce72a624670be54c3aefdbd34eb778ccbe15ec2629aa6e3e0fdae3e128833e2386a78313208ac9fab93ef259713c2f8c014459149cf747ff5e1de", ['\x00', '\x00']}, 0x2fb) mmap(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x2, 0x12, r3, 0xf42d8000) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000140)=""/15, 0xf}], 0x1, &(0x7f00000001c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x1, 0x10102, &(0x7f0000000240)={0x77359400}) ioctl$NS_GET_NSTYPE(r6, 0xb703, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:41:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:41:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10100000000000}, 0x58) 15:41:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2020000000000, 0x0, 0x0}, 0x58) [ 2370.560293] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2370.617584] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 15:41:58 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5400, 0x0}}], 0x324, 0x0) 15:41:58 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5700, 0x0}}], 0x324, 0x0) 15:41:58 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:41:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x58) 15:41:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000000000, 0x0, 0x0}, 0x58) 15:41:58 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x73, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x11101000, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, 0x0, 0x4e}, 0x58) 15:41:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xc) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2389.601413] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8000001000000, 0x0, 0x0}, 0x58) [ 2389.672837] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:41:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2063f14b2a0000}, 0x58) 15:42:14 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5500, 0x0}}], 0x324, 0x0) 15:42:14 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5800, 0x0}}], 0x324, 0x0) 15:42:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x904d5f3a550000}, 0x58) 15:42:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x10100000000000, 0x0, 0x0}, 0x58) 15:42:14 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:42:14 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x48c01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0xc0, 0x4, 0x4, 0x0, 0x7, 0x804, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0xfff, 0x401, 0x7, 0x100, 0x528d8d27, 0x1, 0x0, 0x6, 0x0, 0x4}, 0x0, 0xe, r1, 0xa) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:42:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) fallocate(0xffffffffffffffff, 0x10, 0x5, 0x3) 15:42:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffc01, 0x200000000004}, 0x0, 0x9}, 0x0, 0x8000000, r0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2405.290743] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2405.319858] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:42:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0210c1b000000}, 0x58) 15:42:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000000000, 0x0, 0x0}, 0x58) 15:42:14 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:42:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) fallocate(0xffffffffffffffff, 0x10, 0x5, 0x3) [ 2405.535586] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2405.578198] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:42:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x20ebe1f7290000, 0x0, 0x0}, 0x58) 15:42:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ff1f00000000}, 0x58) 15:42:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:42:14 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000001e00)=@IORING_OP_WRITEV={0x2, 0xb3730263a51aca06, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x5) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x0, {0x0, r3}}, 0x8) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000001e00)=@IORING_OP_WRITEV={0x2, 0xb3730263a51aca06, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x5) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000440)=@IORING_OP_READV=@pass_iovec={0x1, 0x3, 0x4007, @fd_index=0x1, 0x6, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/130, 0x82}, {&(0x7f00000000c0)=""/134, 0x86}, {&(0x7f0000000180)}, {&(0x7f00000001c0)=""/81, 0x51}, {&(0x7f0000000240)=""/205, 0xcd}], 0x5, 0x0, 0x1, {0x0, r6}}, 0xffffffc1) 15:42:29 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:42:29 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5900, 0x0}}], 0x324, 0x0) 15:42:29 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5600, 0x0}}], 0x324, 0x0) 15:42:29 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x85, 0x80, 0x6, 0xd3, 0x0, 0x3ff, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000000), 0xc5f4428af62a47e4}, 0x2083, 0x8, 0x3, 0x8, 0x2, 0x6, 0x2, 0x0, 0xce1, 0x0, 0x5}, r1, 0x5, r2, 0xc) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:42:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) fallocate(0xffffffffffffffff, 0x10, 0x5, 0x3) 15:42:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x58) 15:42:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x706e3f3a550000, 0x0, 0x0}, 0x58) [ 2421.050869] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2421.083758] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:42:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0010c1b000000, 0x0, 0x0}, 0x58) 15:42:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x58) 15:42:30 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:42:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x400, 0x99}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) syz_io_uring_setup(0x2058e6, &(0x7f0000000480)={0x0, 0x9b71, 0x2, 0x3, 0x48, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000180)=0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r5, 0x0) setns(r5, 0x80) setns(r4, 0x0) r6 = syz_io_uring_setup(0x10bd, &(0x7f0000000100)={0x0, 0x186e, 0x0, 0x0, 0x23c, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)=0x0, &(0x7f00000003c0)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0x12, 0x0, r8) syz_io_uring_submit(r7, r3, &(0x7f0000000240)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3, r8}}, 0x3) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000400)='\x00', &(0x7f0000000440)='ns/cgroup\x00', 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044008) 15:42:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2421.273749] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2421.296706] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:42:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xf0ff1f00000000, 0x0, 0x0}, 0x58) 15:42:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x58) 15:42:30 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:42:30 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x8000000006, 0x5}, 0x0, 0x100000000000, 0xfffffffd, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2}, 0x0, 0x4, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) dup(r0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000001, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd=r0, 0x8, 0x0, 0x7}, 0x1) 15:42:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x100000000000000, 0x0, 0x0}, 0x58) [ 2421.528024] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2421.564413] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:42:47 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xff030000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:42:47 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5a00, 0x0}}], 0x324, 0x0) 15:42:47 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5700, 0x0}}], 0x324, 0x0) 15:42:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x400000000000000, 0x0, 0x0}, 0x58) 15:42:47 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000058c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0108003000"]) syz_emit_ethernet(0x69, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000aaaaaaaaaabb08004741005b00680000c4119078e0000002ac00940400004e204e20003f90594281880c08e20670014e989bf02de80087c87ed8de5e7494b35b0099ba723307f0ed3ed200f5343a4740a11e2ea196000000000000"], 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000005900)=0x68, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x10f, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)={0x1, 0x4, [0x7a, 0x832, 0xf78, 0xa94]}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r3, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) bind$bt_l2cap(r3, &(0x7f0000000240)={0x1f, 0x81, @any, 0x3}, 0xe) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044008) setsockopt$inet6_group_source_req(r2, 0x29, 0x2c, &(0x7f0000000100)={0x1000, {{0xa, 0x4e24, 0x80, @ipv4={'\x00', '\xff\xff', @local}, 0x9}}, {{0xa, 0x7, 0x2, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x6}}}, 0x108) 15:42:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) r3 = dup3(r1, r2, 0x80000) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x5, 0x40, 0x20, 0x2, 0x0, 0x3, 0x508, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x800, 0x133c1e70, 0x4, 0x4, 0xbbb5, 0x9, 0x941, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x4, r3, 0x1) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x1, 0x0, 0x5, 0x9, 0x0, 0x1, 0x80000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x40811, 0xabb, 0x6, 0x2, 0x5, 0x20, 0x7, 0x0, 0x5, 0x0, 0x7}, 0xffffffffffffffff, 0xe, r2, 0x2) r4 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r4, 0x0, r5, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) fstat(r0, &(0x7f0000007800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000007880)='./file1\x00', &(0x7f00000078c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) r9 = semget(0x2, 0x0, 0x20b) r10 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r9, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r10, r8, r11, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000007940)=ANY=[@ANYBLOB="02000000010006000000000002000400", @ANYRES32=0xee01, @ANYBLOB="02000100", @ANYRES32=0xee01, @ANYBLOB="02000700", @ANYRES32, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0xee01, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r7, @ANYBLOB='\b\x00\a\x00', @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=r8, @ANYBLOB="10000700000000002000060000000000"], 0xac, 0x1) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:42:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}, 0x58) 