0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1950.601015] SELinux: policydb version 503316498 does not match my version range 15-31 [ 1950.633204] SELinux: failed to load policy [ 1950.643943] SELinux: policydb version 100663314 does not match my version range 15-31 [ 1950.664698] SELinux: failed to load policy 22:24:54 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x321, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:24:54 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002100d067000600000007000000"}, 0x20) 22:24:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000700d067000660000007000000"}, 0x20) [ 1950.977080] SELinux: policydb version 553648146 does not match my version range 15-31 22:24:54 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002200d067000600000007000000"}, 0x20) [ 1951.030872] SELinux: policydb version 117440530 does not match my version range 15-31 22:24:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004800d067000660000007000000"}, 0x20) [ 1951.131115] SELinux: policydb version 570425362 does not match my version range 15-31 22:24:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002300d067000600000007000000"}, 0x20) [ 1951.189975] SELinux: policydb version 1207959570 does not match my version range 15-31 22:24:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004c00d067000660000007000000"}, 0x20) [ 1951.277646] SELinux: policydb version 587202578 does not match my version range 15-31 [ 1951.371560] SELinux: policydb version 1275068434 does not match my version range 15-31 22:24:55 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9e50000000000000000", 0x2e}], 0x1}, 0x0) 22:24:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002400d067000600000007000000"}, 0x20) 22:24:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006000d067000660000007000000"}, 0x20) 22:24:55 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xb600, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1952.177711] SELinux: policydb version 603979794 does not match my version range 15-31 [ 1952.195665] SELinux: policydb version 1610612754 does not match my version range 15-31 22:24:56 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:24:56 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002500d067000600000007000000"}, 0x20) 22:24:56 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006800d067000660000007000000"}, 0x20) 22:24:56 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x322, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1952.701456] nla_parse: 6 callbacks suppressed [ 1952.701483] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1952.780935] SELinux: policydb version 620757010 does not match my version range 15-31 [ 1952.807630] SELinux: policydb version 1744830482 does not match my version range 15-31 22:24:56 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006c00d067000660000007000000"}, 0x20) 22:24:56 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002600d067000600000007000000"}, 0x20) [ 1952.934057] SELinux: policydb version 637534226 does not match my version range 15-31 22:24:56 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002700d067000600000007000000"}, 0x20) [ 1952.985745] SELinux: policydb version 1811939346 does not match my version range 15-31 22:24:56 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007400d067000660000007000000"}, 0x20) [ 1953.038993] SELinux: policydb version 654311442 does not match my version range 15-31 [ 1953.151925] SELinux: policydb version 1946157074 does not match my version range 15-31 [ 1953.322616] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1953.560524] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1953.800192] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1954.044626] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1954.293231] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:24:58 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9e60000000000000000", 0x2e}], 0x1}, 0x0) 22:24:58 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002800d067000600000007000000"}, 0x20) 22:24:58 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007a00d067000660000007000000"}, 0x20) 22:24:58 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x323, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:24:58 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:24:58 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xb601, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1954.601976] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1954.607071] SELinux: policydb version 2046820370 does not match my version range 15-31 [ 1954.632431] sel_write_load: 14 callbacks suppressed [ 1954.632437] SELinux: failed to load policy [ 1954.642771] SELinux: policydb version 671088658 does not match my version range 15-31 22:24:58 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000003d067000660000007000000"}, 0x20) [ 1954.662789] SELinux: failed to load policy 22:24:58 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002900d067000600000007000000"}, 0x20) 22:24:58 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000005d067000660000007000000"}, 0x20) [ 1954.735171] SELinux: security policydb version 18 (MLS) not backwards compatible [ 1954.745108] SELinux: failed to load policy 22:24:58 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002a00d067000600000007000000"}, 0x20) [ 1954.826362] SELinux: policydb version 687865874 does not match my version range 15-31 [ 1954.846795] SELinux: failed to load policy [ 1954.863871] SELinux: security policydb version 18 (MLS) not backwards compatible [ 1954.872129] SELinux: failed to load policy 22:24:58 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000006d067000660000007000000"}, 0x20) [ 1954.950567] SELinux: policydb version 704643090 does not match my version range 15-31 [ 1954.981522] SELinux: failed to load policy 22:24:58 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002b00d067000600000007000000"}, 0x20) [ 1954.994164] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1955.017236] SELinux: failed to load policy [ 1955.086777] SELinux: policydb version 721420306 does not match my version range 15-31 [ 1955.095411] SELinux: failed to load policy [ 1955.330275] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1955.593164] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1955.847174] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:24:59 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9e70000000000000000", 0x2e}], 0x1}, 0x0) 22:24:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000007d067000660000007000000"}, 0x20) 22:24:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002c00d067000600000007000000"}, 0x20) [ 1956.143278] SELinux: security policydb version 18 (MLS) not backwards compatible [ 1956.156445] SELinux: failed to load policy [ 1956.161368] SELinux: policydb version 738197522 does not match my version range 15-31 [ 1956.192775] SELinux: failed to load policy 22:25:00 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x324, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:00 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xb700, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:00 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000020d067000660000007000000"}, 0x20) 22:25:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002d00d067000600000007000000"}, 0x20) 22:25:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002e00d067000600000007000000"}, 0x20) [ 1956.503695] SELinux: policydb version 754974738 does not match my version range 15-31 [ 1956.525243] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000003fd067000660000007000000"}, 0x20) 22:25:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200002f00d067000600000007000000"}, 0x20) [ 1956.620864] SELinux: policydb version 771751954 does not match my version range 15-31 [ 1956.666870] SELinux: security policydb version 18 (MLS) not backwards compatible 22:25:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000048d067000660000007000000"}, 0x20) [ 1956.722132] SELinux: policydb version 788529170 does not match my version range 15-31 [ 1956.797110] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1957.728387] nla_parse: 4 callbacks suppressed [ 1957.728399] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1957.957312] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:25:02 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9e80000000000000000", 0x2e}], 0x1}, 0x0) 22:25:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003000d067000600000007000000"}, 0x20) 22:25:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000004cd067000660000007000000"}, 0x20) [ 1958.183943] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1958.235089] SELinux: policydb version 805306386 does not match my version range 15-31 [ 1958.246939] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1958.523761] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:02 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x325, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:02 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xb701, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003100d067000600000007000000"}, 0x20) 22:25:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000060d067000660000007000000"}, 0x20) 22:25:02 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1958.774374] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1958.829885] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003200d067000600000007000000"}, 0x20) 22:25:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000068d067000660000007000000"}, 0x20) [ 1958.870628] SELinux: policydb version 822083602 does not match my version range 15-31 22:25:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003300d067000600000007000000"}, 0x20) [ 1958.975627] SELinux: policydb version 838860818 does not match my version range 15-31 [ 1958.996352] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000006cd067000660000007000000"}, 0x20) [ 1959.096055] SELinux: policydb version 855638034 does not match my version range 15-31 [ 1959.120598] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1959.394088] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1959.638335] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1959.866546] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1960.111796] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:25:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003400d067000600000007000000"}, 0x20) 22:25:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000074d067000660000007000000"}, 0x20) 22:25:04 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xb800, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1960.357019] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1960.434429] SELinux: policydb version 872415250 does not match my version range 15-31 [ 1960.448901] sel_write_load: 14 callbacks suppressed [ 1960.448906] SELinux: failed to load policy [ 1960.470716] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1960.490631] SELinux: failed to load policy 22:25:04 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x326, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:04 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9e90000000000000000", 0x2e}], 0x1}, 0x0) 22:25:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003500d067000600000007000000"}, 0x20) 22:25:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000007ad067000660000007000000"}, 0x20) [ 1960.774738] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1960.807787] SELinux: failed to load policy [ 1960.821963] SELinux: policydb version 889192466 does not match my version range 15-31 [ 1960.833865] SELinux: failed to load policy 22:25:04 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "12000000020067000660000007000000"}, 0x20) 22:25:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003600d067000600000007000000"}, 0x20) [ 1961.134485] SELinux: policydb version 905969682 does not match my version range 15-31 [ 1961.162540] SELinux: failed to load policy [ 1961.174397] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:05 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003700d067000600000007000000"}, 0x20) [ 1961.204854] SELinux: failed to load policy 22:25:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "12000000040067000660000007000000"}, 0x20) [ 1961.265495] SELinux: policydb version 922746898 does not match my version range 15-31 [ 1961.302389] SELinux: failed to load policy 22:25:05 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003800d067000600000007000000"}, 0x20) 22:25:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000002d067000660000007000000"}, 0x20) [ 1961.310798] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1961.318705] SELinux: failed to load policy [ 1961.421768] SELinux: policydb version 939524114 does not match my version range 15-31 [ 1961.446332] SELinux: failed to load policy [ 1961.451402] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1961.467920] SELinux: failed to load policy 22:25:05 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003900d067000600000007000000"}, 0x20) [ 1961.768065] SELinux: policydb version 956301330 does not match my version range 15-31 22:25:06 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x327, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:06 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xb801, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000003d067000660000007000000"}, 0x20) 22:25:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003a00d067000600000007000000"}, 0x20) [ 1962.269588] SELinux: security policydb version 18 (MLS) not backwards compatible [ 1962.303835] SELinux: policydb version 973078546 does not match my version range 15-31 22:25:06 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:06 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9ea0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000004d067000660000007000000"}, 0x20) 22:25:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003b00d067000600000007000000"}, 0x20) [ 1962.764246] nla_parse: 6 callbacks suppressed [ 1962.764295] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:25:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003c00d067000600000007000000"}, 0x20) [ 1962.845390] SELinux: policydb version 989855762 does not match my version range 15-31 [ 1962.874758] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000005d067000660000007000000"}, 0x20) [ 1963.012599] SELinux: policydb version 1006632978 does not match my version range 15-31 [ 1963.027544] SELinux: security policydb version 18 (MLS) not backwards compatible 22:25:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003d00d067000600000007000000"}, 0x20) 22:25:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000006d067000660000007000000"}, 0x20) [ 1963.173339] SELinux: policydb version 1023410194 does not match my version range 15-31 [ 1963.183036] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1963.422205] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1963.682097] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1963.913313] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1964.165056] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:08 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x328, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200003e00d067000600000007000000"}, 0x20) 22:25:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000007d067000660000007000000"}, 0x20) 22:25:08 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xb900, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:08 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9eb0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:08 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1964.460083] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1964.483769] SELinux: policydb version 1040187410 does not match my version range 15-31 22:25:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000048d067000660000007000000"}, 0x20) [ 1964.508964] SELinux: security policydb version 18 (MLS) not backwards compatible 22:25:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004100d067000600000007000000"}, 0x20) [ 1964.592067] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000004cd067000660000007000000"}, 0x20) 22:25:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004200d067000600000007000000"}, 0x20) [ 1964.644348] SELinux: policydb version 1090519058 does not match my version range 15-31 22:25:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000060d067000660000007000000"}, 0x20) [ 1964.702874] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004300d067000600000007000000"}, 0x20) [ 1964.787811] SELinux: policydb version 1107296274 does not match my version range 15-31 [ 1964.809415] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1964.915860] SELinux: policydb version 1124073490 does not match my version range 15-31 [ 1965.065103] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1965.311781] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1965.561370] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:09 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x329, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:09 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000068d067000660000007000000"}, 0x20) 22:25:09 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004400d067000600000007000000"}, 0x20) 22:25:09 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9ec0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:09 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xb901, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1965.804103] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1965.847617] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1965.871274] sel_write_load: 17 callbacks suppressed [ 1965.871278] SELinux: failed to load policy [ 1965.899297] SELinux: policydb version 1140850706 does not match my version range 15-31 [ 1965.908462] SELinux: failed to load policy 22:25:10 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000006cd067000660000007000000"}, 0x20) 22:25:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004500d067000600000007000000"}, 0x20) [ 1966.236979] SELinux: policydb version 1157627922 does not match my version range 15-31 [ 1966.263079] SELinux: failed to load policy [ 1966.271082] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004600d067000600000007000000"}, 0x20) [ 1966.285685] SELinux: failed to load policy 22:25:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000074d067000660000007000000"}, 0x20) [ 1966.387932] SELinux: policydb version 1174405138 does not match my version range 15-31 [ 1966.409113] SELinux: failed to load policy [ 1966.413961] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004700d067000600000007000000"}, 0x20) [ 1966.434891] SELinux: failed to load policy 22:25:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000007ad067000660000007000000"}, 0x20) [ 1966.487010] SELinux: policydb version 1191182354 does not match my version range 15-31 [ 1966.509726] SELinux: failed to load policy [ 1966.561441] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1966.599930] SELinux: failed to load policy [ 1967.817063] nla_parse: 5 callbacks suppressed [ 1967.817073] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:11 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x32a, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:11 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004800d067000600000007000000"}, 0x20) 22:25:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067020060000007000000"}, 0x20) 22:25:11 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xba00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:11 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:11 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9ed0000000000000000", 0x2e}], 0x1}, 0x0) [ 1968.141422] SELinux: policydb table sizes (24576,7) do not match mine (6,7) [ 1968.149161] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1968.184065] SELinux: failed to load policy [ 1968.194715] SELinux: policydb version 1207959570 does not match my version range 15-31 [ 1968.220479] SELinux: failed to load policy 22:25:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067040060000007000000"}, 0x20) 22:25:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004900d067000600000007000000"}, 0x20) [ 1968.327457] SELinux: policydb table sizes (24576,7) do not match mine (6,7) 22:25:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000560000007000000"}, 0x20) [ 1968.392356] SELinux: policydb version 1224736786 does not match my version range 15-31 22:25:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004a00d067000600000007000000"}, 0x20) [ 1968.509271] SELinux: policydb table sizes (24581,7) do not match mine (6,7) 22:25:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067020660000007000000"}, 0x20) [ 1968.558441] SELinux: policydb version 1241514002 does not match my version range 15-31 22:25:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004b00d067000600000007000000"}, 0x20) [ 1968.676201] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1968.751805] SELinux: policydb version 1258291218 does not match my version range 15-31 [ 1969.059993] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:13 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x32b, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:13 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067030660000007000000"}, 0x20) 22:25:13 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004c00d067000600000007000000"}, 0x20) [ 1969.295291] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1969.346999] SELinux: policydb version 1275068434 does not match my version range 15-31 [ 1969.362183] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:13 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xba01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1969.647434] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1969.924258] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1970.160934] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:14 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:14 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004d00d067000600000007000000"}, 0x20) 22:25:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067040660000007000000"}, 0x20) 22:25:14 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0002a9ee0000000000000000", 0x2e}], 0x1}, 0x0) [ 1970.413303] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1970.470703] SELinux: policydb version 1291845650 does not match my version range 15-31 22:25:14 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004e00d067000600000007000000"}, 0x20) [ 1970.514956] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067050660000007000000"}, 0x20) [ 1970.623550] SELinux: policydb version 1308622866 does not match my version range 15-31 22:25:14 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004f00d067000600000007000000"}, 0x20) [ 1970.664719] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067060660000007000000"}, 0x20) [ 1970.764061] SELinux: policydb version 1325400082 does not match my version range 15-31 [ 1970.803772] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1970.949210] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1971.181706] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:15 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x32c, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:15 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005000d067000600000007000000"}, 0x20) 22:25:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067070660000007000000"}, 0x20) [ 1971.481891] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1971.498287] sel_write_load: 14 callbacks suppressed [ 1971.498292] SELinux: failed to load policy [ 1971.523876] SELinux: policydb version 1342177298 does not match my version range 15-31 [ 1971.532966] SELinux: failed to load policy 22:25:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067480660000007000000"}, 0x20) [ 1972.069208] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1972.079342] SELinux: failed to load policy 22:25:16 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:16 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005100d067000600000007000000"}, 0x20) 22:25:16 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbb00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:16 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dacfffffff00000000000000000", 0x2e}], 0x1}, 0x0) 22:25:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0674c0660000007000000"}, 0x20) [ 1972.360627] SELinux: policydb version 1358954514 does not match my version range 15-31 [ 1972.381431] SELinux: failed to load policy [ 1972.386289] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1972.393818] SELinux: failed to load policy 22:25:16 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005200d067000600000007000000"}, 0x20) 22:25:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067600660000007000000"}, 0x20) 22:25:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067680660000007000000"}, 0x20) [ 1972.495705] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1972.505350] SELinux: failed to load policy [ 1972.510351] SELinux: policydb version 1375731730 does not match my version range 15-31 [ 1972.522745] SELinux: failed to load policy [ 1972.601576] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1972.618914] SELinux: failed to load policy 22:25:16 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x32d, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:16 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005300d067000600000007000000"}, 0x20) 22:25:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0676c0660000007000000"}, 0x20) [ 1972.875631] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1972.895491] SELinux: failed to load policy [ 1972.909286] SELinux: policydb version 1392508946 does not match my version range 15-31 22:25:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067740660000007000000"}, 0x20) [ 1972.935756] SELinux: failed to load policy [ 1973.010826] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 1973.240686] nla_parse: 5 callbacks suppressed [ 1973.240697] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1973.484000] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1973.731044] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1973.965089] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1974.215698] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:18 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005400d067000600000007000000"}, 0x20) 22:25:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0677a0660000007000000"}, 0x20) 22:25:18 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbb01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:18 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x32e, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:18 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dacfffffffd0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005500d067000600000007000000"}, 0x20) [ 1974.494416] SELinux: policydb version 1409286162 does not match my version range 15-31 [ 1974.516278] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1974.532864] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:25:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000960000007000000"}, 0x20) [ 1974.608267] SELinux: policydb version 1426063378 does not match my version range 15-31 22:25:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000a60000007000000"}, 0x20) 22:25:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005600d067000600000007000000"}, 0x20) [ 1974.678899] SELinux: policydb table sizes (24585,7) do not match mine (6,7) 22:25:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067002060000007000000"}, 0x20) [ 1974.776361] SELinux: policydb table sizes (24586,7) do not match mine (6,7) [ 1974.793583] SELinux: policydb version 1442840594 does not match my version range 15-31 22:25:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005700d067000600000007000000"}, 0x20) [ 1974.879898] SELinux: policydb table sizes (24608,7) do not match mine (6,7) [ 1974.948829] SELinux: policydb version 1459617810 does not match my version range 15-31 [ 1975.202757] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1975.474710] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1975.702104] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1975.931498] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:25:20 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x922c0000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067002e60000007000000"}, 0x20) 22:25:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005800d067000600000007000000"}, 0x20) 22:25:20 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00000fff0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:20 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbc00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:20 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x32f, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1976.694035] SELinux: policydb version 1476395026 does not match my version range 15-31 [ 1976.723503] sel_write_load: 9 callbacks suppressed [ 1976.723509] SELinux: failed to load policy [ 1976.733023] SELinux: policydb table sizes (24622,7) do not match mine (6,7) 22:25:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005900d067000600000007000000"}, 0x20) [ 1976.743932] SELinux: failed to load policy 22:25:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067005060000007000000"}, 0x20) 22:25:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000600000007000000"}, 0x20) [ 1976.875027] SELinux: policydb table sizes (24656,7) do not match mine (6,7) [ 1976.890047] SELinux: failed to load policy [ 1976.897138] SELinux: policydb version 1493172242 does not match my version range 15-31 [ 1976.950762] SELinux: failed to load policy [ 1976.985332] SELinux: failed to load policy 22:25:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000a00000007000000"}, 0x20) 22:25:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005a00d067000600000007000000"}, 0x20) 22:25:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005b00d067000600000007000000"}, 0x20) [ 1977.109883] SELinux: policydb table sizes (10,7) do not match mine (6,7) [ 1977.121506] SELinux: failed to load policy [ 1977.127833] SELinux: policydb version 1509949458 does not match my version range 15-31 [ 1977.137468] SELinux: failed to load policy [ 1977.243773] SELinux: policydb version 1526726674 does not match my version range 15-31 [ 1977.263318] SELinux: failed to load policy [ 1978.410397] nla_parse: 7 callbacks suppressed [ 1978.410407] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1978.658325] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:22 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067006300000007000000"}, 0x20) 22:25:22 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005c00d067000600000007000000"}, 0x20) 22:25:22 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbc01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:22 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x330, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:22 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00f0ffff0000000000000000", 0x2e}], 0x1}, 0x0) [ 1978.955594] SELinux: policydb table sizes (99,7) do not match mine (6,7) [ 1978.961392] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1978.989915] SELinux: failed to load policy [ 1978.997051] SELinux: policydb version 1543503890 does not match my version range 15-31 [ 1979.005732] SELinux: failed to load policy 22:25:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000560000007000000"}, 0x20) 22:25:22 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005d00d067000600000007000000"}, 0x20) [ 1979.131437] SELinux: policydb version 1560281106 does not match my version range 15-31 [ 1979.154553] SELinux: policydb table sizes (24581,7) do not match mine (6,7) 22:25:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005e00d067000600000007000000"}, 0x20) 22:25:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000860000007000000"}, 0x20) 22:25:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000960000007000000"}, 0x20) 22:25:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200005f00d067000600000007000000"}, 0x20) [ 1979.323717] SELinux: policydb table sizes (24584,7) do not match mine (6,7) [ 1979.332199] SELinux: policydb version 1577058322 does not match my version range 15-31 [ 1979.470824] SELinux: policydb table sizes (24585,7) do not match mine (6,7) [ 1979.496672] SELinux: policydb version 1593835538 does not match my version range 15-31 [ 1979.878576] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1980.107710] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1980.339743] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:24 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006000d067000600000007000000"}, 0x20) 22:25:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000a60000007000000"}, 0x20) [ 1980.563717] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1980.611361] SELinux: policydb version 1610612754 does not match my version range 15-31 [ 1980.653511] SELinux: policydb table sizes (24586,7) do not match mine (6,7) [ 1980.915430] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1981.180010] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:25:25 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbd00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:25 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006100d067000600000007000000"}, 0x20) 22:25:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067001060000007000000"}, 0x20) 22:25:25 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac7fffffff0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:25 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x331, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1981.424946] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067002e60000007000000"}, 0x20) [ 1981.495815] SELinux: policydb table sizes (24592,7) do not match mine (6,7) [ 1981.512044] SELinux: policydb version 1627389970 does not match my version range 15-31 22:25:25 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006200d067000600000007000000"}, 0x20) 22:25:25 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006300d067000600000007000000"}, 0x20) [ 1981.613813] SELinux: policydb version 1644167186 does not match my version range 15-31 [ 1981.632553] SELinux: policydb table sizes (24622,7) do not match mine (6,7) 22:25:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067005060000007000000"}, 0x20) [ 1981.718665] SELinux: policydb version 1660944402 does not match my version range 15-31 [ 1981.737074] sel_write_load: 12 callbacks suppressed [ 1981.737080] SELinux: failed to load policy [ 1981.773387] SELinux: policydb table sizes (24656,7) do not match mine (6,7) [ 1981.785196] SELinux: failed to load policy 22:25:26 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:26 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006400d067000600000007000000"}, 0x20) 22:25:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700ffe0f50507000000"}, 0x20) [ 1982.284513] SELinux: policydb version 1677721618 does not match my version range 15-31 [ 1982.323558] SELinux: failed to load policy [ 1982.328931] SELinux: policydb table sizes (99999999,7) do not match mine (6,7) [ 1982.342347] SELinux: failed to load policy [ 1982.358697] SELinux: policydb table sizes (99999999,7) do not match mine (6,7) [ 1982.373342] SELinux: failed to load policy 22:25:26 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006500d067000600000007000000"}, 0x20) 22:25:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000628000007000000"}, 0x20) 22:25:26 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbd01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1983.170428] SELinux: policydb version 1694498834 does not match my version range 15-31 [ 1983.194910] SELinux: failed to load policy [ 1983.215742] SELinux: policydb table sizes (10246,7) do not match mine (6,7) [ 1983.233833] SELinux: failed to load policy 22:25:27 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac97ffffff0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:27 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x332, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006600d067000600000007000000"}, 0x20) 22:25:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0670006b8000007000000"}, 0x20) 22:25:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006700d067000600000007000000"}, 0x20) [ 1983.479034] SELinux: policydb version 1711276050 does not match my version range 15-31 [ 1983.498193] SELinux: failed to load policy [ 1983.508820] SELinux: policydb table sizes (47110,7) do not match mine (6,7) [ 1983.524510] SELinux: failed to load policy 22:25:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660020007000000"}, 0x20) [ 1983.590428] SELinux: policydb version 1728053266 does not match my version range 15-31 [ 1983.622843] SELinux: failed to load policy [ 1983.633593] SELinux: policydb table sizes (155654,7) do not match mine (6,7) [ 1983.867212] nla_parse: 6 callbacks suppressed [ 1983.867222] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:27 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660030007000000"}, 0x20) 22:25:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006800d067000600000007000000"}, 0x20) [ 1984.107301] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:25:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660040007000000"}, 0x20) [ 1984.174921] SELinux: policydb version 1744830482 does not match my version range 15-31 [ 1984.202162] SELinux: policydb table sizes (221190,7) do not match mine (6,7) 22:25:28 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006900d067000600000007000000"}, 0x20) [ 1984.313619] SELinux: policydb version 1761607698 does not match my version range 15-31 [ 1984.340373] SELinux: policydb table sizes (286726,7) do not match mine (6,7) [ 1984.554436] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1984.782836] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1985.015350] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:25:29 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbe00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006a00d067000600000007000000"}, 0x20) [ 1985.264440] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1985.318584] SELinux: policydb version 1778384914 does not match my version range 15-31 [ 1985.563582] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:29 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x333, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660050007000000"}, 0x20) 22:25:29 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac9effffff0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006b00d067000600000007000000"}, 0x20) 22:25:29 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1985.818527] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1985.896768] SELinux: policydb table sizes (352262,7) do not match mine (6,7) [ 1985.931358] SELinux: policydb version 1795162130 does not match my version range 15-31 22:25:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660060007000000"}, 0x20) 22:25:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006c00d067000600000007000000"}, 0x20) 22:25:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660070007000000"}, 0x20) [ 1986.055373] SELinux: policydb table sizes (417798,7) do not match mine (6,7) 22:25:30 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006d00d067000600000007000000"}, 0x20) [ 1986.120689] SELinux: policydb version 1811939346 does not match my version range 15-31 [ 1986.157002] SELinux: policydb table sizes (483334,7) do not match mine (6,7) 22:25:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660480007000000"}, 0x20) [ 1986.243794] SELinux: policydb version 1828716562 does not match my version range 15-31 [ 1986.281539] SELinux: policydb table sizes (4743174,7) do not match mine (6,7) 22:25:30 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbe01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:30 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006e00d067000600000007000000"}, 0x20) [ 1986.510226] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1986.559521] SELinux: policydb version 1845493778 does not match my version range 15-31 [ 1986.892144] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:31 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x334, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0670006604c0007000000"}, 0x20) 22:25:31 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006f00d067000600000007000000"}, 0x20) 22:25:31 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:31 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbf00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:31 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dace4ffffff0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660600007000000"}, 0x20) [ 1988.173470] SELinux: policydb table sizes (5005318,7) do not match mine (6,7) [ 1988.199687] sel_write_load: 14 callbacks suppressed [ 1988.199693] SELinux: failed to load policy [ 1988.211171] SELinux: policydb version 1862270994 does not match my version range 15-31 [ 1988.252539] SELinux: failed to load policy 22:25:32 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007000d067000600000007000000"}, 0x20) [ 1988.296982] SELinux: policydb table sizes (6316038,7) do not match mine (6,7) [ 1988.311880] SELinux: failed to load policy 22:25:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660680007000000"}, 0x20) 22:25:32 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007100d067000600000007000000"}, 0x20) 22:25:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0670006606c0007000000"}, 0x20) [ 1988.404400] SELinux: policydb version 1879048210 does not match my version range 15-31 [ 1988.417088] SELinux: failed to load policy [ 1988.422039] SELinux: policydb table sizes (6840326,7) do not match mine (6,7) [ 1988.432390] SELinux: failed to load policy 22:25:32 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007200d067000600000007000000"}, 0x20) [ 1988.543993] SELinux: policydb version 1895825426 does not match my version range 15-31 [ 1988.567392] SELinux: failed to load policy [ 1988.572458] SELinux: policydb table sizes (7102470,7) do not match mine (6,7) [ 1988.581835] SELinux: failed to load policy [ 1988.675277] SELinux: policydb version 1912602642 does not match my version range 15-31 [ 1988.684344] SELinux: failed to load policy [ 1988.938221] nla_parse: 5 callbacks suppressed [ 1988.938269] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1989.187511] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1989.435070] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:33 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x335, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660740007000000"}, 0x20) 22:25:33 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007300d067000600000007000000"}, 0x20) [ 1989.657188] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1989.741236] SELinux: policydb version 1929379858 does not match my version range 15-31 [ 1989.771676] SELinux: failed to load policy [ 1989.784676] SELinux: policydb table sizes (7626758,7) do not match mine (6,7) [ 1989.840185] SELinux: failed to load policy 22:25:33 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:33 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xbf01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1989.997487] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:25:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007400d067000600000007000000"}, 0x20) 22:25:34 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dacf0ffffff0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0670006607a0007000000"}, 0x20) [ 1990.281774] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007500d067000600000007000000"}, 0x20) [ 1990.339195] SELinux: policydb table sizes (8019974,7) do not match mine (6,7) [ 1990.362867] SELinux: policydb version 1946157074 does not match my version range 15-31 22:25:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000307000000"}, 0x20) 22:25:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007600d067000600000007000000"}, 0x20) [ 1990.468681] SELinux: policydb version 1962934290 does not match my version range 15-31 [ 1990.491866] SELinux: policydb table sizes (50356230,7) do not match mine (6,7) 22:25:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000507000000"}, 0x20) [ 1990.576936] SELinux: policydb version 1979711506 does not match my version range 15-31 [ 1990.602011] SELinux: policydb table sizes (83910662,7) do not match mine (6,7) [ 1990.831581] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1991.082543] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1991.337848] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1991.581399] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:35 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x336, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:35 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007700d067000600000007000000"}, 0x20) 22:25:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000607000000"}, 0x20) 22:25:35 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0ffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:35 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1991.859871] SELinux: policydb version 1996488722 does not match my version range 15-31 [ 1991.899853] SELinux: policydb table sizes (100687878,7) do not match mine (6,7) 22:25:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000707000000"}, 0x20) [ 1992.015101] SELinux: policydb table sizes (117465094,7) do not match mine (6,7) 22:25:36 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dacfdffffff0000000000000000", 0x2e}], 0x1}, 0x0) 22:25:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007800d067000600000007000000"}, 0x20) 22:25:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660002007000000"}, 0x20) [ 1992.288974] SELinux: policydb version 2013265938 does not match my version range 15-31 22:25:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007900d067000600000007000000"}, 0x20) [ 1992.330303] SELinux: policydb table sizes (536895494,7) do not match mine (6,7) 22:25:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660003f07000000"}, 0x20) [ 1992.421356] SELinux: policydb version 2030043154 does not match my version range 15-31 22:25:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007a00d067000600000007000000"}, 0x20) [ 1992.475352] SELinux: policydb table sizes (1056989190,7) do not match mine (6,7) [ 1992.607751] SELinux: policydb version 2046820370 does not match my version range 15-31 22:25:37 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x337, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660004807000000"}, 0x20) 22:25:37 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007b00d067000600000007000000"}, 0x20) [ 1993.453868] SELinux: policydb table sizes (1207984134,7) do not match mine (6,7) [ 1993.472966] sel_write_load: 14 callbacks suppressed [ 1993.472971] SELinux: failed to load policy [ 1993.483951] SELinux: policydb version 2063597586 does not match my version range 15-31 [ 1993.504380] SELinux: failed to load policy [ 1993.512466] SELinux: policydb table sizes (1207984134,7) do not match mine (6,7) [ 1993.525667] SELinux: failed to load policy 22:25:37 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x100000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:37 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc001, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:37 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007c00d067000600000007000000"}, 0x20) 22:25:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660004c07000000"}, 0x20) 22:25:37 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000800000000000000", 0x2e}], 0x1}, 0x0) [ 1993.980368] nla_parse: 6 callbacks suppressed [ 1993.980396] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1994.050531] SELinux: policydb table sizes (1275092998,7) do not match mine (6,7) [ 1994.103771] SELinux: failed to load policy [ 1994.117268] SELinux: policydb version 2080374802 does not match my version range 15-31 22:25:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660006007000000"}, 0x20) [ 1994.148510] SELinux: failed to load policy 22:25:38 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007d00d067000600000007000000"}, 0x20) [ 1994.222669] SELinux: policydb table sizes (1610637318,7) do not match mine (6,7) [ 1994.248589] SELinux: failed to load policy [ 1994.253838] SELinux: policydb version 2097152018 does not match my version range 15-31 22:25:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660006807000000"}, 0x20) [ 1994.286256] SELinux: failed to load policy 22:25:38 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007e00d067000600000007000000"}, 0x20) [ 1994.358180] SELinux: policydb table sizes (1744855046,7) do not match mine (6,7) [ 1994.376240] SELinux: failed to load policy [ 1994.402583] SELinux: policydb version 2113929234 does not match my version range 15-31 [ 1994.411479] SELinux: failed to load policy [ 1994.605586] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1995.079870] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1995.339714] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1995.564324] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:39 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x338, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660006c07000000"}, 0x20) 22:25:39 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008200d067000600000007000000"}, 0x20) [ 1995.799631] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1995.863889] SELinux: policydb table sizes (1811963910,7) do not match mine (6,7) [ 1995.879319] SELinux: failed to load policy [ 1995.889978] SELinux: policydb version -2113929198 does not match my version range 15-31 [ 1996.162504] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:40 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x200000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:40 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc100, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660007407000000"}, 0x20) 22:25:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008300d067000600000007000000"}, 0x20) 22:25:40 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000001000000000000000", 0x2e}], 0x1}, 0x0) [ 1996.409745] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660007a07000000"}, 0x20) [ 1996.499449] SELinux: policydb table sizes (1946181638,7) do not match mine (6,7) [ 1996.533653] SELinux: policydb version -2097151982 does not match my version range 15-31 22:25:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008400d067000600000007000000"}, 0x20) [ 1996.602082] SELinux: policydb table sizes (2046844934,7) do not match mine (6,7) 22:25:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000200000000"}, 0x20) [ 1996.678269] SELinux: policydb version -2080374766 does not match my version range 15-31 22:25:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008500d067000600000007000000"}, 0x20) [ 1996.741823] SELinux: policydb table sizes (33579014,0) do not match mine (6,7) [ 1996.794623] SELinux: policydb version -2063597550 does not match my version range 15-31 22:25:40 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x339, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000400000000"}, 0x20) 22:25:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008600d067000600000007000000"}, 0x20) [ 1997.007171] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1997.084939] SELinux: policydb table sizes (67133446,0) do not match mine (6,7) [ 1997.111918] SELinux: policydb version -2046820334 does not match my version range 15-31 [ 1997.450771] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:41 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x300000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:42 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc101, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000003000000"}, 0x20) 22:25:42 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008700d067000600000007000000"}, 0x20) 22:25:42 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x33a, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:42 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dacffffffff8740000000000000", 0x2e}], 0x1}, 0x0) [ 1998.777492] SELinux: policydb version -2030043118 does not match my version range 15-31 22:25:42 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008800d067000600000007000000"}, 0x20) [ 1998.823863] sel_write_load: 9 callbacks suppressed [ 1998.823868] SELinux: failed to load policy [ 1998.833958] SELinux: policydb table sizes (24582,3) do not match mine (6,7) [ 1998.855172] SELinux: failed to load policy 22:25:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000207000000"}, 0x20) [ 1998.943531] SELinux: policydb table sizes (33579014,7) do not match mine (6,7) [ 1998.951865] SELinux: failed to load policy [ 1998.983225] SELinux: policydb version -2013265902 does not match my version range 15-31 22:25:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000307000000"}, 0x20) [ 1999.002168] SELinux: failed to load policy 22:25:42 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008900d067000600000007000000"}, 0x20) 22:25:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000407000000"}, 0x20) [ 1999.053467] SELinux: policydb table sizes (50356230,7) do not match mine (6,7) [ 1999.071989] SELinux: failed to load policy [ 1999.119894] SELinux: policydb version -1996488686 does not match my version range 15-31 [ 1999.141640] SELinux: failed to load policy [ 1999.156054] SELinux: policydb table sizes (67133446,7) do not match mine (6,7) 22:25:42 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008a00d067000600000007000000"}, 0x20) [ 1999.170016] SELinux: failed to load policy [ 1999.247014] SELinux: policydb version -1979711470 does not match my version range 15-31 [ 1999.265244] SELinux: failed to load policy [ 1999.360489] nla_parse: 5 callbacks suppressed [ 1999.360500] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:25:43 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 1999.784313] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2000.022486] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:25:44 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc200, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000507000000"}, 0x20) 22:25:44 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008b00d067000600000007000000"}, 0x20) [ 2000.253214] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2000.307633] SELinux: policydb version -1962934254 does not match my version range 15-31 [ 2000.325149] SELinux: failed to load policy [ 2000.330021] SELinux: policydb table sizes (83910662,7) do not match mine (6,7) [ 2000.362836] SELinux: failed to load policy [ 2000.611466] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:44 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x33b, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2000.847226] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:25:45 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000010000000000", 0x2e}], 0x1}, 0x0) 22:25:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008c00d067000600000007000000"}, 0x20) 22:25:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000607000000"}, 0x20) [ 2001.160403] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008d00d067000600000007000000"}, 0x20) [ 2001.204848] SELinux: policydb version -1946157038 does not match my version range 15-31 [ 2001.223984] SELinux: policydb table sizes (100687878,7) do not match mine (6,7) 22:25:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000707000000"}, 0x20) 22:25:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660004807000000"}, 0x20) [ 2001.317886] SELinux: policydb version -1929379822 does not match my version range 15-31 [ 2001.353858] SELinux: policydb table sizes (117465094,7) do not match mine (6,7) 22:25:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008e00d067000600000007000000"}, 0x20) [ 2001.456972] SELinux: policydb version -1912602606 does not match my version range 15-31 [ 2001.466836] SELinux: policydb table sizes (1207984134,7) do not match mine (6,7) 22:25:45 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x500000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2001.682879] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:25:45 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc201, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200008f00d067000600000007000000"}, 0x20) 22:25:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660004c07000000"}, 0x20) [ 2001.970671] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2002.016093] SELinux: policydb version -1895825390 does not match my version range 15-31 [ 2002.072908] SELinux: policydb table sizes (1275092998,7) do not match mine (6,7) [ 2002.351726] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:25:46 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x33c, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:47 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000030000000000", 0x2e}], 0x1}, 0x0) 22:25:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009000d067000600000007000000"}, 0x20) 22:25:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660006007000000"}, 0x20) 22:25:47 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x600000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:47 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc300, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2003.650986] SELinux: policydb version -1879048174 does not match my version range 15-31 [ 2003.680444] SELinux: policydb table sizes (1610637318,7) do not match mine (6,7) 22:25:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009100d067000600000007000000"}, 0x20) 22:25:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660006807000000"}, 0x20) [ 2003.772299] SELinux: policydb version -1862270958 does not match my version range 15-31 22:25:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009200d067000600000007000000"}, 0x20) [ 2003.825271] SELinux: policydb table sizes (1744855046,7) do not match mine (6,7) [ 2003.843466] sel_write_load: 11 callbacks suppressed [ 2003.843472] SELinux: failed to load policy [ 2003.863501] SELinux: policydb version -1845493742 does not match my version range 15-31 22:25:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660006c07000000"}, 0x20) [ 2003.886685] SELinux: failed to load policy 22:25:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009300d067000600000007000000"}, 0x20) 22:25:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009400d067000600000007000000"}, 0x20) [ 2003.971402] SELinux: policydb version -1828716526 does not match my version range 15-31 [ 2003.985261] SELinux: failed to load policy [ 2003.992663] SELinux: policydb table sizes (1811963910,7) do not match mine (6,7) [ 2004.007794] SELinux: failed to load policy [ 2004.092217] SELinux: policydb version -1811939310 does not match my version range 15-31 [ 2004.117439] SELinux: failed to load policy [ 2004.510783] nla_parse: 6 callbacks suppressed [ 2004.510793] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2004.750715] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2005.005551] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009500d067000600000007000000"}, 0x20) 22:25:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660007407000000"}, 0x20) 22:25:49 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc301, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:49 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x33d, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2005.253856] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2005.312428] SELinux: policydb table sizes (1946181638,7) do not match mine (6,7) [ 2005.342204] SELinux: failed to load policy [ 2005.347360] SELinux: policydb version -1795162094 does not match my version range 15-31 [ 2005.363070] SELinux: failed to load policy 22:25:49 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x700000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:49 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dacfffffffffffff00000000000", 0x2e}], 0x1}, 0x0) 22:25:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660007a07000000"}, 0x20) 22:25:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009600d067000600000007000000"}, 0x20) [ 2005.618913] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2005.669967] SELinux: policydb version -1778384878 does not match my version range 15-31 22:25:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009700d067000600000007000000"}, 0x20) [ 2005.723839] SELinux: failed to load policy [ 2005.729334] SELinux: policydb table sizes (2046844934,7) do not match mine (6,7) [ 2005.740029] SELinux: failed to load policy 22:25:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000009000000"}, 0x20) [ 2005.802596] SELinux: policydb version -1761607662 does not match my version range 15-31 [ 2005.851302] SELinux: failed to load policy 22:25:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009800d067000600000007000000"}, 0x20) 22:25:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000a000000"}, 0x20) [ 2005.888171] SELinux: policydb table sizes (24582,9) do not match mine (6,7) [ 2005.969741] SELinux: policydb version -1744830446 does not match my version range 15-31 22:25:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009900d067000600000007000000"}, 0x20) [ 2006.010285] SELinux: policydb table sizes (24582,10) do not match mine (6,7) 22:25:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000020000000"}, 0x20) [ 2006.152240] SELinux: policydb version -1728053230 does not match my version range 15-31 [ 2006.191583] SELinux: policydb table sizes (24582,32) do not match mine (6,7) [ 2006.434537] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:50 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc400, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2006.710158] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2006.941867] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2007.197096] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:51 