15:42:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2438.321854] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2438.343629] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:42:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:42:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x58) 15:42:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x800000000000000, 0x0, 0x0}, 0x58) 15:42:47 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2438.491496] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:42:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x58) [ 2438.531985] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:42:47 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1f}, 0x0, 0x0, 0x0, 0x6, 0xbba4, 0xd2b, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000001, 0x13, r0, 0x3000) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x810, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x80000000, 0x1, &(0x7f0000000000)="475068e6cc6678204a546ac5b759b45abfbee4621fde219aa99e58af4b7e73240cbf18a84ee5a19e368a19f069d258f114b07852bba0eb390f96ade8be8de684572e74c0e4807883db4d2c0fc3e41282cb94d966e331852ecb3f73d9700e8fae6cd63c54c40ac5ae66a4f58423b2779cc3525f86c34c1319a7c524fbf47d102ab08e3527cd193ef841152595b3eeb8bbf3d0", 0x7, 0x0, 0x0, {0x2}}, 0x5) 15:42:47 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:42:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100000000000000, 0x0, 0x0}, 0x58) 15:42:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x58) [ 2438.736936] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2438.778680] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000000)="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") clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:43:03 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5b00, 0x0}}], 0x324, 0x0) 15:43:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000000000000, 0x0, 0x0}, 0x58) 15:43:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:43:03 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) fork() dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:43:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x58) 15:43:03 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:03 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5800, 0x0}}], 0x324, 0x0) [ 2454.568222] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x57) [ 2454.617093] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00000000000000, 0x0, 0x0}, 0x58) 15:43:03 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) fork() dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:43:03 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000000000000, 0x0, 0x0}, 0x58) [ 2454.751726] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2454.766398] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:03 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) fork() dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:43:03 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x20000398) [ 2454.880407] cgroup: fork rejected by pids controller in /syz7 [ 2454.884233] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2454.930703] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:17 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5900, 0x0}}], 0x324, 0x0) 15:43:17 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5c00, 0x0}}], 0x324, 0x0) 15:43:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) clone3(&(0x7f0000000880)={0x800000, &(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)=0x0, {0x5}, &(0x7f0000000700)=""/109, 0x6d, &(0x7f0000000780)=""/143, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x58) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r1, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r1, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) r2 = syz_io_uring_setup(0x20021, &(0x7f0000000100)={0x0, 0xac87, 0x10, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0x12, 0x0, r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x3, 0x0, r1, 0x0, 0x0, 0x0, 0x2, 0x0, {0x2, r3}}, 0x7ff) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) clone3(&(0x7f0000000980)={0x21a000000, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x1d}, &(0x7f00000004c0)=""/107, 0x6b, &(0x7f0000000540)=""/208, &(0x7f0000000900)=[r0, 0x0, 0x0, 0x0], 0x4, {r4}}, 0x58) r5 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x73, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xf4b94ca6315c3923, @perf_config_ext={0x1, 0x4d2}, 0x0, 0x8001, 0x0, 0x0, 0x4000000000000000}, r0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r6, 0x0) r7 = syz_open_dev$char_usb(0xc, 0xb4, 0x1ff) copy_file_range(r6, &(0x7f00000000c0)=0xffffffff80000000, r7, &(0x7f0000001a40)=0x8, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r5, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x80, 0x0, 0x81, 0x0, 0x9, 0x6120, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb3d, 0x1, @perf_config_ext={0x5, 0x3f}, 0x12021, 0x3, 0x3, 0x0, 0x9, 0x4, 0x7, 0x0, 0xffffff9d, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:43:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) execveat(r1, &(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='\'}\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='$)\x00', &(0x7f0000000180)='\'\x00'], &(0x7f00000003c0)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='$,\x00', &(0x7f0000000300)='#\x00'], 0x400) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:43:17 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = fork() r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5d, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0x0, 0x1f, 0xcb, 0x0, 0x80000001, 0x2021, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x3562, 0x8}, 0x10, 0x6, 0xac, 0x0, 0x7, 0x1, 0xfff9, 0x0, 0x3, 0x0, 0x20}, r1, 0x7, 0xffffffffffffffff, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {0x18}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:43:17 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:43:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffff00000000, 0x0, 0x0}, 0x58) [ 2468.572740] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x58) [ 2468.611216] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x58) 15:43:17 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:17 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) copy_file_range(r0, &(0x7f0000000080)=0x9, r1, 0x0, 0x6, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) clone3(&(0x7f0000000340)={0x1020000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:43:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x58) [ 2468.836504] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2468.873081] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:43:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x26ec0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) 15:43:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file1\x00', 0x4000, 0x10) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0xfc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0xc) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x5c6cedfc838005b3, r1, 0xfffff000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/21, 0x15}, {&(0x7f0000000180)=""/246, 0xf6}, {&(0x7f0000000280)=""/167, 0xa7}], 0x3) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x288800, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x20, 0x1, 0x2, 0x0, 0x8, 0x200, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x4, 0x6ea}, 0x400, 0xffffffffffff97d7, 0x7fff, 0x3, 0x10001, 0x1000, 0x0, 0x0, 0x80, 0x0, 0x20}, 0xffffffffffffffff, 0xd, r3, 0x8) r4 = fcntl$getown(r0, 0x9) syz_open_procfs$namespace(r4, &(0x7f0000000940)='ns/cgroup\x00') 15:43:35 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x58) [ 2486.830276] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:35 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5d00, 0x0}}], 0x324, 0x0) 15:43:35 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5a00, 0x0}}], 0x324, 0x0) 15:43:35 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:35 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x85e) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000001e00)=@IORING_OP_WRITEV={0x2, 0xb3730263a51aca06, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x5) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000006, 0x1010, 0xffffffffffffffff, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000040)=@IORING_OP_WRITE_FIXED={0x5, 0x5, 0x2000, @fd_index=0x3, 0x7, 0x3, 0x67789860, 0x1, 0x1, {0x3, r4}}, 0x5) 15:43:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:43:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = syz_open_dev$mouse(&(0x7f00000000c0), 0x0, 0x406400) inotify_add_watch(r0, &(0x7f0000000100)='./file1\x00', 0x70000ae4) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) getdents(r2, &(0x7f0000000040)=""/73, 0x49) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2486.859146] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:35 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x58) 15:43:35 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2487.051368] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2487.084270] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x58) 15:43:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:43:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2882c2, 0xf3) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fsetxattr$security_ima(r0, &(0x7f0000000300), &(0x7f00000014c0)=@ng={0x4, 0x8, "764c8e13dce365422bb863620dae"}, 0x10, 0x2) [ 2487.271957] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 pwritev2(r0, &(0x7f0000001440)=[{&(0x7f0000000040)="5a04478b7a64f501eae428b7aed413c2898086b6f890445a9af41a6e5255b65a2824cc2670871b33f2a0ecd103017b6aebc6546c4225660901e2091383a693ab2e0695b74ae6a6ee3476decfa6cb834fc01f8fa5333ac6dfa7487c72bb14fdaf012fb8255a569d727f2002a7a51ac62aa0e996ac1cf2ef7cc160540e9ea802795d0ec22587992ca8dc6f318ac2515a4fc0b46f312ee3202dd529812b419d9742b18f3696ac", 0xa5}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000100)="49a61feab5a1f7dd2f10cc5ff5864d7f3751ac45751b", 0x16}, {&(0x7f0000000140)="5135148c392579f1771cf942e0fd5d68afdb0dd81808c90f5770c4fddc8f85fbd13089d5f61955891c5b2f98a9a1e9a22564981694f91326959bb7eee46ccb1c21fa6fb705f47942736c9464b19ff219d43075790c6dbbf8920a0ec24e419949eb58b9e16be0d3ac871c64", 0x6b}, {&(0x7f00000001c0)="4b6df953463d510bb87da39ebb2641932edd620215ccb2f0f2e4871d6920f3b7d4c92baba3636fb554efea0b26a564fa44190e2165e9e335a5e407ba7bc603c14bfd81f831271bdde8dfdd76fdb04e15b6198c3964fdfcde9c59f6903d5e56694608a343217345b0cc6400", 0x6b}, {&(0x7f0000001e00)="7f057fe41d2fdd756556ac40b09fe84453219c9f44aaea996152307beb94e2d03d69c8d472b44cc50051691a8091a2deab00179792004b0c7cc7f1d2c43aa24bc0761d8882b3652428b776c4e1d1db1130b346b25dce301378923eb8c7628a1513faafbf5142b901b3156e5e727dbc2e6703c7ff8b8dc558f6f1824c32adc90f525e724c3b4b9c1b6fe1384dd12b92e39c3ea251d8f0e3cf27cfa98d014b9f5998da416f776c7851d7112a8edca3556a7d3638cd0d2e0a0208b9ea237a61b9d160a108aac6982f1ee460e58519f9fea0c41a3210fe1ba4145e0bc56929ff52d8f7f69db5aaa3b1fcabe2e17d9ed695fff51f5f973c8363408e8444f5a12ca025ad3472d57231ed6f10df4f6b69ba1d95dc9f084a3b4ff7ae16fd025ed56a3c112bfd8f9b5cb1d8c57d44aa76d4d0824fb75a6c441935e9dbb7d81026b95b7ffa3d8bf3e910aa1fd91e192e8caea91c94a12f9b2718b8f5cad35fd2997dff5753a328d31374db0fdfd98fdbe4d8b1182b0cf02abf8bb1383f4e324cbf0ab8f3d8ad846f19359f19fe7e6fe3fa692befaa0dafc622284924b52438f08fbd96296f73223a748261c6dae87d59c5e931e448fa817d67d30f820c4bea37bf29939239d749535ac77de60ff682fc5e900ec66b7052bbddda3b123b8c9f58789028bc4ce15d631e69b8fd10f431b74c858ed1364343649708f0e10307635f851c59fdd79324fcc19a514f16308168cb120b4c93dd81fd9d8016945c2565cf3a768f5f829021b9166ba138dbe4bce2091950313fd377fb10948dd9f3a2652488ecd281d0646e74f97e7d32e5b9543206b7f7bad6648494962d311d6489eb7e2f772cd29b992014b857f52d5b20809f82386644aa7540c817bd5e7470310a0bc779ba825594d5c59c73d7773891b84dcd51ad969ed8c51c011981ac96c66f42a7340b77af212a3848d58d6d4c6c9afcd26199a75922bad49743b2753e6c263520287346f743aa40cea98d103522b948aa3de6c1f93c9e49dee78dd5dc0178ce2e0b591e19c9e39ff7287757811cc4ec2aa4220b588b84af3c0f4c8725df9ebfb99725e8691185b2db038142b81431f23b2872c47b0ecbf109f0a55358d01ba4e32dccdcac35e62cc436af3578bd0aeae9337530239cc331b83210b597e6a9250c096c282836702ca5b4458985d684e3c25f82d276efc406b07ce1bdc16afe49d433581c680ad65906c71aa12e44d957e7e994c2af3ba26b50084ea4435922df75ed757870a804dc24c99624f1b5dc81e097fc0a3ab00119dfd15db22e10a2df0629d0a8d429cbaf2dab395acbb0f5fcf050509f18dfbc515001cb5841ac3e347ad2b8ec4a82f6cd487252924fce480b0ed2419f53e86d6acc80e1cc5f686f79536230be6f7eabb77f7e018b544ce4733759fb032bc88f05c8404d2c7bba0d54aac0cd927f7bc5f8329ed5276fa23964a8ea7b6ee3eb8eec86ea868e8da34cf11ccfbbab9bc46126b986d6b44adacc7934f2f3384dfff0c307ff48ebc11815827a11efc1118000e29a703020aac89ef6ab9adaa26c6b9a073596964890e9360a001c5c5a659bec86a102cbf8ee43d2c95cdf7febfaea0874da1d5c77c6931313cd77481752d0f4b9d7f1412989ff3b2cf8c51eb44be7a41570b2a38ac757d9656db218cd6fa924fa975d04436c8242a997fde4a60c59bd62dc5ec99de4b62e24731c23ec3939f475a8462e2678c24cc16ce11663628b4b0d8aa7e7c3c459d90f85c955973428ae09dea4f71a5e18b63dca01f9ce96359badd1002a9852c48e8ba743d0ab255601d8db55ae9a9916b6e0b5436827b4394f5c3be513149496d85a8c1c3173b18d2b5d9513fbbbb047ecf62e0291b5e8390d400e465cb2b6c3a9fa858e100d01309ee8ec7e56ca08850440269d1d484c95303cf1e7f755004988578ed08243b3f11d750bb6d84e5dc2db713272e0d768318cf676465623c809e8b6f729bb2c21e116ccab8a52d434d07efd4742a76cb31602acece7a7d80f3325473564ee47eabb1349c9b63b28604c3a9cc4f0858fbd33afd576791bc5ad6acc16dcef1a4cb1e3b2c42af6fff8e1bd0d150e08dfd227dba5447df7eb72809ba1c1afe159860c66676fd621ccd879a1dab9a781d38f4735428ddb3b56262a00f8bc669aaacdf862e4c8590a5bf64847c17edcf8e2e98ae1a851d9a6adf046d84a31b26e30b3aaab0698cf8e7762e2dca2e62dcebb845c1ef7f8dd77e05b241fc03f595fc0013494f18cbf0fd2b1ff9a36e15380923cd5913666283aabd28415daae00f42f9cc3128e62dac70f67f83aad30420a3e652e42dea460914466f2aab3f741ee1e7b9bca57467d4cfba1fe94821ca8eb61092b12a51dccf47513ed4a53f80e3704b9ecb4f89d1c1c0852a1ae29d0e20f065ab285c248df5fffcc1196563ab8204aea2aa9b950d842710908803428f65cdb1536b9588de1866dc58bf5d1db8d562031a31b957c36bf207472bbc89a87cd96a46eb07cd72279ac94305206486cbf4e42386c30daeae07ec3a86daa8fba4a41b626b5c4c02722a73fad766c359bffe41c237f56519708cd26b2939ab712c9d2923ef5b89140b6513cbbbceb28b08265efad0a28d59cd5913e74da5c8a41522e5736cf42c28deaa824758d26de24242bb792d66912bcd7d444e93bf68ff2681be4d5136fc947eddba3fed0943a4d747ef0f35a9f74b75c4cf4addea0e2fad2a306b5a90a658cd9ffb164a78e07abb8f8623acafa919c23be7d99f18a7a962c7f514f1cf0e9851472099b2906b8a16453ba4cd0fbceffb7ae5c8fec0889ad98f8b21bb79f2f962e663912f0362b51b289fcf64d850317335ba19609f3181d34c2d348a5c88164de9730a89703fdfe7514815f82f9458d5da20de06aefca39f14e0b76e841a75305a52c2d7584867fd597f29ad97aeeb7271a89fdbb8c7a3d7ad20cf8c8c3d448827a4dc2545449996b4fdef9a5658fb20d8fcbdd967592a98411ad25ef980411f3fbbc3f6c97c325eb2026b91a989bcce8e0f06c360c02d6070eb6993b2843b96ac71b1c336ca8fe221bc58fdbac3e58bf4fbe7fa1b7c10808f8da0fea527deb97b771146d1efa41bbd3d79ba635ca755f8bfe4c9b88e2883ef4cef3713022cb47f5429373a08b6ec5c84363dd7fcbb1947c6a43495a49c2e0ca81fc2a745b5f431ea00642e44a77cb14947d72fd1d7c92cf64ce950dde16b2bbb50e9c6b52f78d4748ecea02014f22edaf884043e59d6d3039dfd268e50d05cfc70622cbd9a58c2ab3a437a5a7eb83db79b52f3819e9c50eaeac629d7ae35aeacdabf2675b7425eda67fce9619d15dac75278d45fa9369f7ec098aeedb162f0fbe8f757d87095fa1bf1ee4dfe252f8c74a1955c982e490b6a42ae9fc510e66a247dc7edbc0be74288d67d86ba702bb233235f08cc04b879179afb6eb7e71d0b45aba476dedf4aafb0b7a6bc967436ef8a5e537c0ef527dd62b4b71f85f4c6f130aa7dd69c3b41d83008b7279ad06b3f687a45d83edf9a08cde7d890392f48aa99e57d2a7c6b88c377a3ad883a7bd40d0bddc9c9e2cb7ac38cb7fa724de1d1bd2c93d88d78af67b43340c5c9db9960e15f57f082d0775b60be1397664982ecf733ccc782ac8f90f76cc62e58a094a60c01c9801f0ca9153e9b99facc0523fe336f730555fcf4850ff219fe28def2d6c57e11b31f67f8fcfc783b072e7b44e9431f41bf00ea9d82b9aa0840d87ed512bb16f4089ba0be5ab6c82290daf18d3a1043d325bfc1d888abce419ae707c26a5583c21566c92e7d9fe2648f353a922d4c71bfaf9c4d543c6d453cd03ff84eac1aeadff20d720fa8375d9a2f0fe73ec551c1d957d3cd1e24e391598e2341d4a6d96cc243f7936ab950df03798754fb415698fc3cda13c57c0bca812ea3202b4104f387a0410ff85084ab71bf2998cb0b61bdfa82f1a89c36f1d4d399da1669af0f26d7073524ce9817a8fcf953e25f88bdc0966b02bf94f6af99f55d902d35ef713d71a4b43db5d7579ba15bd2e4ce915e2bd460d5d500eaff4f0fc84f7381e5378b36a2d72dc6118b5cdb7adc0a4a2e921657d8683ee0cd717b36eb27436d63b43b9355fd5ac1608647972ecf295f321f3b7920b625f980f5e10b9cfb49a9caf1ab96d6b74e6e397386846b72953d61173042f88b2e1b7d4807ef4df0d2507cf4aefa840f3583f3ab3deddbcdf16b4fa7f3e227ca7e07f9b4293bd82d2506bb3a035725f00206199f263ff95344283edb4724bffff37abd42375c8a23f770bd7479e7f508dedc3e93a6b5ffe69a3d2696a0a80e7f105a98114c522e45addfba85b0017681e6d07999b69be31fdeed5adfa9a4bda36076a6d820602484245d8ee138167ea9d249adb497729596cf65d07956aa9c112fc6795f0b4929965ec8cb9d2be5ae43915fc467a749821631454f01db53b41b86958a54cc12a546757b2b8dea16eab8ef8a417b85129d24ba3064a7810325f27cfbc8cd5c75ffcf53df5b33d8cb983d6f3b381c9febd7a22f47ed3a64b0fcd3bbc36e3b8d84bd4a656c02ef28e36250742b17e5830f1dc935bb939c466dfb7e9cb83dada37eb65a93142656ac0c7dd888c8beb1d6ca06c9ba5f170f0d2906e7c88aa1e7e0b126f115be8dc29d6c9b892e711aafa6b681c4c624cd2f342974426d0b3983c086f5f82536581166a2a5708eb881e5bb6b52058463317c5f17e533a01bb40af344bf34e485c6b7a1fd9c410e29c785db99e7798f75b427dd74e0827f5e557845c615b5b2006ac40106ebac19704b24c0ca62c2616a2a8997bed746efd851993b3123987fd04465e8e288d8ea1ebd2351c57697a5fe38fc1455199a5dd639db60d2b2ba5a99a1921925c753a85453647eb858e48de52d871839917d3e4a3a872c583b4b34047f686107981a99dd5ebb16f860b78493fe2937015ba131419c831c6e366136a96fdf3f9c5b46300d4e8544c24defa9c52361dfccc2a3d209ceafbd73b540737550c2a5e3e0554601fe386c4c33cc3e76c5be1585e7c994abb9128ef4b7641533197c19b828b9c650b66761ac44f76364ee5bf39e6d1388786cbb218388771c4f9d34c37507f739b9aaea4aec98036d23510dec51fd9fcbcb7bfed265cdeefa3cea2e1fd27dbf5ebde20c2e35bcaff2d8a70b6c1f85fbf6a1918776ff1010a21befea8b0e40ce17597208352e50f285dabffe1a9695f95f90e6dd837659aaf524df7102930efbe40b9ad14e066972202b13084cb546e72a21a35ead984eb7ad5982596cb67d32ccf2b1e1c0ae7e6c8073065acc25231ea014221addbc4ed632b011e83011ca3b3b82cd21a5b982e0919b40f0e2558ed831f8da9b0b349191bf0508fc2d67fa21df1a266e9b8515d48860afb57392b79c28b43d8bcd198699383165fe9177e66be4ac914c11acbded1fb8df5fda0536c562040e69e617f6e80b89cb8a587176f5ec472a4375285d42d6334eaa6dda6cd071eba18b9b71edadb1eaf5fe7a77db2c00d66b12b5642a9403c76c1e479414daca9831b283142dd1e64afa0dae119004b488974cf2d9049473e3884ef27031e0d9db64655cf45335884c9251fba6e7a4231716c2777aefd910a95cbce5f3157e5a3973d0a763bc1b828aff240f2851506765467419106ab011c7d31a0843fd6d1b1e9bfd12f446ee4cd4e8ff4d550e1d2d5d4773d04453e4d46bac364d59bc1811655e2df45873ed8a333d6a26a9b9372c856d494364191f86ec8c1125cee5387c199142c6c6c049d907d910cd0bb", 0x1000}, {&(0x7f0000000240)="76f54842dd11b3d366a9cfffd2927ad813fbdaa580df4968f980efc255b76c2b089433c33f7a0ad2efb9b571b1548ffbae6e7b73a78d0b82705f48e5e2fb2d270140dd7cf3e2c2477990b8452317fc7c9f8fa176cc84fd72d3385d6704ddb3b710fa35ed80b8146d4a6edac1b35187d2143b8d08b5020d401185bc3fa677baa74b5bf51e4f7b068e95a7eb3e946a36f9f05e9284559da1", 0x97}, {&(0x7f00000013c0)="c8f63b2742c4c4592065413aef429966b4385245801f8fccd7339211ccbf1a26e18490214b68d26c11b63e6dcc90cc2f385d34e5dae143acaea39ef4919b3ecbec95c559013ac46ac246dca9418ad3b7a1f6d80d358cfe40ae1921bc6790935f8d7a2f1a23b2dfb61e1353350ccef629535f02a5d659", 0x76}], 0x8, 0x8, 0x12a, 0x18) 15:43:36 executing program 1: getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x5]}, 0x8, 0x800) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 15:43:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000880)={0x800000, &(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)=0x0, {0x34}, &(0x7f0000000700)=""/109, 0x6d, &(0x7f0000000780)=""/143, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x58) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) statx(r3, &(0x7f0000000100)='./file1\x00', 0x4000, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x11403, &(0x7f0000000a00)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',afid=0x0000000000000003,euid>', @ANYRESDEC=0xee00, @ANYBLOB="00000000008285fbdffaf43ae72c289840ca3f6456254d18f96409f328f3c0338e3f2a4042b789d446fd81727a9d3ff4853e84ec32609094ce301fd5f38d3991edc3a0dd16249866aa3c2422ed", @ANYRESDEC=r4, @ANYBLOB=',fowner=', @ANYRESDEC=r5, @ANYBLOB="2c68617368c9dd"]) clone3(&(0x7f0000000980)={0x21a000000, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x1d}, &(0x7f00000004c0)=""/107, 0x6b, &(0x7f0000000540)=""/208, &(0x7f0000000900)=[r2, 0x0, 0x0, 0x0], 0x4, {r3}}, 0x58) r6 = fork() getpgrp(r6) syz_open_procfs(r6, &(0x7f0000000080)='cgroup\x00') fcntl$setflags(r0, 0x2, 0x0) [ 2487.325174] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x58) 15:43:54 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5b00, 0x0}}], 0x324, 0x0) 15:43:54 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5e00, 0x0}}], 0x324, 0x0) 15:43:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) listen(r1, 0x2) 15:43:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20010}, 0x58) 