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x33e, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2007.429727] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:51 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa00000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009a00d067000600000007000000"}, 0x20) 22:25:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000002e000000"}, 0x20) 22:25:51 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000100000000", 0x2e}], 0x1}, 0x0) [ 2007.766957] SELinux: policydb table sizes (24582,46) do not match mine (6,7) [ 2007.780975] SELinux: policydb version -1711276014 does not match my version range 15-31 22:25:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000050000000"}, 0x20) 22:25:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009b00d067000600000007000000"}, 0x20) 22:25:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000003000000"}, 0x20) 22:25:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009c00d067000600000007000000"}, 0x20) [ 2007.899818] SELinux: policydb table sizes (24582,80) do not match mine (6,7) [ 2007.918820] SELinux: policydb version -1694498798 does not match my version range 15-31 22:25:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000004000000"}, 0x20) [ 2008.041100] SELinux: policydb table sizes (24582,3) do not match mine (6,7) [ 2008.059704] SELinux: policydb version -1677721582 does not match my version range 15-31 22:25:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009d00d067000600000007000000"}, 0x20) [ 2008.152302] SELinux: policydb table sizes (24582,4) do not match mine (6,7) [ 2008.228134] SELinux: policydb version -1660944366 does not match my version range 15-31 22:25:52 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc401, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:53 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x33f, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000008000000"}, 0x20) 22:25:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009e00d067000600000007000000"}, 0x20) 22:25:53 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000200000000", 0x2e}], 0x1}, 0x0) 22:25:53 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe00000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2009.409562] SELinux: policydb table sizes (24582,8) do not match mine (6,7) [ 2009.427653] sel_write_load: 13 callbacks suppressed [ 2009.427658] SELinux: failed to load policy [ 2009.444710] SELinux: policydb version -1644167150 does not match my version range 15-31 22:25:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000009000000"}, 0x20) [ 2009.468779] SELinux: failed to load policy 22:25:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200009f00d067000600000007000000"}, 0x20) [ 2009.546421] SELinux: policydb table sizes (24582,9) do not match mine (6,7) [ 2009.555294] SELinux: failed to load policy 22:25:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000a000000"}, 0x20) 22:25:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a000d067000600000007000000"}, 0x20) [ 2009.588027] SELinux: policydb version -1627389934 does not match my version range 15-31 [ 2009.611318] SELinux: failed to load policy 22:25:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000010000000"}, 0x20) [ 2009.664669] SELinux: policydb table sizes (24582,10) do not match mine (6,7) [ 2009.674780] SELinux: failed to load policy [ 2009.736791] SELinux: policydb version -1610612718 does not match my version range 15-31 [ 2009.764048] SELinux: failed to load policy [ 2009.775803] SELinux: policydb table sizes (24582,16) do not match mine (6,7) [ 2009.784656] SELinux: failed to load policy 22:25:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a100d067000600000007000000"}, 0x20) [ 2009.875859] SELinux: policydb version -1593835502 does not match my version range 15-31 [ 2009.890294] SELinux: failed to load policy [ 2009.980973] nla_parse: 6 callbacks suppressed [ 2009.980985] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:25:54 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc500, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2010.231702] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2010.494390] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2010.745430] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2011.002943] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:55 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x340, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000002e000000"}, 0x20) 22:25:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a200d067000600000007000000"}, 0x20) 22:25:55 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000300000000", 0x2e}], 0x1}, 0x0) 22:25:55 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f00000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2011.233515] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:25:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a300d067000600000007000000"}, 0x20) [ 2011.296653] SELinux: policydb version -1577058286 does not match my version range 15-31 [ 2011.317889] SELinux: failed to load policy [ 2011.327787] SELinux: policydb table sizes (24582,46) do not match mine (6,7) [ 2011.335697] SELinux: failed to load policy 22:25:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000050000000"}, 0x20) 22:25:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a400d067000600000007000000"}, 0x20) [ 2011.432138] SELinux: policydb version -1560281070 does not match my version range 15-31 [ 2011.454695] SELinux: policydb table sizes (24582,80) do not match mine (6,7) 22:25:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007020000"}, 0x20) 22:25:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a500d067000600000007000000"}, 0x20) [ 2011.540746] SELinux: policydb version -1543503854 does not match my version range 15-31 [ 2011.561224] SELinux: policydb table sizes (24582,519) do not match mine (6,7) 22:25:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007030000"}, 0x20) [ 2011.653406] SELinux: policydb version -1526726638 does not match my version range 15-31 [ 2011.695847] SELinux: policydb table sizes (24582,775) do not match mine (6,7) 22:25:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a600d067000600000007000000"}, 0x20) [ 2011.882601] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2011.941099] SELinux: policydb version -1509949422 does not match my version range 15-31 [ 2012.228725] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2012.473010] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2012.735764] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:25:57 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x341, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:57 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc501, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007040000"}, 0x20) 22:25:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a700d067000600000007000000"}, 0x20) 22:25:57 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000400000000", 0x2e}], 0x1}, 0x0) 22:25:57 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4800000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2013.284002] SELinux: policydb version -1493172206 does not match my version range 15-31 22:25:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a800d067000600000007000000"}, 0x20) [ 2013.326942] SELinux: policydb table sizes (24582,1031) do not match mine (6,7) 22:25:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007050000"}, 0x20) 22:25:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000a900d067000600000007000000"}, 0x20) [ 2013.413331] SELinux: policydb version -1476394990 does not match my version range 15-31 [ 2013.480177] SELinux: policydb table sizes (24582,1287) do not match mine (6,7) 22:25:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007060000"}, 0x20) [ 2013.525421] SELinux: policydb version -1459617774 does not match my version range 15-31 22:25:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000aa00d067000600000007000000"}, 0x20) 22:25:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007070000"}, 0x20) [ 2013.612656] SELinux: policydb table sizes (24582,1543) do not match mine (6,7) [ 2013.644958] SELinux: policydb version -1442840558 does not match my version range 15-31 [ 2013.752305] SELinux: policydb table sizes (24582,1799) do not match mine (6,7) [ 2015.030698] nla_parse: 6 callbacks suppressed [ 2015.030707] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2015.310808] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:25:59 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x342, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ab00d067000600000007000000"}, 0x20) 22:25:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007480000"}, 0x20) 22:25:59 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc600, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:59 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4c00000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:25:59 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000500000000", 0x2e}], 0x1}, 0x0) [ 2015.645376] SELinux: policydb version -1426063342 does not match my version range 15-31 [ 2015.645991] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2015.674507] sel_write_load: 15 callbacks suppressed [ 2015.674513] SELinux: failed to load policy 22:25:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ac00d067000600000007000000"}, 0x20) [ 2015.692155] SELinux: policydb table sizes (24582,18439) do not match mine (6,7) [ 2015.711924] SELinux: failed to load policy 22:25:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0670006600000074c0000"}, 0x20) [ 2015.773078] SELinux: policydb version -1409286126 does not match my version range 15-31 [ 2015.800630] SELinux: failed to load policy 22:25:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ad00d067000600000007000000"}, 0x20) [ 2015.865346] SELinux: policydb table sizes (24582,19463) do not match mine (6,7) [ 2015.887035] SELinux: failed to load policy 22:25:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007600000"}, 0x20) [ 2015.979690] SELinux: policydb version -1392508910 does not match my version range 15-31 [ 2016.014832] SELinux: failed to load policy [ 2016.024079] SELinux: policydb table sizes (24582,24583) do not match mine (6,7) [ 2016.035261] SELinux: failed to load policy 22:25:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ae00d067000600000007000000"}, 0x20) 22:25:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007680000"}, 0x20) [ 2016.175791] SELinux: policydb table sizes (24582,26631) do not match mine (6,7) [ 2016.203762] SELinux: failed to load policy [ 2016.211352] SELinux: policydb version -1375731694 does not match my version range 15-31 [ 2016.224203] SELinux: failed to load policy [ 2016.620862] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2016.869042] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2017.127478] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:01 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x343, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:01 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0670006600000076c0000"}, 0x20) 22:26:01 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000af00d067000600000007000000"}, 0x20) 22:26:01 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc601, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:01 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2017.353750] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2017.421979] SELinux: policydb table sizes (24582,27655) do not match mine (6,7) [ 2017.459340] SELinux: failed to load policy [ 2017.464184] SELinux: policydb version -1358954478 does not match my version range 15-31 [ 2017.473341] SELinux: failed to load policy 22:26:01 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000600000000", 0x2e}], 0x1}, 0x0) 22:26:01 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007740000"}, 0x20) 22:26:01 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b000d067000600000007000000"}, 0x20) [ 2017.763063] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2017.820262] SELinux: policydb table sizes (24582,29703) do not match mine (6,7) [ 2017.844107] SELinux: policydb version -1342177262 does not match my version range 15-31 22:26:01 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0670006600000077a0000"}, 0x20) 22:26:01 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b100d067000600000007000000"}, 0x20) [ 2017.954526] SELinux: policydb table sizes (24582,31239) do not match mine (6,7) [ 2017.974799] SELinux: policydb version -1325400046 does not match my version range 15-31 22:26:01 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000300"}, 0x20) 22:26:01 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b200d067000600000007000000"}, 0x20) [ 2018.122797] SELinux: policydb table sizes (24582,196615) do not match mine (6,7) [ 2018.136327] SELinux: policydb version -1308622830 does not match my version range 15-31 [ 2018.453854] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2018.709888] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:03 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x344, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000500"}, 0x20) 22:26:03 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b300d067000600000007000000"}, 0x20) 22:26:03 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc700, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:03 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000700000000", 0x2e}], 0x1}, 0x0) 22:26:03 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6800000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2019.731815] SELinux: policydb version -1291845614 does not match my version range 15-31 22:26:03 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b400d067000600000007000000"}, 0x20) [ 2019.797364] SELinux: policydb table sizes (24582,327687) do not match mine (6,7) 22:26:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000600"}, 0x20) [ 2019.945394] SELinux: policydb version -1275068398 does not match my version range 15-31 22:26:03 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b500d067000600000007000000"}, 0x20) [ 2020.023016] SELinux: policydb table sizes (24582,393223) do not match mine (6,7) 22:26:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000700"}, 0x20) [ 2020.176187] SELinux: policydb version -1258291182 does not match my version range 15-31 22:26:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b600d067000600000007000000"}, 0x20) [ 2020.221399] SELinux: policydb table sizes (24582,458759) do not match mine (6,7) 22:26:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007002000"}, 0x20) [ 2020.341267] SELinux: policydb version -1241513966 does not match my version range 15-31 [ 2020.422504] SELinux: policydb table sizes (24582,2097159) do not match mine (6,7) [ 2020.737429] nla_parse: 4 callbacks suppressed [ 2020.737439] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2020.987960] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2021.245597] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2021.484647] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2021.723532] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2021.971318] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:06 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x345, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b700d067000600000007000000"}, 0x20) 22:26:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007003f00"}, 0x20) 22:26:06 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc701, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:06 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000800000000", 0x2e}], 0x1}, 0x0) 22:26:06 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6c00000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2022.293635] SELinux: policydb table sizes (24582,4128775) do not match mine (6,7) [ 2022.300709] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2022.330976] sel_write_load: 14 callbacks suppressed [ 2022.330982] SELinux: failed to load policy 22:26:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b800d067000600000007000000"}, 0x20) [ 2022.345092] SELinux: policydb version -1224736750 does not match my version range 15-31 [ 2022.354314] SELinux: failed to load policy 22:26:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007004800"}, 0x20) [ 2022.478342] SELinux: policydb version -1207959534 does not match my version range 15-31 [ 2022.493105] SELinux: failed to load policy [ 2022.500539] SELinux: policydb table sizes (24582,4718599) do not match mine (6,7) 22:26:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000b900d067000600000007000000"}, 0x20) [ 2022.537004] SELinux: failed to load policy 22:26:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007004c00"}, 0x20) 22:26:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007006000"}, 0x20) [ 2022.613312] SELinux: policydb version -1191182318 does not match my version range 15-31 [ 2022.635282] SELinux: failed to load policy [ 2022.646850] SELinux: policydb table sizes (24582,4980743) do not match mine (6,7) [ 2022.655306] SELinux: failed to load policy 22:26:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ba00d067000600000007000000"}, 0x20) [ 2022.758713] SELinux: policydb table sizes (24582,6291463) do not match mine (6,7) [ 2022.767795] SELinux: failed to load policy [ 2022.772864] SELinux: policydb version -1174405102 does not match my version range 15-31 [ 2022.782810] SELinux: failed to load policy [ 2022.995678] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2023.341578] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2023.607297] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:08 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x346, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000bb00d067000600000007000000"}, 0x20) 22:26:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007006800"}, 0x20) 22:26:08 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc800, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:08 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7400000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:08 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0000000000000e0800000000", 0x2e}], 0x1}, 0x0) [ 2024.651913] SELinux: policydb table sizes (24582,6815751) do not match mine (6,7) [ 2024.692029] SELinux: failed to load policy [ 2024.699241] SELinux: policydb version -1157627886 does not match my version range 15-31 [ 2024.715438] SELinux: failed to load policy 22:26:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007006c00"}, 0x20) 22:26:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000bc00d067000600000007000000"}, 0x20) 22:26:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007007400"}, 0x20) [ 2024.834718] SELinux: policydb table sizes (24582,7077895) do not match mine (6,7) [ 2024.874162] SELinux: policydb version -1140850670 does not match my version range 15-31 22:26:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000bd00d067000600000007000000"}, 0x20) [ 2024.991894] SELinux: policydb table sizes (24582,7602183) do not match mine (6,7) 22:26:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007007a00"}, 0x20) [ 2025.080843] SELinux: policydb version -1124073454 does not match my version range 15-31 22:26:09 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000be00d067000600000007000000"}, 0x20) [ 2025.295210] SELinux: policydb table sizes (24582,7995399) do not match mine (6,7) [ 2025.336905] SELinux: policydb version -1107296238 does not match my version range 15-31 [ 2025.860348] nla_parse: 5 callbacks suppressed [ 2025.860358] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2026.111091] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2026.363229] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2026.615205] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2026.872025] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2027.134490] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:11 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x347, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:11 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000bf00d067000600000007000000"}, 0x20) 22:26:11 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc801, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:11 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000a00000000", 0x2e}], 0x1}, 0x0) 22:26:11 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7a00000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2027.466725] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2027.477507] SELinux: policydb version -1090519022 does not match my version range 15-31 [ 