15:43:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1285, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) ftruncate(r2, 0x0) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) syz_io_uring_setup(0x27c1, &(0x7f0000000040)={0x0, 0x2959, 0x4, 0x1, 0x2b4, 0x0, r1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:43:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x20000000) setns(r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000004, 0x13, r1, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x2) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) 15:43:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2506.155596] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2506.205910] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20200}, 0x58) 15:43:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x40, 0x45, 0x7f, 0x40, 0x0, 0xa1, 0xcc000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040)}, 0x40002, 0x6, 0x81, 0x5, 0xb76, 0x401, 0x401, 0x0, 0x9, 0x0, 0xfffffffffffffffc}, r1, 0x10, r2, 0x2) [ 2506.394668] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x58) [ 2506.430008] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:43:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x38) dup(r1) 15:43:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:43:55 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:43:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x40, 0x0, 0x3, 0x0, 0x3}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r3, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000100)) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) dup2(0xffffffffffffffff, r0) [ 2506.647589] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2506.679964] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5f00, 0x0}}], 0x324, 0x0) 15:44:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x101000}, 0x58) 15:44:12 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5c00, 0x0}}], 0x324, 0x0) 15:44:12 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000003c0)={0x0, 0x0, "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", "d48e5d8dc0d1ea0b9e1ee7a5df0a84b3a2f983a14d273226849bc5a804c2180bc88c662b60b448a286b9fa8c845eb35cc7e75c431394a5518b0a0779e3e2868b80190ef2274d1d359e89289aea7a1994250f57e5004c952dfe2f64421fde7046f124e4bd99aeaf425bdc80684e306d5e5589c90d1f0932045a1f873e3e717b8c4921c3a0993017eede09b8d13a1b9e3d186e60d836bb31dd8e5b4b889bb745581e5cbfe55e396d7635fcbf20e15ca6ed79e811c55b1be3d940339d991cc32bcd19c32d52390209dc449b317c5dfd8db60bb27a29fb7d1a20c05f8b838163ec2581b60796a0d65c060b2fbe67812ea46708cc9112fb098e8d923b4e24f38123aac16c3101555ced1ba8cd0e70ca796b6aef81a86a8fbd37e6f1bad677aedbeb3b264f697fa0659269b4a751b6aa5797f71ddd4127eb12e3c52bde7fcea0b185e76ca4727f0f52842265823b56758bf61385f16139ed961e8e9b1879f0585808a7f6e47a8964bde7fe7e5618b20805a4e665aee44eec0c25206af094e229655cb725bae62431f03cba50172362e1e7b49696dcab7ca6583518cd9f3c6955eda9ff4cc65ca6bb108a2eb7014d59f5465eff240d7ed6ddb37f9bd6a85b34b0d8e80789220a5718005e052a40ad5eec29b1afc3c18dae67e3a77dbd045781e2d8851ba79f9624d624cfe6bac63741537f1617cf73b4ff998a2cd79fce16260ac6bfddb371f38584919114498ea7e3c4bd9f22bc2ea575ccd8099de94d3cd8a0326e10718d7e08742af0d553b7462790ce8674ad754294496f12750c5f17d17609993f5ca4d7c759b5cd8d60318df58e4f2be5cf9e64847f9163e972fb364eb727cbcaa1e27e210bd8a1bcad82be58fbdd0baaa07a86c8b197e36b9a44ff1c7421116c73ccd9440335aeacd9647c1841dcc1249f81fdf9b8d642c7c458910744687235b0a4cfd3cac38dd4a2f63926e36f82ce0fa4ab5cf2513d895e1b436d38668d502409ca18848cf5da785610aa651d363e91522f29604b05b925b17feccf68b6fad1876127df7ed1868676d5929d80159d890878cde007015e42054fd2f898d734748e581339070061d45feff882b1b339c6c5364ea0686ad247e627c4a6f08ab8e5ea80df78d5b44e391bca99d52de979c2ebb67a858e4bb135df3ac88a7cf3082bb50be26aa6751da5cbc698ff1b71a20cedb7d2d0e8435fc8ae558077b2f9ec5201a0bae06dad0bb7806c00c82292bb4b4a4d0ede42bf927783f96c34e61831fa0af9262e44009713ecfaa9740c192e4ab5f4c557e6fbd98b58331dc9c7c32dc911000c4b3df9a74a00ae06933a7bf72711debd69e85228ec1be6917eec1778b38a2e1019da50bcdf76cd4c72dc4df2fe0957b724aaac5fcb0c383a0fc1d45bf87877611a9d0655d0491360d384ff4cd77d04077f14979f25c3df2b7f467f6164e5ae34dd6a35b85f905f44195798fc42f26435c6b8a2d6092f939fd06ab93c5bd01c4f4fff6d9413f44514ed589f4e797399e7c21f537253909dac715a48911959108c9e557505786c208e48a094c27be0b4a56d977e15ecbcf1d15ebff82414ff733b6362fc8ced70921a3d16d4b61bf8776c92ea0b9759f3590c3336320349ca53c138cf18134abdaa893aba5ac6a73c9e439540b90cf62bbd70b20e4c75d3227c4d7b24745b0b184ec26df5ad92cc2d96809eaf266ba3804e652e5f051ddaa632e9960ba5ffaaaa74e26f8a97b7f23952e0a7fd45ea00de93426e8449c0bfd84e5aecd35685c447257916d0e673ddf57130375c65cbae625058c946baaff0a650cecb0ce839955ee9c39b01158e060f42a1851bf393d4a3fd98aba6a7bd050c0be9c1bb931a2d1adaf8bc07a94a8f8bfa7d9a54b8934592e1147ca35271d5db9a786694a6dae829223a2d87f8d2999126f0949fb3b80bc73e182720d50851d3f3eeac6df85274dbb4748212f8beea4a4e13a3ce3543721435390ac8cebaa19bd7ef42473944b3248d2e3a1db0f5efff44d85083804df2858634062dc2867cb31f09e90b5e5ed8bdc4bc8b24b158638bf44c36be833d0a6199c57467e1ff936ce776ed4cbaddec0f811787c01a516728b4112c559e1c82a416a8c888bc91c2ec608124a79459d6fa87084f87b39475b39ea541e7ade1def765ee41dafeaf85de02bd6d3104afcb5c68e493443ee1c0cf64bab61d35d5557cf068afb27ac91834205c7bd5d7d30aa2f07074f899a6c65dc330936e1a5e266554e9ba9163a1c207ec151ba0aa88dc59f3b4997bf029eed9e3198dfe34cb9dc854a281ace95cb848c5045ac95813486a0c5770c01c17fbb609b9a64e440282087b85df3b4f548f079a9e1311624838b7282291aa17482d3a839a0f95b98cd550d1fe8983aec94eff8ce22ec689f9b91313ced59bf03e6630588ca067204a1bca8e237c8449c558d6c758af324b71ae9c7bd7db491dfcf70ad97a61f8e414d1461cb54ebac4641bbaeaece14469e8da2d2e5063234f63cd612ff6c1ddb48b84946b3a179bfd87b6f20119c9b542b8fa2db9d2e3ee6dcbdd1b5ea16c949da8301ac1974398611987f3b8fac55c1de07fc95e60f2466a6d026b15c759c1c0d8b19ee55ef4beb9597f14b8af03eaf4dea64bdf6bbaa105409634372471806b58eb2db2bcfb532be1d03ea8ae267537c92a868cf0a4973bef6cfae94b204e5d2cb64503b7fe177d2123079fcb743a68711c5c01388c8886dfe08a8434f3cba5a8db19cca5c6e41bec23c8b2ea2fb56fa2b5f88bfe868255475b75ef2082e27e94c1f72c3aeeaaa44111591f05f999ba9526cf3e11357443330fa7ea6b26e476be86e3d6869faa03be98cffa1bc19a3d97395e7457d2feafb3635f933b7062925b6d6062357e26a9cb17ed6a1901203c8c484851f75fc8f46112aa3e37d84df24d1993f22e39c5ed0138c4924ced27718ab8b13149585de9c9413b05e54f6478a084967226e8aed72c5962ec396eee1b97d339a734e6a8522e0d1db9f997b1ccd3d60c3a2045b8508a1f99f2a556762f37b4541145013a34ecb035f95fcc5b4b8c451aee3ba21e6054248c576521f82168cea7b578b098be437fe73732398f998fd67146bbc9ef2949e6cc9fa0d59d548102cece6521b60e09c606e13fe863800c6b0a9a0cab6fde0d8f217a49eadbf5c6ffcd4f9cfb0ac2a0f71b12c5543d9b3d9da1541e4d85c9d23aaa45fd7d892caf76af056730b7f231f81c6909b17a2713e80a5dfeda80c8fdb2f042c201f95b4b6f812e37d16e6410fc70790b80226b5756d76bcd7ca88e4d37da03ee6a23bea1e9956ace7757c2e40c113ff445d23c42d0d4667f041cc105842c28e62ab94d53cdb3e7d64a3712a58d8859ae1723799f2b3e74bed0e32f08210e3782afda69c6008fde1e0eb3842ea67d3a5f39f31e5f5176eb54de6353bbe0692fbfbbe93bca56a47ae1820c8b63c03953b127e1d0d306b406aa3669f13d5737963b1d2e6e40dab6dc005dce30c07e1ef1112041f63faeb48bcab94d97df486eb508b5202daa93f7fa3ea4e75f4a08796d9a984807ac0c02854eb4782ce6a797e68700bdaeb89a9ed9e1a6d465a95cbfde38c9223107c94254cc4b4ca315f9ab0698be211ddc0b7308e3802fc82373a110c4a47f8e1c439bbc1ce276b076691b7573a43bb7912795e9a142bfdb9ef422452ad2e0e14484c01b0a797b165ab3062d008e826975a1452b397eb3d0256417679849bc14bbb32fe965fcf4032992f8a15ace53afc2e77c36d387c54442b360460fcfa2278359f3bd18e3fbb4bcf239ca2887ab7ed61182c044b2c82d95f7e54e7f233389c061c8cb63905a39e4c6ac72c29f4278a30cade8ec528998fe5b10302dece901444c15d622b9ae594f5970c447875078ab93bffa8d04ed39481442cd826300ad73c582339d5d043b83d75fdf8e92b9b0d653c17a35e672bbabcddfca2016994c8529e05aa3d1d01d4c76fc5fb4d61da333d697a876825a566a1cdbebeffb3f2e88e7a680b4525f3d5845edebfb9f99468dea9337b727a416a8927ce1cab1407955337cb336270b9116483a20c2b3ff9057f489274cc16bac0f771d0fde7bb596527ffe4406b946b18215a6da6892a407833ce266bad46104ff9a0c03227d3aab069a5349b27b15137c1cb74eb0328e431118c4c1356fa6e0c0ce312d0ffac3ee4fab7802c46174ceb1c220cc793870875774489f159ba300c66d1f5b89e519e2a3e2816cb9d08191b90d9293e00756af01d42b33e5d53ddc00cd94cffd3ba6b0c9227f14d9f058a919b14301896b9fcb03174063b5aae867fbbd2b100770638cb68a596bb19fd8b013e2641be74e84da273c06e0b77201909c6a670d80f5cd5d52e8616261c31a399fd9d2e3a10f28eac17fe2e5249bb2a946d2b2878343a746529070e1ec2f538abe3f7803e18760f813f30d5d5a0a8cb5eed52773e9e4e407599a485673986581a6ba7db5cdff9892a1c588e1c436826a2424266b7ee820c14b1ff8fe493085d86d1a0f7fa85e34ccd39c83f48b7157b3089e61e1209113d3c7d133cf3bb0860194c6fb32bc9264398f94d7b18078319932c929b815354d2b3a865dae9b099ecd92be0f7a2add95dcc9201954f37f15c3451953a163822fd909f4924317e189facf3997bd56a9ba7cc14ce2c3c6a21eeea1ff00c225bdf55f2ccce2a3f310e3cd2ea830edb049e90699647346be3a37d60c24139108d050c9263d12299a66cc50ea0c2eaf95d06e78f012e2ee674ffc624de1a75447a2bc9caf43b27f4229d73681a5b1411a3df47e99130aa6c85febfe589e09991a7bd4e522f34eb12f2a28d82bea35db49078818ddf142bfd8cdeed09e81a66db10c2d207a48463d342373dbb01210210b182eaeabde56b025ed472e6aeafbd930e8d789ff5050ba1b96036dfb42be249420216ac751f87f91a65c9578b1d5daad7228b6b88dd8dd6ac729b4afd9a3924bba3dd1681ded1882fd0d9d679fc232f764899c761d69cbd0099292e0fd6704d4f1c640f1ceb6c7b3bdc24ac80167a6b81a970928394ea7253a70cfb0c1cc79fa95444cd4756bf73e9610a93a4d03bad3c92b8de91ad02d163fccf0e39eb8f3995e80529d5171f8fed742cc1e7fdc2ceb3b81379a6f26bcdfbff8161490e230c0e66dbfb3efa768292b91d2f3acb6b9b17dc9aa09f37fbb45a00fffe0bcbaf1e89f55fc2129d4062330bbc44393f8b5d11664da003f53a482f3068da97065477cdaf6efa05c2d6ad8e7cdb9ad629a9465b25e803e1cc043df7978066ee3eddd6191e1ea7d0daeaac4a84cf24323b5a80979277b0510a76c18f628024ff567a3d94504c97c416f9d14ed314ed9d544217a6b7b88f0611b364808d67bb8771e6a902c305d38fa11f53d28bd9a31"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000001e00)={{r1, 0x4, 0x3, 0x5, 0x4487, 0x0, 0x5, 0x16c, 0x0, 0x6, 0x10000, 0x3, 0x6, 0x400, 0x3}}) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:44:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x80, 0x7, 0x40, 0x0, 0x4, 0x8e0c0, 0xd, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x20}, 0x8040, 0x100, 0x20, 0x6, 0x80000001, 0xacaf, 0x4, 0x0, 0x5, 0x0, 0x4e76}, 0x0, 0xf, r2, 0x9) r3 = clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7f, 0x8, 0x81, 0x7, 0x0, 0xfffffffffffffffe, 0x88800, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x2, 0xfff}, 0x0, 0x6, 0x80, 0x8, 0x81, 0x95f, 0x3f, 0x0, 0x6, 0x0, 0x37}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000840)=ANY=[@ANYBLOB="1c0400001800000228bd7000fddbdf25ac1414bb000000000000000000000000fc0200000000000016000000000000014e22a0c44e220005020080202f000000220e81e0ecae85907d8e1bdaf8d466581335dce8e9c94793bc490feec1a8bb7978484720f001cc5b812038328ffd7010a7fe5f6ff8e4d7d3b78b57cfa9a9f4c59f275cb8320a47ab917617839eaccdb29f905414065bbf", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="e0000001000000000000000000000000000004d4ff0000000a010102000000000000000000000000df390000000000009e00000000000000000000000100000008000000000000000400000000000000a8211f3f0000000004000000000000000000000000000000f7ffffffffffffff02000000000000000000000000000000040000000000000001000100f91b0000000000002abd700000350000020000ff12000000000000002000000000000000cb00120063636d2d6165732d6365000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f803000000000000f8ece0840945f4acd1cf4946775ad24a746279e9d979c3b470dd8cef69e3edef9c1da5f662f817bdc9bbf39a21ca94d00c2dc004718abb91011f68539cba95c25bd865bc4bbfc99e8fdcc5e2ebb59cf5ed459f26911d4ee012efa0588169c8148966a7cb5050b7f8affd55d16584591d55875a08d96bc259d7c3f60a51b3aa0010000a002cbd70002abd700002000000120102006374732d6362632d6165732d6165736e69000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050060000d08dba6c1dd367c36975d50286a225cb5577a8ffbf9e22d25b21b655777b364583dcfec5a56d4b4e9bf32ef34cd81f2c8a9752e1fa27221da5ba4fa550476c76aef09dbdd8e8ba25878ab9f35876f9a7371eeae0b19c9790fbf5fae13f7c414119842e67cdabdb034d12bfc589e95f4b7f5146a899333326f8d71b4c8331b212b9eb7255b149458727aaf21de60aca749155718c5c18111b5727e12afd289cddc332df310b5e9a23992de6f76bbd2ae105725cc59b54b4d43b0360bbba0159f49da61e16b2558b29b90e000014000e00000000000000000000000000000000000b01120065636861696e6976287266633735333928656362286165732d66697865642d74696d65292c736861332d3235362d636529290000000000000000000000000000f80500000000000095dec1893b3629114e31d4e293890bcd7805c421cefa405be5a4fee066b6c653753f5283354551e873fd0fe5dcbd92cd08b67a2ef3ec4e05206d7c362b7e152da090327cb233e489fcc742fb9846ef905a9edc5839bd2a39ee80da1d1a3c73b7c58a0a02f1e4e87d696bda4936cc25c6ca3f8632a72184cdde37fee0ae238eab996255cce5efebe2831eaab93c1ee2a8ae95d6a73acc7b46e241a8f77b3bc6520ba1769d6fd7e4e4c03bbf1c4f7f546e82d9d1b2806d3831d0c90285d517b7000c001c00", @ANYRES32=0x0, @ANYBLOB="020000000800160000000000"], 0x41c}, 0x1, 0x0, 0x0, 0x10008800}, 0x20040000) 15:44:12 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:44:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0xca0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000001, 0x30, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000808b3353eb6749eacd5189ff0000000000000000"]) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x3, 0x0, 0x0, 0x65, 0x0, 0x7, 0x9180, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x3, 0xfff}, 0x40010, 0x8000, 0x5, 0x7, 0x20, 0x6, 0x80, 0x0, 0x2, 0x0, 0x7}, 0x0, 0x9, r1, 0x2) pwrite64(r0, &(0x7f0000000140)="6b5af70fd1bde4ddda5fbeb9f2d499f461c4ba9ec5791a84080dced3bf13629c673583c90b8c32e831688e5c2111d17af0b579a6872ff36b3efa26e1f5b9023563fec8272ae00340146730e99a9631bf0fb7cdfa0aa6b14997cbadfbadee136a275bd67d83ca8ee4a02d6f3c1a239b1f862bd3fbe7f515680eef1bbd779b7e324f62e466eea2410a10487a055e1a517edee1444eee9ab891d4d1b0702dd48d87934252f6a4fcc0dea9fdb1b880e4128ff9b2", 0xb2, 0xc807) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:44:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2524.022244] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2524.052026] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x58) 15:44:12 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:44:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}) [ 2524.281877] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:13 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ff1f}, 0x58) [ 2524.323662] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) r2 = dup3(r1, r0, 0x0) recvmsg$unix(r2, &(0x7f0000000280)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/161, 0xa1}], 0x2, &(0x7f0000000200)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}, 0x20) clone3(&(0x7f0000000340)={0x4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2524.359960] cgroup: fork rejected by pids controller in /syz2 15:44:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:44:13 executing program 1: ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f00000003c0)={0x0, 0x8, 0x0, [0x1, 0x1, 0x3, 0x5, 0x1], [0x3ef, 0xd9c, 0x401, 0x40, 0x8001, 0xa3, 0xe9, 0x0, 0x100000001, 0x6, 0x89b, 0x1, 0x3, 0xfff, 0x3, 0x1, 0xda87, 0x10001, 0x900000000000000, 0x7, 0x7fff, 0x9, 0x8, 0x3, 0x1510a535, 0x82, 0xfffffffffffffffd, 0x40, 0x9, 0x0, 0x1, 0x10000, 0x1e5, 0x7, 0x8001, 0x8001, 0xfb, 0x4800000000, 0x1, 0x7, 0x4, 0x7, 0xa34, 0x8, 0x7ff, 0x4, 0x5401, 0x2, 0x9, 0x80, 0x1f, 0xfffffffffffffffd, 0x1, 0x5, 0xffffffffffffff80, 0x100, 0x3, 0x81, 0x9, 0x80000001, 0xe63, 0x561b, 0x0, 0x9, 0x0, 0x1000, 0x8, 0x3, 0x0, 0x0, 0x81, 0x7, 0x2, 0x2, 0xfff, 0x9834, 0xa1, 0xc168, 0x2968, 0x1, 0x4, 0x26c, 0x9, 0x2, 0x401, 0x3ff, 0x3, 0x8, 0x7, 0x49ce, 0x3, 0x401, 0x0, 0x2d, 0x9, 0x8000, 0x1, 0x3ff, 0x1, 0x0, 0x3, 0xffff, 0x9, 0x1, 0x10000, 0x8, 0x8, 0x5, 0xfac, 0x402e, 0x101, 0x4, 0x10000000000, 0x1000, 0x100000001, 0x7, 0x1000, 0x1000, 0x806, 0x6]}) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)=',!\x00') r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x8100) fstat(r0, &(0x7f00000000c0)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x20013, r0, 0xcb534000) ioctl$int_out(r2, 0xfca2, &(0x7f0000000040)) 15:44:13 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2524.528137] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2524.567720] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:31 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6000, 0x0}}], 0x324, 0x0) 15:44:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x58) 15:44:31 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5d00, 0x0}}], 0x324, 0x0) 15:44:31 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:44:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:44:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000003c0)={0x0, "accce81f1947dcc7f9922141c97649c5"}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f00000013c0)={0x18, 0x6, {0xffff, @struct={0x94, 0x1ff}, 0x0, 0x8d9, 0x9, 0x200, 0x81, 0x7fff, 0x428, @struct={0x1000, 0xfff}, 0x2, 0x3, [0x7ff, 0x0, 0x6, 0x9, 0x6, 0x1]}, {0x90, @struct={0x80, 0x772}, 0x0, 0x6, 0x6, 0x800, 0x2ff, 0x496f7906, 0xbc, @usage, 0x6, 0x9, [0x80000000, 0x6, 0x1f, 0x12, 0x800, 0x401]}, {0x1, @usage=0x7, r1, 0x2, 0x5be3, 0x5, 0x400, 0x4, 0x40, @usage=0x3, 0x0, 0x7fffffff, [0x4, 0x80000000, 0x41e, 0x5a26, 0x4, 0x180000000000]}, {0x7fff, 0x2, 0xc377}}) r2 = syz_mount_image$vfat(0xfffffffffffffffd, &(0x7f0000000040)='./file1\x00', 0x1, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="3f700203bf5df0897d0ee9833cd2040682ef4526d298e6b18d8c3720ee3f15ca7fe59d656b5f4bcff9178c524f070b01b770c53fca1252480b0d5e329e28816df8784e93e64344d420c3915fda030b96bb7eec11604d02814c3004b6f8005e14fae5cd2b333c16737116de18b77b8fb1e14c68c286706adda4db30bd04a2d1ed4f9dbac26d47db3a0f03c328f07bcbc57521db81ff37c76a942aa113d0312391f88bb54dfd94baad890c6b97cd8f0bc16da081e3707c20aadbb25e75bf642398830dd1529619be7376f1912dff8936", 0xcf, 0x3f}, {&(0x7f0000000180)="4b68d4235fb92819d16ace25dd4d975094fbcb46f17ae1ba753a9a7194cd04e20d68b0abece1c814e970f3c1b0093d329705b40d1bba22eed19de165c34542", 0x3f, 0x8}, {&(0x7f00000001c0)="d281d318d2d96c5b4337e42db4c11d0e00b2ef13008960081bae28ae07a31d83f6346ab90c6fb54e2dcbea95a984928da430d3747c1be21fcd503a078ff99c5d6a36d8919addeda8825e6cee6d5dd774ada5974279d0d39fd6ecf96fb93f87266588cac446c6f647842e5316977234712584956524a05598e43ede050cd3c74baeb97f89ddd47f296f0b316467cf76fc2b12dbfbdf8be0d66f76bc073fca7ff14f760736df8031918e3bca408a1f228c", 0xb0}, {&(0x7f0000000280)="3aff3ded3b577d53d19f97ef8eb33bfd1c2397d9e76b1760a1349180ef4bde1a1dea77c8aca8b440df", 0x29, 0x8}], 0x3028000, &(0x7f00000017c0)={[{@utf8}, {@uni_xlateno}, {@rodir}], [{@euid_gt={'euid>', 0xee00}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@appraise}]}) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000001840)=0x20) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r3, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:44:31 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r3, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x3, 0x7, 0x5, 0x3, 0x6, 0xfffffffb, 0xf, 0x40, 0x19e, 0x2, 0x2, 0x38, 0x2, 0x0, 0xc000, 0x5}, [{0x4, 0x7fff, 0x3dba, 0x3f, 0x4, 0x5, 0x4, 0xe35b}], "57938cc9ccee3737ac1d5a566b0f87a453ce8eda97b9cde129d593421c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x995) setns(r2, 0x0) fallocate(r2, 0xa, 0x8000, 0x9) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) clone3(&(0x7f00000001c0)={0x200000, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)=0x0, {0x25}, &(0x7f0000000100)=""/80, 0x50, &(0x7f0000000d80)=""/4096, &(0x7f0000000180)=[r1, r1, r1], 0x3}, 0x58) syz_open_procfs(r4, &(0x7f0000000240)='net/nfsfs\x00') 15:44:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='\x00', &(0x7f0000000080), 0x10002, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',access=any,access=user,dfltuid=', @ANYRESHEX=0xee01, @ANYBLOB=',cache=loose,mmap,defcontext=sysadm_u,dont_appraise,pcr=00000000000000000031,smackfsdef=\':^{,obj_type=\',fsname=,euid>', @ANYRESDEC=0xee01, @ANYBLOB="f873d3edb3b51a41ff781c5969936840b9c5e54e44ba06205b7b28093667bdcf80f1caf53d82bee7569eeb463b0741f86685240600000000000000962c675560e06f463ef58bd8ccc006a0dee2a6ff99c9747520004653542c8a223f5e522b1b6181ef277fb2f9f76ab1237fc760e56b516f49573e120184611e357ac74439cfdc5e0f92f60aa02bead8c5c96d06ca9ddf9063ac7e78ead44801d4fbc6ef931c31fb2787ad1f618b568af722f86424f1419e6185ba20563f35ade6d072da4e91b639f807b26db7ac8c0ef6e71eee4d99f6e993fe6b45d3cc84b6a7551e76618764f258f514a8c5a736033267"]) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2542.233073] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2542.280106] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x58) 15:44:31 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:44:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x58) 15:44:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xdb9}}, './file1\x00'}) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000080)) [ 2542.504649] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x53a92dd3057ba10a, 0x80, 0x74, 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2542.542779] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:44:31 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) fcntl$getown(r1, 0x9) 15:44:31 