2027.494227] sel_write_load: 6 callbacks suppressed [ 2027.494232] SELinux: failed to load policy 22:26:11 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c000d067000600000007000000"}, 0x20) [ 2027.522792] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2027.581021] SELinux: failed to load policy 22:26:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2027.640505] SELinux: policydb version -1073741806 does not match my version range 15-31 [ 2027.654667] SELinux: failed to load policy 22:26:11 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c100d067000600000007000000"}, 0x20) 22:26:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2027.728031] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2027.741547] SELinux: failed to load policy [ 2027.864070] SELinux: policydb version -1056964590 does not match my version range 15-31 [ 2027.885016] SELinux: failed to load policy [ 2027.891180] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2027.907492] SELinux: failed to load policy 22:26:11 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c200d067000600000007000000"}, 0x20) 22:26:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2028.088933] SELinux: policydb version -1040187374 does not match my version range 15-31 [ 2028.115206] SELinux: failed to load policy [ 2028.122720] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2028.138656] SELinux: failed to load policy [ 2028.424311] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2028.675800] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2028.908115] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:12 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x348, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c300d067000600000007000000"}, 0x20) 22:26:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2029.211317] SELinux: policydb version -1023410158 does not match my version range 15-31 [ 2029.240246] SELinux: failed to load policy [ 2029.245115] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2029.260542] SELinux: failed to load policy 22:26:13 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc900, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:13 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x922c000000000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:13 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c400d067000600000007000000"}, 0x20) 22:26:13 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:13 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000e00000000", 0x2e}], 0x1}, 0x0) 22:26:13 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2029.800506] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2029.833194] SELinux: policydb version -1006632942 does not match my version range 15-31 22:26:13 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c500d067000600000007000000"}, 0x20) 22:26:13 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c600d067000600000007000000"}, 0x20) [ 2029.937694] SELinux: policydb version -989855726 does not match my version range 15-31 [ 2029.969381] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:13 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2030.020304] SELinux: policydb version -973078510 does not match my version range 15-31 [ 2030.117464] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2031.041930] nla_parse: 6 callbacks suppressed [ 2031.041941] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:15 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x349, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:15 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c700d067000600000007000000"}, 0x20) 22:26:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2031.277701] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2031.357030] SELinux: policydb version -956301294 does not match my version range 15-31 [ 2031.376560] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2031.619968] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2031.881054] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:26:15 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc901, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:15 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c800d067000600000007000000"}, 0x20) 22:26:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:15 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000001f00000000", 0x2e}], 0x1}, 0x0) 22:26:15 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9effffff00000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2032.130733] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:16 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000c900d067000600000007000000"}, 0x20) [ 2032.204348] SELinux: policydb version -939524078 does not match my version range 15-31 [ 2032.237984] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2032.323647] SELinux: policydb version -922746862 does not match my version range 15-31 [ 2032.339963] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:16 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ca00d067000600000007000000"}, 0x20) [ 2032.434994] SELinux: policydb version -905969646 does not match my version range 15-31 [ 2032.444849] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:16 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34a, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:16 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000cb00d067000600000007000000"}, 0x20) 22:26:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2032.698667] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2032.754970] SELinux: policydb version -889192430 does not match my version range 15-31 [ 2032.795045] sel_write_load: 14 callbacks suppressed [ 2032.795049] SELinux: failed to load policy [ 2032.807949] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2032.815620] SELinux: failed to load policy [ 2033.124068] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2033.397143] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2033.635769] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2033.873065] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:26:18 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xca00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000cc00d067000600000007000000"}, 0x20) 22:26:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:18 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0ffffff00000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:18 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34b, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:18 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000002000000000", 0x2e}], 0x1}, 0x0) [ 2034.423790] SELinux: policydb version -872415214 does not match my version range 15-31 [ 2034.457661] SELinux: failed to load policy [ 2034.462568] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000cd00d067000600000007000000"}, 0x20) [ 2034.470624] SELinux: failed to load policy 22:26:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2034.565437] SELinux: policydb version -855637998 does not match my version range 15-31 [ 2034.580048] SELinux: failed to load policy [ 2034.588311] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ce00d067000600000007000000"}, 0x20) [ 2034.620033] SELinux: failed to load policy 22:26:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000cf00d067000600000007000000"}, 0x20) 22:26:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2034.671078] SELinux: policydb version -838860782 does not match my version range 15-31 [ 2034.690765] SELinux: failed to load policy [ 2034.772031] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2034.803497] SELinux: failed to load policy [ 2034.812147] SELinux: policydb version -822083566 does not match my version range 15-31 22:26:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0670006600000077fffff"}, 0x20) [ 2034.829089] SELinux: failed to load policy [ 2034.884965] SELinux: policydb table sizes (24582,-33017) do not match mine (6,7) [ 2034.927135] SELinux: failed to load policy [ 2036.253187] nla_parse: 6 callbacks suppressed [ 2036.253198] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2036.506601] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2036.751512] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:26:20 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xca01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d000d067000600000007000000"}, 0x20) 22:26:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:20 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000003f00000000", 0x2e}], 0x1}, 0x0) 22:26:20 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff7f00000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:20 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34c, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d100d067000600000007000000"}, 0x20) [ 2037.041422] SELinux: policydb version -805306350 does not match my version range 15-31 [ 2037.057437] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2037.066975] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2037.176780] SELinux: policydb version -788529134 does not match my version range 15-31 [ 2037.213540] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:21 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d200d067000600000007000000"}, 0x20) 22:26:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2037.312747] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2037.367488] SELinux: policydb version -771751918 does not match my version range 15-31 22:26:21 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d300d067000600000007000000"}, 0x20) [ 2037.419121] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2037.610415] SELinux: policydb version -754974702 does not match my version range 15-31 [ 2037.884900] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2038.122222] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2038.374341] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2038.610787] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2038.841392] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2039.101476] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:26:23 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xcb00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d400d067000600000007000000"}, 0x20) 22:26:23 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34d, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:23 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffff00000000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:23 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000004000000000", 0x2e}], 0x1}, 0x0) [ 2039.398039] SELinux: policydb version -738197486 does not match my version range 15-31 22:26:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d500d067000600000007000000"}, 0x20) [ 2039.448641] sel_write_load: 8 callbacks suppressed [ 2039.448647] SELinux: failed to load policy [ 2039.462754] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2039.472760] SELinux: failed to load policy 22:26:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2039.550364] SELinux: policydb version -721420270 does not match my version range 15-31 [ 2039.565462] SELinux: failed to load policy 22:26:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d600d067000600000007000000"}, 0x20) [ 2039.622465] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2039.637276] SELinux: failed to load policy 22:26:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2039.681911] SELinux: policydb version -704643054 does not match my version range 15-31 [ 2039.710880] SELinux: failed to load policy [ 2039.720281] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d700d067000600000007000000"}, 0x20) [ 2039.735276] SELinux: failed to load policy 22:26:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2039.831894] SELinux: policydb version -687865838 does not match my version range 15-31 [ 2039.863001] SELinux: failed to load policy [ 2039.868852] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2039.889164] SELinux: failed to load policy 22:26:24 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xcb01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d800d067000600000007000000"}, 0x20) 22:26:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2040.921403] SELinux: policydb version -671088622 does not match my version range 15-31 [ 2040.952345] SELinux: failed to load policy [ 2040.964311] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2040.972303] SELinux: failed to load policy 22:26:25 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34e, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:25 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffff000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:25 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000004800000000", 0x2e}], 0x1}, 0x0) 22:26:25 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000d900d067000600000007000000"}, 0x20) 22:26:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2041.504616] nla_parse: 6 callbacks suppressed [ 2041.504644] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:26:25 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000da00d067000600000007000000"}, 0x20) [ 2041.568092] SELinux: policydb version -654311406 does not match my version range 15-31 [ 2041.589313] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:25 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000db00d067000600000007000000"}, 0x20) 22:26:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2041.685789] SELinux: policydb version -637534190 does not match my version range 15-31 [ 2041.722396] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2041.805477] SELinux: policydb version -620756974 does not match my version range 15-31 [ 2041.855609] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:25 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xcc00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:25 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000dc00d067000600000007000000"}, 0x20) 22:26:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2042.102053] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2042.170868] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2042.196594] SELinux: policydb version -603979758 does not match my version range 15-31 [ 2042.464986] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:26 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34f, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2042.735546] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2042.778342] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:26 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000dd00d067000600000007000000"}, 0x20) 22:26:26 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:26 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000004c00000000", 0x2e}], 0x1}, 0x0) 22:26:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2043.045586] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2043.111263] SELinux: policydb version -587202542 does not match my version range 15-31 [ 2043.146210] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000de00d067000600000007000000"}, 0x20) 22:26:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2043.273575] SELinux: policydb version -570425326 does not match my version range 15-31 22:26:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000df00d067000600000007000000"}, 0x20) [ 2043.325402] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2043.390752] SELinux: policydb version -553648110 does not match my version range 15-31 22:26:27 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xcc01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e000d067000600000007000000"}, 0x20) [ 2043.559947] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2043.632599] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2043.651526] SELinux: policydb version -536870894 does not match my version range 15-31 [ 2043.955438] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2044.190866] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2044.454095] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:28 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x350, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:28 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e100d067000600000007000000"}, 0x20) 22:26:28 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:28 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000025a00000000", 0x2e}], 0x1}, 0x0) [ 2044.713980] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2044.768638] SELinux: policydb version -520093678 does not match my version range 15-31 [ 2044.804643] sel_write_load: 16 callbacks suppressed [ 2044.804648] SELinux: failed to load policy 22:26:28 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e200d067000600000007000000"}, 0x20) [ 2044.828591] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2044.841238] SELinux: failed to load policy 22:26:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000200"}, 0x20) [ 2044.916060] SELinux: policydb version -503316462 does not match my version range 15-31 [ 2044.942208] SELinux: failed to load policy 22:26:28 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e300d067000600000007000000"}, 0x20) [ 2044.989660] SELinux: policydb table sizes (24582,131079) do not match mine (6,7) [ 2045.027509] SELinux: failed to load policy 22:26:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000300"}, 0x20) [ 2045.041125] SELinux: policydb version -486539246 does not match my version range 15-31 [ 2045.050144] SELinux: failed to load policy [ 2045.154474] SELinux: policydb table sizes (24582,196615) do not match mine (6,7) [ 2045.163367] SELinux: failed to load policy 22:26:29 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xcd00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e400d067000600000007000000"}, 0x20) 22:26:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000400"}, 0x20) [ 2045.378863] SELinux: policydb table sizes (24582,262151) do not match mine (6,7) [ 2045.411291] SELinux: failed to load policy [ 2045.416139] SELinux: policydb version -469762030 does not match my version range 15-31 [ 2045.424756] SELinux: failed to load policy [ 2046.710511] nla_parse: 5 callbacks suppressed [ 2046.710522] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:30 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x351, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000500"}, 0x20) 22:26:30 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e500d067000600000007000000"}, 0x20) 22:26:30 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000006000000000", 0x2e}], 0x1}, 0x0) 22:26:30 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xcd01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:30 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2047.023505] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2047.030817] SELinux: policydb version -452984814 does not match my version range 15-31 22:26:30 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e600d067000600000007000000"}, 0x20) [ 2047.066490] SELinux: failed to load policy [ 2047.071663] SELinux: policydb table sizes (24582,327687) do not match mine (6,7) [ 2047.080360] SELinux: failed to load policy 22:26:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000600"}, 0x20) 22:26:31 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e700d067000600000007000000"}, 0x20) [ 2047.174662] SELinux: policydb version -436207598 does not match my version range 15-31 [ 2047.199804] SELinux: policydb table sizes (24582,393223) do not match mine (6,7) 22:26:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000700"}, 0x20) [ 2047.312664] SELinux: policydb table sizes (24582,458759) do not match mine (6,7) [ 2047.333212] SELinux: policydb version -419430382 does not match my version range 15-31 22:26:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007004800"}, 0x20) 22:26:31 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e800d067000600000007000000"}, 0x20) [ 2047.460194] SELinux: policydb table sizes (24582,4718599) do not match mine (6,7) [ 2047.502342] SELinux: policydb version -402653166 does not match my version range 15-31 [ 2047.631691] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2048.018791] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2048.276369] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:32 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x352, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:32 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000e900d067000600000007000000"}, 0x20) 22:26:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007004c00"}, 0x20) [ 2048.504944] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2048.561317] SELinux: policydb version -385875950 does not match my version range 15-31 [ 2048.596972] SELinux: policydb table