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2542.746011] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2542.773819] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:50 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5e00, 0x0}}], 0x324, 0x0) 15:44:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65}, 0x0, 0x3, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:44:50 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6100, 0x0}}], 0x324, 0x0) 15:44:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000200}, 0x58) 15:44:50 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:44:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:44:50 executing program 0: ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, &(0x7f00000003c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:44:50 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044008) sendmmsg$inet6(r2, &(0x7f0000001780)=[{{&(0x7f00000016c0)={0xa, 0x4e21, 0x9, @remote, 0xff}, 0x1c, &(0x7f0000001740)=[{&(0x7f0000001700)="eef140f488d68c", 0x7}], 0x1}}], 0x1, 0x4000085) connect$inet6(r2, &(0x7f00000017c0)={0xa, 0x4e20, 0xea, @empty, 0x3a}, 0x1c) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x9, 0x5}]}) r3 = clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) dup(r4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)={0x12d0, 0x21, 0x1, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x14, 0x7f, 0x0, 0x0, @ipv6=@private0}, @nested={0x113f, 0x96, 0x0, 0x1, [@typed={0x8, 0x66, 0x0, 0x0, @pid=r3}, @generic="fcedccc612dac06202670494f814f4eeeffaa2726b1d924765aad88755e9cfdc5f39acba4b304eaf9d3ec9b5ee09e2216c880cf96991323f1ecc72eaaaf9fe2db04837f7b0a000a6a47f2edd765f20ba7bc01ea9207bd04e7d3f8032f83a7e694eaaf1bae90896eb59d7a8aca5583b18c7b3b987ad9f927f2c38435944644fb823fec56e81307031965cb8727b66bacdef055f801e5097dcd57ccb5c255fa831c85514efc6b6a4dd33e28412d11d91480a6b6ab63e00cad2ff20f02f6827ca1c06b18fa9b2271c7fba33ed2a42281aa3fa6fdfca694c9d3dd9275d32fed9eee307e4b7ab59c1f4a7ddd67190adab75be169deea1", @generic="8f38416c6d59ae42d1c5d9ed4c2afc3a5f04fa5621c8ca512c24c300fc8d4949851ada40660184a1baf83f7403f5a357cf9947", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x4}, @typed={0x1004, 0x66, 0x0, 0x0, @binary="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"}]}, @typed={0xc, 0x29, 0x0, 0x0, @u64=0x88b}, @nested={0x66, 0x2a, 0x0, 0x1, [@typed={0x14, 0x62, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @generic="61997b819940d397345e9c21f4d611173a894d10a6597b4f0afb7de71d0bfeb3261f3bff954977ad40a2e97a5b03de618b0b29bec2c248e205ced70813897b7d7a0fb2e06088baf8ddfd07addbbf"]}, @generic="113d8633da248c25e85fb80c661604e5c1f933a0fd5f0122a530cb7c6e4f5ec2c12331aaa3d3b8089ff870fcaa55261cc14f2d3f33db32d3948b974334b89ca9bea842f7ea63e8732aaf8976fa8f8b648f63b802d115832cd3b39d0cc9c9058050d61172fd5c54c154238bd8b6424798ebfb4437379c7007f0e8da1d215cfd0e552d98a78bddade1aecc7f1f0ec7f32d7bf2c44d8ae27d7aa33314d08f9ca03ce30dae3a4770a7f68206af48a968fef0d66526c37ca00a112047e99ec90d33285bf41e8fb3dff4fe1ea0fd6700e951677c606dd164d1a4f4cec1a1edf8579189b09912f3ae884a915e14d7d933124416638951c2afb2021b"]}, 0x12d0}, {&(0x7f0000000000)={0x50, 0x26, 0x600, 0x70bd2a, 0x25dfdbfc, "", [@generic="d4b653de7b37e60ba9367be8579c71c77532d5708fb459ac1d5102f114d5ad709ad53a4e839097d8d6b246966d3c42a1e00218d74b", @typed={0x8, 0x42, 0x0, 0x0, @u32=0xfffffffb}]}, 0x50}, {&(0x7f0000001e00)={0x11c4, 0x20, 0x20, 0x70bd26, 0x25dfdbfd, "", [@generic="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", @nested={0x1a5, 0x4c, 0x0, 0x1, [@generic, @typed={0x8, 0x87, 0x0, 0x0, @u32=0x1f}, @typed={0xc6, 0xa, 0x0, 0x0, @binary="d0e416300bfab13e7ef70d26c3e6853732b65a8d0727e354ff25f5174cc6a085dccdd94d7ae9f21d9a6ba4940b44852098f25cf19ca100168ee1ebf0564f14b66c38844922615152b9a0f876748c49da387d69bcd88d240e0a97131300fdcc095979655eecad04b31b220ff2a66461a913dd468a639778d001a03d2290bfab3f55eb9e9fb700e19548053d2bdfb29ec563e3d56853e7361edac4a37ba34919254b6f65376e53d9dda974ef3480c7e9ab4000ebc39c3bd5b2773c7f7259a92fa774e4"}, @generic="3daf0060bc41d558b8642c34dcfa448d7ae5792d5c288c555b348abc90750e26b57313224ccfd6b65bdfe23e74fb5b24b6f9a5cc9ef7a7d35afc35eeb6df5e2bfccd7d924a36899facc029975c2cc907a31427ae8bb2e33187732e657a7e0425d8948b84180698302b6b6c86c16ad332f92df75a41950373cb737b8f9bf35998c841a59e02e562732c51745d029d8fb90082af68798384c526528018822c406e40ec207f663bc502e01a5f29d735371a7a7cf15b2ba8b1b2e2ed", @generic="c240a4106f1a89137b55af79411079965138583f458257"]}, @typed={0xc, 0x29, 0x0, 0x0, @str='!(@-${.\x00'}]}, 0x11c4}, {&(0x7f0000000080)={0x124, 0x33, 0x1, 0x70bd25, 0x25dfdbfd, "", [@nested={0x112, 0x2a, 0x0, 0x1, [@generic="338403d34ab52e959052c7ca378d4c99ff75e0372f1054b3bd22cfcdc3ea622977c11ca57ec3", @typed={0x8, 0x19, 0x0, 0x0, @uid=0xee00}, @generic="19a7c0c84e522615aaded4b5fce4fc7ca94d31327e88380db67904df06cf582a771f7e50969a2b7fb8259ccbca944b7884afccc6c3a544a8335842817f58b4dc0db00ea9724efebab67c81e0873f6681409335036d4507c1a1cfb967d913c953d1851e11fda0b0c84aa43edf93c018d9cf86fb6070d92731c2e7fe8a32dae8a4f1f837bbf6e3e45f052182ac0b28ddb569fa73e647", @typed={0x8, 0x17, 0x0, 0x0, @str=')\'\\\x00'}, @generic="dea9abe5d94d74644d19c0fe27a4dfe84988cf8dbbd994b913981a6db001c8b66743d9c97c9e291eba1a6503e42ca573ab7c811ac65f8b782ffc174ff9f781440069d5"]}]}, 0x124}, {&(0x7f0000003000)={0x1010, 0x42, 0x8, 0x70bd29, 0x25dfdbff, "", [@generic="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"]}, 0x1010}], 0x5, 0x0, 0x0, 0x8014}, 0x4) [ 2561.589788] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2561.621685] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:50 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:44:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2561.828886] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2561.882778] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x58) 15:44:50 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2562.082442] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1ffff000}, 0x58) 15:44:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) readlinkat(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=""/236, 0xec) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2562.121501] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:44:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2583.606050] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6200, 0x0}}], 0x324, 0x0) 15:45:12 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x5f00, 0x0}}], 0x324, 0x0) 15:45:12 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:45:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file1\x00', 0x330802, 0x310) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x11c) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) 15:45:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r1 = accept4(r0, &(0x7f0000000200)=@l2tp={0x2, 0x0, @multicast2}, &(0x7f0000000280)=0x80, 0x800) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f00000002c0)={0x1, 0x101, 0x100000001}) openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x60000, 0x83) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000080)=""/246, 0xf6, 0x2002, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e20}, 0x6e) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat2$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)={0x0, 0x4, 0x4}, 0x18) 15:45:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x58) 15:45:12 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0xc7, 0x6, 0x2, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x100, 0x2, 0x800, 0x2, 0xe7, 0x8000, 0x3, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x1, r0, 0x1) poll(&(0x7f0000000080)=[{r0}, {r0, 0x8}, {0xffffffffffffffff, 0x282}, {r0, 0x8000}, {r1, 0x2001}], 0x5, 0xf6b) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10010, r2, 0x2b57c000) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r3, 0x0) fstatfs(r3, &(0x7f00000001c0)=""/45) r4 = syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x10000) r5 = clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r4}}, 0x58) r6 = fcntl$getown(r2, 0x9) kcmp(r6, r5, 0x3, r0, 0xffffffffffffffff) r7 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000280)="5d381b08f498de469071aac779fad3", 0xf, 0x6}, {&(0x7f00000003c0)="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", 0x1000, 0x7}], 0x1028000, &(0x7f00000013c0)={[{@fat=@codepage={'codepage', 0x3d, '932'}}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@smackfshat={'smackfshat', 0x3d, '/dev/input/mouse#\x00'}}, {@obj_type={'obj_type', 0x3d, 'ns/cgroup\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@uid_eq}, {@subj_user}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/input/mouse#\x00'}}]}) write$binfmt_script(r7, &(0x7f0000001580)=ANY=[@ANYBLOB="2321202e2f66696c6530202f6465762f696e7075742f6d6f7573652300206e732f63674316f12c5318ae2549b77ca0aad5726f757000202f6465762f696e7081080000000000002300206e732f6367726f757000206e802f6367726f757000205e252c202f6465762f696e7075742f6d6f75736523000a246d02000000000000472453249f62463ae74639ce3f007c95b0f9b62af8fdf51ae51760bac8a107c225c1b2a08aa6df80a8"], 0x81) r8 = ioctl$NS_GET_PARENT(r4, 0xb702, 0x0) ioctl$NS_GET_OWNER_UID(r8, 0xb704, &(0x7f0000000180)) 15:45:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2583.684194] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x58) 15:45:12 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:45:12 executing program 1: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x13, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000001c0)={{0xffffffff, 0xfffffe01}, 0x100, './file0\x00'}) r0 = clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x333200, 0x1dd) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=ANY=[], 0x14}}, 0x0) read(r2, &(0x7f0000000100)=""/153, 0x99) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = syz_open_procfs(r0, &(0x7f0000000500)='mountinfo\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r9, @ANYBLOB='\b\x00?