sizes (24582,4980743) do not match mine (6,7) [ 2048.844912] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:26:32 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000006800000000", 0x2e}], 0x1}, 0x0) 22:26:32 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xce00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:32 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ea00d067000600000007000000"}, 0x20) 22:26:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007006000"}, 0x20) 22:26:32 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2049.098757] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007006800"}, 0x20) 22:26:33 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000eb00d067000600000007000000"}, 0x20) [ 2049.175447] SELinux: policydb version -369098734 does not match my version range 15-31 [ 2049.201298] SELinux: policydb table sizes (24582,6291463) do not match mine (6,7) [ 2049.283289] SELinux: policydb table sizes (24582,6815751) do not match mine (6,7) 22:26:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007006c00"}, 0x20) 22:26:33 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ec00d067000600000007000000"}, 0x20) [ 2049.333820] SELinux: policydb version -352321518 does not match my version range 15-31 [ 2049.393691] SELinux: policydb table sizes (24582,7077895) do not match mine (6,7) [ 2049.453726] SELinux: policydb version -335544302 does not match my version range 15-31 [ 2049.658475] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2049.904080] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:26:34 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x353, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007007400"}, 0x20) 22:26:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ed00d067000600000007000000"}, 0x20) 22:26:34 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2050.732160] SELinux: policydb version -318767086 does not match my version range 15-31 [ 2050.750937] sel_write_load: 14 callbacks suppressed [ 2050.750944] SELinux: failed to load policy [ 2050.764976] SELinux: policydb table sizes (24582,7602183) do not match mine (6,7) [ 2050.781606] SELinux: failed to load policy 22:26:34 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xce01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:34 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000006c00000000", 0x2e}], 0x1}, 0x0) 22:26:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ee00d067000600000007000000"}, 0x20) 22:26:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007007a00"}, 0x20) [ 2051.084174] SELinux: policydb version -301989870 does not match my version range 15-31 [ 2051.109149] SELinux: failed to load policy [ 2051.113855] SELinux: policydb table sizes (24582,7995399) do not match mine (6,7) 22:26:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000ef00d067000600000007000000"}, 0x20) [ 2051.142170] SELinux: failed to load policy 22:26:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000003"}, 0x20) 22:26:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000005"}, 0x20) [ 2051.249449] SELinux: policydb table sizes (24582,50331655) do not match mine (6,7) [ 2051.257996] SELinux: failed to load policy [ 2051.267416] SELinux: policydb version -285212654 does not match my version range 15-31 [ 2051.293066] SELinux: failed to load policy 22:26:35 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f000d067000600000007000000"}, 0x20) [ 2051.326914] SELinux: policydb table sizes (24582,83886087) do not match mine (6,7) [ 2051.335336] SELinux: failed to load policy [ 2051.411815] SELinux: policydb version -268435438 does not match my version range 15-31 [ 2051.425560] SELinux: failed to load policy [ 2051.913124] nla_parse: 5 callbacks suppressed [ 2051.913134] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2052.147049] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2052.397602] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:36 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x354, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000006"}, 0x20) 22:26:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f100d067000600000007000000"}, 0x20) 22:26:36 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2052.627627] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2052.721657] SELinux: policydb version -251658222 does not match my version range 15-31 [ 2052.763110] SELinux: failed to load policy [ 2052.768680] SELinux: policydb table sizes (24582,100663303) do not match mine (6,7) [ 2052.778164] SELinux: failed to load policy [ 2052.992428] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:26:36 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xcf00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:36 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000007400000000", 0x2e}], 0x1}, 0x0) 22:26:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f200d067000600000007000000"}, 0x20) 22:26:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000007"}, 0x20) [ 2053.082112] SELinux: policydb table sizes (24582,117440519) do not match mine (6,7) 22:26:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f300d067000600000007000000"}, 0x20) [ 2053.133044] SELinux: policydb version -234881006 does not match my version range 15-31 22:26:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000020"}, 0x20) [ 2053.274832] SELinux: policydb version -218103790 does not match my version range 15-31 [ 2053.292426] SELinux: policydb table sizes (24582,536870919) do not match mine (6,7) 22:26:37 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f400d067000600000007000000"}, 0x20) 22:26:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000700003f"}, 0x20) [ 2053.522088] SELinux: policydb version -201326574 does not match my version range 15-31 [ 2053.537322] SELinux: policydb table sizes (24582,1056964615) do not match mine (6,7) [ 2053.794189] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2054.040036] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2054.281362] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2054.534546] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2054.784356] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:38 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x355, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:38 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f500d067000600000007000000"}, 0x20) 22:26:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000048"}, 0x20) 22:26:38 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000007a00000000", 0x2e}], 0x1}, 0x0) 22:26:38 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xcf01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:38 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2055.087960] SELinux: policydb table sizes (24582,1207959559) do not match mine (6,7) [ 2055.126540] SELinux: policydb version -184549358 does not match my version range 15-31 22:26:38 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f600d067000600000007000000"}, 0x20) 22:26:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000700004c"}, 0x20) 22:26:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000060"}, 0x20) [ 2055.247775] SELinux: policydb table sizes (24582,1275068423) do not match mine (6,7) [ 2055.280179] SELinux: policydb version -167772142 does not match my version range 15-31 22:26:39 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f700d067000600000007000000"}, 0x20) [ 2055.431093] SELinux: policydb table sizes (24582,1610612743) do not match mine (6,7) 22:26:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000068"}, 0x20) [ 2055.521997] SELinux: policydb version -150994926 does not match my version range 15-31 22:26:39 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f800d067000600000007000000"}, 0x20) [ 2055.653437] SELinux: policydb version -134217710 does not match my version range 15-31 [ 2055.694636] SELinux: policydb table sizes (24582,1744830471) do not match mine (6,7) 22:26:40 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x356, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000f900d067000600000007000000"}, 0x20) 22:26:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000700006c"}, 0x20) [ 2056.716961] SELinux: policydb version -117440494 does not match my version range 15-31 [ 2056.728927] sel_write_load: 14 callbacks suppressed [ 2056.728933] SELinux: failed to load policy [ 2056.756907] SELinux: policydb table sizes (24582,1811939335) do not match mine (6,7) [ 2056.765973] SELinux: failed to load policy [ 2056.996134] nla_parse: 5 callbacks suppressed [ 2056.996149] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:40 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:40 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000fa00d067000600000007000000"}, 0x20) 22:26:40 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00000000ffffff9700000000", 0x2e}], 0x1}, 0x0) 22:26:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000074"}, 0x20) [ 2057.093674] SELinux: policydb version -100663278 does not match my version range 15-31 [ 2057.117539] SELinux: failed to load policy [ 2057.129114] SELinux: policydb table sizes (24582,1946157063) do not match mine (6,7) [ 2057.145702] SELinux: failed to load policy 22:26:41 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000fb00d067000600000007000000"}, 0x20) 22:26:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000700007a"}, 0x20) [ 2057.233661] SELinux: policydb version -83886062 does not match my version range 15-31 [ 2057.265639] SELinux: failed to load policy 22:26:41 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000fc00d067000600000007000000"}, 0x20) [ 2057.277916] SELinux: policydb table sizes (24582,2046820359) do not match mine (6,7) [ 2057.299683] SELinux: failed to load policy 22:26:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2057.374038] SELinux: policydb version -67108846 does not match my version range 15-31 [ 2057.384288] SELinux: failed to load policy [ 2057.473810] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2057.499443] SELinux: failed to load policy [ 2057.674418] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2058.084385] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2058.337434] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2058.567281] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:42 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x357, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:42 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000fd00d067000600000007000000"}, 0x20) 22:26:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2058.821554] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2058.873493] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2058.912839] SELinux: failed to load policy [ 2058.924257] SELinux: policydb version -50331630 does not match my version range 15-31 [ 2058.936392] SELinux: failed to load policy 22:26:43 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:43 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd001, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:43 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00000000ffffff9e00000000", 0x2e}], 0x1}, 0x0) 22:26:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:43 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000fe00d067000600000007000000"}, 0x20) [ 2059.171917] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2059.255726] SELinux: policydb version -33554414 does not match my version range 15-31 [ 2059.293799] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:43 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000201d067000600000007000000"}, 0x20) 22:26:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:43 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000301d067000600000007000000"}, 0x20) [ 2059.404836] SELinux: policydb version 33554450 does not match my version range 15-31 [ 2059.424370] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2059.500582] SELinux: policydb version 50331666 does not match my version range 15-31 [ 2059.618177] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2059.837427] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2060.255551] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2060.514474] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:26:44 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x358, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:44 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000401d067000600000007000000"}, 0x20) 22:26:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:44 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd100, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:44 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9d200000000", 0x2e}], 0x1}, 0x0) 22:26:44 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2061.073561] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2061.105300] SELinux: policydb version 67108882 does not match my version range 15-31 22:26:44 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000501d067000600000007000000"}, 0x20) [ 2061.175771] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2061.223465] SELinux: policydb version 83886098 does not match my version range 15-31 22:26:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000601d067000600000007000000"}, 0x20) [ 2061.328906] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2061.392182] SELinux: policydb version 100663314 does not match my version range 15-31 22:26:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000701d067000600000007000000"}, 0x20) [ 2061.472519] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2061.558207] SELinux: policydb version 117440530 does not match my version range 15-31 [ 2062.092015] nla_parse: 3 callbacks suppressed [ 2062.092025] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2062.352877] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:46 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x359, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:46 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004801d067000600000007000000"}, 0x20) [ 2062.584015] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2062.650919] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2062.670049] sel_write_load: 14 callbacks suppressed [ 2062.670054] SELinux: failed to load policy [ 2062.684804] SELinux: policydb version 1207959570 does not match my version range 15-31 [ 2062.704838] SELinux: failed to load policy [ 2062.951890] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:26:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:47 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd101, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200004c01d067000600000007000000"}, 0x20) 22:26:47 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:47 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9d300000000", 0x2e}], 0x1}, 0x0) [ 2063.217398] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2063.275379] SELinux: policydb version 1275068434 does not match my version range 15-31 [ 2063.296910] SELinux: failed to load policy [ 2063.315618] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006001d067000600000007000000"}, 0x20) [ 2063.323671] SELinux: failed to load policy 22:26:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2063.429136] SELinux: policydb version 1610612754 does not match my version range 15-31 [ 2063.445016] SELinux: failed to load policy [ 2063.454211] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006801d067000600000007000000"}, 0x20) [ 2063.495483] SELinux: failed to load policy 22:26:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2063.582111] SELinux: policydb version 1744830482 does not match my version range 15-31 [ 2063.596804] SELinux: failed to load policy [ 2063.644067] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2063.652488] SELinux: failed to load policy [ 2063.782206] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2064.134029] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2064.392459] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2064.627208] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:48 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x35a, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200006c01d067000600000007000000"}, 0x20) 22:26:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:48 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9d400000000", 0x2e}], 0x1}, 0x0) 22:26:48 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd200, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2064.873998] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:26:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2064.937709] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2064.961740] SELinux: failed to load policy [ 2064.974465] SELinux: policydb version 1811939346 does not match my version range 15-31 [ 2064.983423] SELinux: failed to load policy 22:26:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007401d067000600000007000000"}, 0x20) [ 2065.070079] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2065.099873] SELinux: policydb version 1946157074 does not match my version range 15-31 22:26:49 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200007a01d067000600000007000000"}, 0x20) 22:26:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007007fff"}, 0x20) [ 2065.388570] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2065.402841] SELinux: policydb version 2046820370 does not match my version range 15-31 22:26:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000003d067000600000007000000"}, 0x20) [ 2065.537218] SELinux: policydb table sizes (24582,-8454137) do not match mine (6,7) [ 2065.555413] SELinux: security policydb version 18 (MLS) not backwards compatible 22:26:50 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x35b, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:50 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000009d067000600000007000000"}, 0x20) [ 2066.416749] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2066.439385] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:50 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9d500000000", 0x2e}], 0x1}, 0x0) 22:26:51 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd201, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000000ad067000600000007000000"}, 0x20) 22:26:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:51 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2067.238556] nla_parse: 6 callbacks suppressed [ 2067.238584] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2067.302765] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000020d067000600000007000000"}, 0x20) 22:26:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2067.432732] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000223d067000600000007000000"}, 0x20) [ 2067.516819] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2067.559658] SELinux: policydb version 33554450 does not match my version range 15-31 [ 2067.788012] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2068.047452] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:26:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:52 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x35c, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:52 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000025d067000600000007000000"}, 0x20) [ 2068.299197] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2068.347103] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2068.371130] sel_write_load: 14 callbacks suppressed [ 2068.371136] SELinux: failed to load policy [ 2068.386554] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2068.412302] SELinux: failed to load policy [ 2068.672117] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2068.934071] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:26:53 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9d600000000", 0x2e}], 0x1}, 0x0) 22:26:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000003fd067000600000007000000"}, 0x20) 22:26:53 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:53 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd300, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2069.205026] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2069.280290] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2069.309660] SELinux: failed to load policy [ 2069.321143] SELinux: security policydb version 18 (MLS) not backwards compatible 22:26:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2069.334609] SELinux: failed to load policy 22:26:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000054d067000600000007000000"}, 0x20) [ 2069.400088] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2069.434736] SELinux: failed to load policy 22:26:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2069.455366] SELinux: failed to load policy 22:26:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "12000000020067000600000007000000"}, 0x20) [ 2069.524152] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2069.564296] SELinux: failed to load policy 22:26:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "12000000040067000600000007000000"}, 0x20) [ 2069.592239] SELinux: failed to load policy [ 2069.676797] SELinux: failed to load policy 22:26:53 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x35d, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2069.830007] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2069.898198] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2069.916452] SELinux: failed to load policy [ 2070.275742] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2070.525133] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:26:55 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9d700000000", 0x2e}], 0x1}, 0x0) 22:26:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000002d067000600000007000000"}, 0x20) 22:26:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:55 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x35e, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:55 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:55 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd301, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000003d067000600000007000000"}, 0x20) 22:26:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2071.854416] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000008d067000600000007000000"}, 0x20) [ 2071.967953] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2071.978621] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:26:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000009d067000600000007000000"}, 0x20) 22:26:56 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2072.145344] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2072.233201] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2072.304841] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2072.661890] nla_parse: 5 callbacks suppressed [ 2072.661901] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2072.923410] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2073.176361] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2073.426478] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:26:57 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9d800000000", 0x2e}], 0x1}, 0x0) 22:26:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "120000000ad067000600000007000000"}, 0x20) 22:26:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:57 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x35f, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:57 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd400, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:57 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2073.705100] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2073.725726] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2073.728643] sel_write_load: 8 callbacks suppressed [ 2073.728648] SELinux: failed to load policy [ 2073.765073] SELinux: failed to load policy 22:26:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000010d067000600000007000000"}, 0x20) 22:26:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2073.865470] SELinux: failed to load policy 22:26:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000025d067000600000007000000"}, 0x20) [ 2073.902101] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2073.924831] SELinux: failed to load policy 22:26:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000054d067000600000007000000"}, 0x20) [ 2073.960618] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2073.972573] SELinux: failed to load policy 22:26:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2074.054011] SELinux: failed to load policy 22:26:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "12000000016467000600000007000000"}, 0x20) [ 2074.096430] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2074.119985] SELinux: failed to load policy [ 2074.198579] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2074.223073] SELinux: failed to load policy [ 2074.702673] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2074.960021] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2075.192954] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:26:59 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9d900000000", 0x2e}], 0x1}, 0x0) 22:26:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:26:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067020000000007000000"}, 0x20) [ 2075.432823] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2075.484725] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2075.494240] SELinux: failed to load policy [ 2075.511713] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2075.528285] SELinux: failed to load policy 22:26:59 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x360, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:59 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd401, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2075.792775] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:26:59 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:26:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067040000000007000000"}, 0x20) 22:26:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000002"}, 0x20) [ 2076.159021] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2076.180161] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067020600000007000000"}, 0x20) [ 2076.344846] SELinux: policydb table sizes (24582,33554439) do not match mine (6,7) [ 2076.361464] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000003"}, 0x20) 22:27:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067030600000007000000"}, 0x20) [ 2076.491448] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2076.510598] SELinux: policydb table sizes (24582,50331655) do not match mine (6,7) 22:27:01 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067040600000007000000"}, 0x20) 22:27:01 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000004"}, 0x20) 22:27:01 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9da00000000", 0x2e}], 0x1}, 0x0) [ 2077.667751] nla_parse: 5 callbacks suppressed [ 2077.667763] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2077.724094] SELinux: policydb table sizes (24582,67108871) do not match mine (6,7) [ 2077.757612] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:01 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x361, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:01 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd500, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2078.033824] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:02 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000005"}, 0x20) 22:27:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067050600000007000000"}, 0x20) [ 2078.317648] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2078.375573] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2078.400585] SELinux: policydb table sizes (24582,83886087) do not match mine (6,7) 22:27:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067060600000007000000"}, 0x20) 22:27:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000006"}, 0x20) 22:27:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067070600000007000000"}, 0x20) [ 2078.509356] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000007"}, 0x20) 22:27:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067480600000007000000"}, 0x20) [ 2078.578020] SELinux: policydb table sizes (24582,100663303) do not match mine (6,7) [ 2078.597238] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2078.707898] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2078.726421] sel_write_load: 13 callbacks suppressed [ 2078.726446] SELinux: failed to load policy [ 2078.738704] SELinux: policydb table sizes (24582,117440519) do not match mine (6,7) 22:27:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0674c0600000007000000"}, 0x20) [ 2078.764485] SELinux: failed to load policy [ 2078.812219] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2078.825655] SELinux: failed to load policy [ 2078.963307] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2079.204073] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2079.458969] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2079.705777] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:03 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9db00000000", 0x2e}], 0x1}, 0x0) [ 2079.974935] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:27:04 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x362, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2080.254344] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:27:04 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd501, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000048"}, 0x20) 22:27:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067600600000007000000"}, 0x20) 22:27:04 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2080.540769] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2080.607611] SELinux: policydb table sizes (24582,1207959559) do not match mine (6,7) [ 2080.656485] SELinux: failed to load policy [ 2080.661442] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000700004c"}, 0x20) [ 2080.705182] SELinux: failed to load policy 22:27:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067680600000007000000"}, 0x20) [ 2080.804057] SELinux: policydb table sizes (24582,1275068423) do not match mine (6,7) [ 2080.830353] SELinux: failed to load policy 22:27:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000060"}, 0x20) [ 2080.909239] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2080.929276] SELinux: failed to load policy 22:27:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0676c0600000007000000"}, 0x20) [ 2080.982635] SELinux: policydb table sizes (24582,1610612743) do not match mine (6,7) [ 2081.028796] SELinux: failed to load policy 22:27:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000068"}, 0x20) [ 2081.057688] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2081.073570] SELinux: failed to load policy 22:27:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067740600000007000000"}, 0x20) [ 2081.196777] SELinux: policydb table sizes (24582,1744830471) do not match mine (6,7) [ 2081.205109] SELinux: failed to load policy [ 2081.229860] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:06 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9dc00000000", 0x2e}], 0x1}, 0x0) 22:27:06 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x363, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000700006c"}, 0x20) 22:27:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0677a0600000007000000"}, 0x20) 22:27:06 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd600, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2082.658519] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2082.687116] SELinux: policydb table sizes (24582,1811939335) do not match mine (6,7) 22:27:06 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000900000007000000"}, 0x20) 22:27:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000074"}, 0x20) [ 2082.965477] nla_parse: 6 callbacks suppressed [ 2082.965524] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2083.016349] SELinux: policydb table sizes (24582,1946157063) do not match mine (6,7) 22:27:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000700007a"}, 0x20) [ 2083.057491] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067002000000007000000"}, 0x20) [ 2083.186904] SELinux: policydb table sizes (24582,2046820359) do not match mine (6,7) 22:27:07 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:07 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067005400000007000000"}, 0x20) [ 2083.236133] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2083.334345] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2083.370742] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2083.605749] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2083.853000] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2084.121803] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2084.379178] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:08 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9dd00000000", 0x2e}], 0x1}, 0x0) 22:27:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000800000007000000"}, 0x20) 22:27:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:08 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd601, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:08 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x364, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2084.612211] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2084.683236] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2084.698055] sel_write_load: 9 callbacks suppressed [ 2084.698061] SELinux: failed to load policy [ 2084.716512] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2084.724378] SELinux: failed to load policy 22:27:08 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000900000007000000"}, 0x20) [ 2085.003960] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2085.066646] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2085.099289] SELinux: failed to load policy 22:27:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067001000000007000000"}, 0x20) 22:27:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2085.110200] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2085.124667] SELinux: failed to load policy [ 2085.206836] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2085.233368] SELinux: failed to load policy 22:27:09 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2085.252862] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2085.274736] SELinux: failed to load policy 22:27:09 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067005400000007000000"}, 0x20) [ 2085.325552] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2085.354344] SELinux: failed to load policy [ 2085.439774] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2085.450536] SELinux: failed to load policy [ 2085.708364] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2085.968101] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:10 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9de00000000", 0x2e}], 0x1}, 0x0) 22:27:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000200000000"}, 0x20) 22:27:10 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd700, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2086.245214] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2086.323142] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2086.339848] SELinux: failed to load policy [ 2086.348535] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2086.359720] SELinux: failed to load policy 22:27:10 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x365, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000400000000"}, 0x20) 22:27:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:10 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000003000000"}, 0x20) [ 2086.954018] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2086.972207] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000602000007000000"}, 0x20) [ 2087.111431] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2087.133591] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2087.209578] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2087.262524] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2087.992672] nla_parse: 4 callbacks suppressed [ 2087.992683] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2088.249511] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:12 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9df00000000", 0x2e}], 0x1}, 0x0) 22:27:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000603000007000000"}, 0x20) 22:27:12 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd701, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:12 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:12 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2088.562232] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2088.570650] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2088.598944] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000604000007000000"}, 0x20) [ 2088.714417] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000605000007000000"}, 0x20) [ 2088.764125] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2088.891686] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000606000007000000"}, 0x20) [ 2088.941143] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2089.066489] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2089.277030] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2089.723594] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2089.970810] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2090.218402] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2090.452523] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:27:14 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e000000000", 0x2e}], 0x1}, 0x0) 22:27:14 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000607000007000000"}, 0x20) 22:27:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:14 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd800, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2090.564127] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2090.595105] sel_write_load: 14 callbacks suppressed [ 2090.595111] SELinux: failed to load policy [ 2090.617118] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2090.637623] SELinux: failed to load policy [ 2090.835605] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:14 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000648000007000000"}, 0x20) 22:27:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:14 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:14 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x367, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2091.107403] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:27:15 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700064c000007000000"}, 0x20) [ 2091.181933] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2091.216517] SELinux: failed to load policy [ 2091.221801] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2091.258109] SELinux: failed to load policy [ 2091.288970] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2091.302240] SELinux: failed to load policy 22:27:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:15 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000660000007000000"}, 0x20) [ 2091.412505] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2091.431908] SELinux: failed to load policy [ 2091.448109] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2091.456792] SELinux: failed to load policy 22:27:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2091.559976] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2091.572528] SELinux: failed to load policy [ 2091.759734] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:16 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e100000000", 0x2e}], 0x1}, 0x0) 22:27:16 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000668000007000000"}, 0x20) 22:27:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:16 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd801, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:16 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x368, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:16 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2092.857905] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2092.885665] SELinux: failed to load policy [ 2092.901892] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2092.934114] SELinux: failed to load policy 22:27:16 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700066c000007000000"}, 0x20) 22:27:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:16 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000674000007000000"}, 0x20) [ 2093.048029] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2093.076930] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:17 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700067a000007000000"}, 0x20) [ 2093.161567] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2093.178908] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:17 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2093.253973] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2093.325385] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2093.582613] nla_parse: 4 callbacks suppressed [ 