\x00\x00@'], 0x24}}, 0x0) sendmsg$NL80211_CMD_CONNECT(r6, &(0x7f0000000600)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)={0x2c, r8, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x7fffffff, 0x8}}}}, [@NL80211_ATTR_SSID={0x9, 0x34, @random="0cf88dddd6"}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000804}, 0x6000802) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r5, 0x89f9, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x4, 0x5, 0x3f, 0x4, 0x88, @loopback, @rand_addr=' \x01\x00', 0x7840, 0x80, 0x5, 0x8001}}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f00000003c0)=0x2) sendmsg$NL80211_CMD_SET_WIPHY(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x2, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000090) [ 2583.845682] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2583.864985] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:12 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:45:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x58) [ 2583.966117] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2583.984189] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000880)={0x800000, &(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)=0x0, {0x34}, &(0x7f0000000700)=""/109, 0x6d, &(0x7f0000000780)=""/143, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x58) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) clone3(&(0x7f0000000980)={0x21a000000, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x1d}, &(0x7f00000004c0)=""/107, 0x6b, &(0x7f0000000540)=""/208, &(0x7f0000000900)=[r1, 0x0, 0x0, 0x0], 0x4, {r2}}, 0x58) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r3, 0x0) openat(r2, &(0x7f0000000080)='./file1\x00', 0x80200, 0x80) kcmp(r1, 0xffffffffffffffff, 0x6, r0, r3) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r4, 0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r4, 0x40049366, &(0x7f0000000040)) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:45:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000800}, 0x58) 15:45:30 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6000, 0x0}}], 0x324, 0x0) 15:45:30 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:45:30 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6300, 0x0}}], 0x324, 0x0) 15:45:30 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x30, r0, 0x3) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) perf_event_open(&(0x7f0000000000)={0xf, 0x80, 0x80, 0x9, 0x80, 0x0, 0x0, 0xfffffffffffffff9, 0xa200b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0x7, 0x9, 0x6, 0x200, 0x8, 0x3, 0x0, 0x7, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0xc, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = open_tree(r1, &(0x7f0000000080)='./file0\x00', 0x80000) sendmsg$nl_generic(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14c, 0x18, 0x400, 0x70bd2c, 0x25dfdbfc, {0x5}, [@generic="e078280261c3e1deac7460ae5c9a", @nested={0x92, 0x0, 0x0, 0x1, [@generic="5244cabb02127e5ddb0d8d384af104ddeb48c2e827f81b0f531a08c5418a63ff8ad794e749ca6de0036b27131e9bae", @generic="336752b9b1060824259eae2bc1d8fc42c12db665b102078237b30824b590abc22bf294a255a4bf13600f853cf2d964d6abd56df27389fd09ccf344af4b02df", @typed={0x5, 0x6e, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x50, 0x0, 0x0, @ipv6=@remote}, @typed={0x4, 0x2c}]}, @nested={0x92, 0x1e, 0x0, 0x1, [@typed={0x8, 0x72, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x8, 0x68, 0x0, 0x0, @uid}, @generic="42d9c24f48ca6b6df586f8a934450894b75d8083c7909408a9a15b8f37b82db20000e42dc32646dd807e3d45d0bc6ab0e7a8fc7edc541de3a550cc05", @generic="ce32e2d013cf6ad73295e4ca7c16f09edbfc0e9e62213bc9564226123d50f716d78d0299e6fc24f870e2f669336f", @typed={0x14, 0x2f, 0x0, 0x0, @ipv6=@local}]}]}, 0x14c}}, 0x488d0) 15:45:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1b0c01f000}, 0x58) 15:45:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @fixed}, &(0x7f0000000080)=0xe, 0x80800) r2 = syz_io_uring_setup(0x21, &(0x7f0000000100)={0x0, 0x0, 0x20, 0x0, 0xffffffff}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r4, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r4, &(0x7f0000000080)={0x24, @long}, 0x14) sendmmsg$sock(r4, &(0x7f00000021c0)=[{{0x0, 0x2303, 0x0}}], 0x324, 0x0) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0x12, 0x0, r3) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd=r1, 0x0, 0x0, 0x0, {0x1600}, 0x1, {0x0, r3}}, 0x956c) r5 = openat(r0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x30) r6 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4885, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0xe25}, 0x0, 0x0, r5, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r6, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r7 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000002c0)=@isdn={0x22, 0x2e, 0xff, 0x80, 0x8}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000003c0)="990e7aab0721087c05fb87317b7c9d26", 0x10}, {&(0x7f0000000400)="904b430a9b3d2f5d88af8302e6e7410757317dc04a77eebe90ddc1898ae83dd97b5ff80934115b776de4bfc104f83e4acfbc918dce2327d661d6b007fbdeb8986a6cba1e731ea3c05050f1cd5b8c54f2a4df82aba19e71e795873fd7f65520e739242dfa11c59b45a4c709ce32cf975e43d166cbf3f1f7f4529f778cc4cd77186d80ba38e00bdb8d3ea8ec29b3d85d23d2666ede3a", 0x95}], 0x2, &(0x7f0000000500)=[{0x1010, 0x105, 0x80, "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"}], 0x1010}, 0x0) 15:45:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r2, 0xb) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:45:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = syz_io_uring_setup(0x110b, &(0x7f0000000180)={0x0, 0xa896, 0x10, 0x0, 0x8d}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000200)=0x0) io_uring_enter(r0, 0x34c1, 0xc896, 0x1, &(0x7f0000000280)={[0x5]}, 0x8) syz_io_uring_submit(r2, r3, &(0x7f0000000240)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd_index=0x5, 0x6, 0x0, 0x101, 0x5, 0x1}, 0x1) close(r1) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r4, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0100000000000000000089000039d5d9040e", @ANYRES32=r7, @ANYBLOB="04001d80"], 0x20}}, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(r0, &(0x7f00000002c0)='./file1\x00', 0x616c00, 0x68) [ 2601.646445] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2601.646738] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x58) [ 2601.705563] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:30 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:45:30 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) ioctl$CDROM_CLEAR_OPTIONS(r0, 0x5321, 0xd) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000040)={0xcd, 0x7, 0x4}) 15:45:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x29f7e1eb2000}, 0x58) [ 2601.905642] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2601.935006] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) 15:45:30 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x1, 0x40, 0x0, 0x0, 0x0, 0x400000000000, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x54, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c42594}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) fallocate(r1, 0x20, 0x5, 0x9) 15:45:30 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:45:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x553a3f6e7000}, 0x58) [ 2602.131236] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2602.162503] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:45 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:45:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2617.158131] netlink: 'syz-executor.1': attribute type 9 has an invalid length. 15:45:45 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40080, 0x24) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffc}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9c3}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x40}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x200000d5) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) fcntl$notify(r2, 0x402, 0x24) 15:45:45 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc6, 0x6, 0x1, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x7}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x9, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="05000000000000002e2f6669236f4edf437549c40280300e4f6c653000"]) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000002c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000000)={0xc, 0x0, 0x0, 0x0, 0xb, 0x0, 0x1, 0xae}) ioctl$RTC_AIE_ON(r5, 0x7001) ioctl$BTRFS_IOC_WAIT_SYNC(r5, 0x40089416, &(0x7f0000000080)=r6) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f0000000780)={{r4}, r6, 0x0, @inherit={0x50, &(0x7f00000001c0)={0x2d00064dbf4390bd, 0x1, 0x9, 0x4, {0x4, 0x8, 0x90, 0x3, 0x82}, [0x94f6]}}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000000)={"b276c9b24336630f26d871a37e20f372", 0x0, r6, {0x2, 0x89}, {0x300000000000000, 0x8}, 0x2, [0x8, 0x7, 0x9, 0x400, 0x8, 0x9, 0x800, 0x2, 0x1000, 0x3, 0x2, 0x4, 0x9, 0x4, 0x100000000, 0xffffffffffffffe0]}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:45:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 15:45:45 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6400, 0x0}}], 0x324, 0x0) 15:45:45 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6100, 0x0}}], 0x324, 0x0) 15:45:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2001000000000}, 0x58) [ 2617.164196] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2617.185569] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2020000000000}, 0x58) 15:45:46 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:45:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x58) [ 2617.336265] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2617.361925] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:46 executing program 1: ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000080)=""/90) socket$inet(0x2, 0xa, 0xd43) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x810, r0, 0x0) r1 = getpgrp(0x0) ioprio_set$pid(0x1, r1, 0x2007) r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000000)={0x7, 0x0, 0x8}, 0x0) ioprio_set$pid(0x2, r1, 0x4007) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:45:46 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:45:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000001000000}, 0x58) 15:45:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r0, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@xdp, 0x0, 0x80000, 0x1}, 0x9) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:45:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r4, 0x10, 0x5, 0x3) [ 2617.503371] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2617.522368] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:45:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) r2 = fork() getpgrp(r2) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r3, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x8, 0x2, 0x6, 0x1, 0x0, 0x6, 0x0, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x6, 0xf1b}, 0x2, 0xffffffffffffffff, 0x66348f6b, 0x8, 0x7, 0x8, 0x6, 0x0, 0xfffffffd, 0x0, 0x4}, r2, 0xffffffffffffffff, r3, 0x1) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/58, 0x3a}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/53, 0x35}, {&(0x7f00000000c0)=""/189, 0xbd}], 0x4, 0x7, 0x400) 15:46:05 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:46:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(0xffffffffffffffff, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r2 = fork() syz_open_procfs(r2, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:46:05 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6200, 0x0}}], 0x324, 0x0) 15:46:05 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6500, 0x0}}], 0x324, 0x0) 15:46:05 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x800, 0x0, &(0x7f0000000000)="86a75c5bab1071504007922a3b515a433f9f50b20ac3c067de27d8ca584973ec133c99cf205c5c73914df8b5a4958f6d52ba150e7ef56f9c0225ca48c8fba10b4760dfa8987f3b223acbdfa28b6818c73d1229386d097f20b806b1f53f", 0x9, 0x0, 0x1, {0x1}}, 0x73a) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:46:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000080)={r0, 0x9, 0x9, 0x8}) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x2102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r3, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:46:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/mem_sleep', 0x800, 0x11d) pwrite64(r2, &(0x7f00000000c0)="917ade8bb15d0c59ed37adf89d1d93601fdd5617b6636937a562fdeb75bbc3fe279e71586229d99ac1193516c27f4f75c2a22bbda64d87dcce9f633e0e02a31e631fbd8dcb9f5e7c686f1b62e9cbb58865b6401df5174fce6d1a923ff73ee6399504e56563865d7447f84416cd89e2c31c8981c7d47c8d53e560c9128b017c693ab1c779a94cb1cdeebf1eeeb79404f3d21cddad581f38cffaa87b5608bc53aaf0c9614aa7c60b99a2201000ef2c3a0795bf2e8b737f24", 0xb7, 0x1b2d) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x4) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/wakeup', 0x0, 0x48) connect$inet6(r3, &(0x7f0000000340)={0xa, 0x4e20, 0xe7c4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x5}, 0x1c) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimensat(r3, &(0x7f0000000180)='./file1\x00', &(0x7f0000000200)={{r4, r5/1000+10000}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) ioctl$NS_GET_USERNS(r6, 0xb701, 0x0) 15:46:05 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10100000000000}, 0x58) [ 2636.997129] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2637.030663] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:46:05 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x58) 15:46:05 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2637.242038] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2637.285897] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:46:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(0xffffffffffffffff, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r2 = fork() syz_open_procfs(r2, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:46:06 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20ebe1f7290000}, 0x58) 15:46:06 executing program 1: r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x73, 0x0, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4810}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)={'#! ', './file0', [{0x20, '@['}, {0x20, '-{'}, {0x20, ')$]{@\x82{#-:@{\\/:'}, {0x20, '/'}, {}, {0x20, '*'}, {0x20, '%!-[.^'}], 0xa, "0dace87369f5c06ba031a42aa2f576d9b009d8019eed76d8e7afcf605383dfbf566ef726dc62a2898033d71a2145640ac6bb056297eb75a5118a80663f54fa422a0b400815efb0e564caa01308b85f87a2f7df1eeaf4dfcf7e28ee2af2d7dce5ea67f72e1cfe6d7343f17c858f29793040e45d2fa445161cb18f81d0121527afd89be969e94dc1c1c2cf4a896a45fbf5f6342178b33d68c17cd272ccc97aa12c9204808c1d3e88bd2695ead84a74d2974ea99741abea299195ff6e58f60f1f4d6385c827be340a70d072c6537d509bc20dc1c7e4aa5d1e3e24b75bb69a93"}, 0x10b) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000003c0)=""/4096) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:46:06 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000080)=0x75) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x50, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) 15:46:06 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:46:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2637.495991] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2637.549635] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:46:24 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6300, 0x0}}], 0x324, 0x0) 15:46:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x706e3f3a550000}, 0x58) 15:46:24 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x6600, 0x0}}], 0x324, 0x0) 15:46:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:46:24 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xff03000000000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:46:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(0xffffffffffffffff, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r2 = fork() syz_open_procfs(r2, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:46:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') r2 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x60, 0x121200) syz_io_uring_setup(0x2cca, &(0x7f0000000100)={0x0, 0x37b, 0x8, 0x2, 0x389, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) setns(r1, 0x0) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) fcntl$addseals(r3, 0x409, 0xf) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000040)) 15:46:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) statx(r0, &(0x7f00000000c0)='./file1\x00', 0x2000, 0x400, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x2000008, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap}, {@cache_none}, {@loose}], [{@smackfsdef}, {@smackfshat}, {@euid_lt={'euid<', r1}}, {@dont_measure}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@seclabel}]}}) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2655.784834] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2655.820355] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:46:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0010c1b000000}, 0x58) 15:46:24 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:46:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ff1f00000000}, 0x58) [ 2656.054727] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:46:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1f}}, './file0\x00'}) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x7) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:46:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000080)=@getpolicy={0x248, 0x15, 0x10, 0x70bd26, 0x25dfdbfb, {{@in6=@loopback, @in=@multicast1, 0x4e21, 0x3f, 0x4e22, 0x1, 0xa, 0x60, 0xa0, 0x32, 0x0, 0xffffffffffffffff}, 0x6e6bbf, 0x1}, [@encap={0x1c, 0x4, {0x0, 0x4e22, 0x4e22, @in6=@private1={0xfc, 0x1, '\x00', 0x1}}}, @tfcpad={0x8, 0x16, 0x1}, @lifetime_val={0x24, 0x9, {0x786, 0xb76, 0x100000000, 0x2}}, @migrate={0x9c, 0x11, [{@in6=@private1, @in=@local, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@rand_addr=0x64010100, 0x33, 0x0, 0x0, 0x34ff, 0xf, 0xa}, {@in6=@local, @in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@private0, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x2b, 0x2, 0x0, 0x3505, 0x2, 0x2}]}, @mark={0xc, 0x15, {0x35075c, 0x5}}, @srcaddr={0x14, 0xd, @in6=@empty}, @algo_auth_trunc={0xf2, 0x14, {{'sha224-ssse3\x00'}, 0x530, 0x200, "3ea4c0e595add030dedf66bad9a4233835b50a698345d8d42c8f5c61ceb22363ed50d8498ea8672f172c9f87c3d7ef5e1aa4bd291e6af60302b04d040636134090f91ac01c859bd1575c2bddb74e7f3e20d577142ffeb52c05e12bf45c43104b464ed09c0e0c410c05f4966dc498d1fa16c18ec71ec2c524a16ac0254f7844ae29e3c91f41c7942b9ca1949afdcb716d102338315f9352f1dbd792880d4c37d908fb793364af"}}]}, 0x248}, 0x1, 0x0, 0x0, 0x8}, 0x2804c809) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x1034, &(0x7f0000000400)={0x0, 0x7a85, 0x4, 0x0, 0x294}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000480)=0x0, &(0x7f00000004c0)) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4010, r0, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x3, 0x2000, @fd_index=0x9, 0x7, 0x0, 0x0, 0x1e, 0x0, {0x2}}, 0x7fffffff) [ 2656.124732] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:46:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366ee578400080820000200008000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0056538c4b6c166aacba0eaf0e7704f7dd8550ac6acc7a26c895c9"]) fcntl$getflags(r1, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x110, r0, 0xd82d7000) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f00000003c0)={0x200, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @private=0xa010102}}}, 0x108) r2 = fork() syz_open_procfs(r2, &(0x7f0000000040)='net/netlink\x00') dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) fallocate(r3, 0x10, 0x5, 0x3) 15:46:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x58) 15:46:25 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)={[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 2656.326225] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 2656.365564] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev tmpfs, type tmpfs) errno=-22 VM DIAGNOSIS: 15:51:25 Registers: info registers vcpu 0 RAX=ffffffff83e9ba40 RBX=0000000000000000 RCX=ffffffff83e836ac RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e9c208 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff8567acc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e9ba4e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055c91b9533f8 CR3=000000000d2e6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=004502fe016c6c6f502e726567616e61 XMM02=20726f747563657865110a0100010101 XMM03=66206365786509007374726174736572 XMM04=006873616d7320636578650a007a7a75 XMM05=6578650a0073746e696820636578650a XMM06=616320636578650e006c61746f742063 XMM07=727420636578650b006574616469646e XMM08=650900737472617473657220726f7475 XMM09=7320636578650a007a7a756620636578 XMM10=73746e696820636578650a006873616d XMM11=78650e006c61746f7420636578650a00 XMM12=78650b006574616469646e6163206365 XMM13=20636578650d00656761697274206365 XMM14=7320636578650a00657a696d696e696d XMM15=00006e65672063657865080073646565 info registers vcpu 1 RAX=ffffffff83e9ba40 RBX=0000000000000001 RCX=ffffffff83e836ac RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e9c208 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff8567acc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e9ba4e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb113817010 CR3=000000000d2e6000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041422d8400000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000