2093.582681] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2093.887626] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2094.137814] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:18 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e200000000", 0x2e}], 0x1}, 0x0) 22:27:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600030007000000"}, 0x20) 22:27:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:18 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:18 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd900, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:18 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x369, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2094.461414] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2094.465860] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2094.492941] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600050007000000"}, 0x20) 22:27:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2094.661581] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2094.682422] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600060007000000"}, 0x20) [ 2094.798648] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2094.899257] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600070007000000"}, 0x20) [ 2095.093384] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2095.130739] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2095.450212] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2095.712912] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2095.950577] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2096.183342] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2096.420994] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2096.689484] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:20 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e300000000", 0x2e}], 0x1}, 0x0) 22:27:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600200007000000"}, 0x20) 22:27:20 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd901, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:20 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x36a, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:20 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2096.996396] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2097.031711] sel_write_load: 14 callbacks suppressed [ 2097.031717] SELinux: failed to load policy [ 2097.054473] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2097.064419] SELinux: failed to load policy 22:27:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600480007000000"}, 0x20) 22:27:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2097.158526] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2097.175802] SELinux: failed to load policy [ 2097.190649] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2097.203710] SELinux: failed to load policy 22:27:21 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006004c0007000000"}, 0x20) [ 2097.332567] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2097.374596] SELinux: failed to load policy [ 2097.379632] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2097.387873] SELinux: failed to load policy 22:27:21 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600600007000000"}, 0x20) [ 2097.484929] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2097.500924] SELinux: failed to load policy [ 2097.508069] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2097.524157] SELinux: failed to load policy 22:27:22 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e400000000", 0x2e}], 0x1}, 0x0) 22:27:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d06700066000000700007f"}, 0x20) 22:27:22 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600680007000000"}, 0x20) 22:27:22 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xda00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:22 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x36b, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:22 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2098.804319] nla_parse: 4 callbacks suppressed [ 2098.804329] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2098.809541] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2098.836492] SELinux: failed to load policy [ 2098.841181] SELinux: policydb table sizes (24582,2130706439) do not match mine (6,7) [ 2098.856468] SELinux: failed to load policy 22:27:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:22 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006006c0007000000"}, 0x20) [ 2098.962742] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2099.011271] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:22 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600740007000000"}, 0x20) 22:27:22 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006007a0007000000"}, 0x20) [ 2099.076923] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2099.104566] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2099.163518] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2099.229701] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2099.457113] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2099.731453] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2099.981943] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2100.218323] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2100.481837] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:24 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00000000ffffffe400000000", 0x2e}], 0x1}, 0x0) 22:27:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000008000000"}, 0x20) 22:27:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:24 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x36c, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:24 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xda01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:24 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2100.786902] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2100.809969] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2100.813622] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000009000000"}, 0x20) 22:27:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2100.934335] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2100.973381] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000010000000"}, 0x20) [ 2101.069071] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2101.136857] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:25 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000020000000"}, 0x20) [ 2101.288084] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2101.324535] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2101.670392] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2101.913915] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2102.152869] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:27:26 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e500000000", 0x2e}], 0x1}, 0x0) 22:27:26 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000054000000"}, 0x20) 22:27:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:26 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x36d, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2102.940380] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2102.961663] sel_write_load: 14 callbacks suppressed [ 2102.961668] SELinux: failed to load policy [ 2102.978650] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2102.995359] SELinux: failed to load policy 22:27:27 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xdb00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:27 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600020007000000"}, 0x20) [ 2103.329421] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2103.361964] SELinux: failed to load policy [ 2103.382019] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2103.389787] SELinux: failed to load policy 22:27:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600030007000000"}, 0x20) 22:27:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600040007000000"}, 0x20) 22:27:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2103.523960] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2103.532716] SELinux: failed to load policy [ 2103.537580] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2103.550249] SELinux: failed to load policy [ 2103.665744] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2103.687138] SELinux: failed to load policy [ 2103.691848] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2103.705268] SELinux: failed to load policy [ 2103.954318] nla_parse: 4 callbacks suppressed [ 2103.954328] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2104.205154] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2104.443720] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2104.703281] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2104.938534] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:29 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e600000000", 0x2e}], 0x1}, 0x0) 22:27:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600050007000000"}, 0x20) 22:27:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:29 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2105.200910] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2105.265238] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2105.274669] SELinux: failed to load policy [ 2105.284280] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2105.298327] SELinux: failed to load policy 22:27:29 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xdb01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:29 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x36e, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600060007000000"}, 0x20) [ 2105.582587] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2105.657137] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2105.674589] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600070007000000"}, 0x20) 22:27:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600480007000000"}, 0x20) [ 2105.807512] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2105.830255] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2105.977639] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2106.043487] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2106.306631] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:30 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e700000000", 0x2e}], 0x1}, 0x0) 22:27:30 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006004c0007000000"}, 0x20) 22:27:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2106.569171] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2106.631187] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2106.649998] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2106.929449] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:27:31 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:31 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xdc00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:31 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600600007000000"}, 0x20) 22:27:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:27:31 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x36f, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2107.763506] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2107.797269] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:31 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600680007000000"}, 0x20) [ 2107.858555] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x2) [ 2107.943162] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2107.967877] sel_write_load: 11 callbacks suppressed [ 2107.967883] SELinux: failed to load policy 22:27:31 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006006c0007000000"}, 0x20) [ 2108.006823] SELinux: failed to load policy [ 2108.058517] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2108.066935] SELinux: failed to load policy 22:27:32 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e800000000", 0x2e}], 0x1}, 0x0) 22:27:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x3) 22:27:32 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600740007000000"}, 0x20) [ 2108.322074] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2108.362874] SELinux: failed to load policy [ 2108.371467] SELinux: failed to load policy [ 2109.130213] nla_parse: 6 callbacks suppressed [ 2109.130222] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:33 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2109.374880] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2109.648738] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:27:33 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xdc01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:33 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006007a0007000000"}, 0x20) 22:27:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x4) 22:27:33 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x370, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2109.894848] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2109.951863] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2109.972622] SELinux: failed to load policy [ 2109.984412] SELinux: failed to load policy 22:27:33 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000307000000"}, 0x20) 22:27:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x5) 22:27:33 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000507000000"}, 0x20) [ 2110.125223] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2110.144750] SELinux: failed to load policy [ 2110.150275] SELinux: failed to load policy 22:27:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x6) [ 2110.223133] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2110.254268] SELinux: failed to load policy 22:27:34 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9e900000000", 0x2e}], 0x1}, 0x0) 22:27:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000607000000"}, 0x20) 22:27:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x7) [ 2110.464197] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2110.537814] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2110.854272] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2111.103217] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2111.374474] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:35 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000707000000"}, 0x20) 22:27:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x8) 22:27:35 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:35 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x371, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:35 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xdd00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2111.638658] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:35 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600002007000000"}, 0x20) 22:27:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x9) [ 2111.731007] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2111.762931] SELinux: truncated policydb string identifier 22:27:35 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600004807000000"}, 0x20) 22:27:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0xa) [ 2111.869196] SELinux: truncated policydb string identifier [ 2111.892440] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2111.996359] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2112.012357] SELinux: truncated policydb string identifier 22:27:36 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9ea00000000", 0x2e}], 0x1}, 0x0) 22:27:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600004c07000000"}, 0x20) 22:27:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0xb) [ 2112.212546] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:27:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0xc) [ 2112.281835] SELinux: truncated policydb string identifier [ 2112.309860] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600006007000000"}, 0x20) [ 2112.412965] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2112.469704] SELinux: truncated policydb string identifier 22:27:37 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:37 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x372, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:37 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600006807000000"}, 0x20) 22:27:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0xd) 22:27:37 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xdd01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:37 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9eb00000000", 0x2e}], 0x1}, 0x0) [ 2113.873742] SELinux: truncated policydb string identifier [ 2113.895173] sel_write_load: 13 callbacks suppressed [ 2113.895179] SELinux: failed to load policy [ 2113.913321] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0xe) [ 2113.923234] SELinux: failed to load policy 22:27:37 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600006c07000000"}, 0x20) [ 2114.025624] SELinux: truncated policydb string identifier [ 2114.033117] SELinux: failed to load policy [ 2114.047336] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2114.066460] SELinux: failed to load policy 22:27:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0xf) 22:27:37 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600007407000000"}, 0x20) 22:27:38 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600007a07000000"}, 0x20) [ 2114.217419] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2114.230162] SELinux: failed to load policy [ 2114.235035] SELinux: truncated policydb string identifier [ 2114.245353] SELinux: failed to load policy 22:27:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x10) [ 2114.324909] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2114.343278] SELinux: failed to load policy [ 2114.382778] SELinux: failed to load policy [ 2114.473154] nla_parse: 5 callbacks suppressed [ 2114.473182] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2114.734654] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2114.977361] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2115.237581] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:39 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:39 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000200000000"}, 0x20) 22:27:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x11) 22:27:39 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x373, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2115.508279] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2115.605314] SELinux: failed to load policy [ 2115.626198] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2115.646420] SELinux: failed to load policy [ 2115.882476] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2116.167043] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:27:40 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xde00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x12) 22:27:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000400000000"}, 0x20) 22:27:40 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9ec00000000", 0x2e}], 0x1}, 0x0) [ 2116.271274] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x13) 22:27:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000003000000"}, 0x20) 22:27:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x14) 22:27:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000207000000"}, 0x20) [ 2116.478862] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2116.620514] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2116.812811] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2117.068611] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2117.309689] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:27:41 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x15) 22:27:41 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000307000000"}, 0x20) 22:27:41 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9ed00000000", 0x2e}], 0x1}, 0x0) 22:27:41 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xde01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:41 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x374, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2118.113591] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:42 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000407000000"}, 0x20) 22:27:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x16) [ 2118.253466] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:42 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000507000000"}, 0x20) 22:27:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x17) [ 2118.446639] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:42 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000607000000"}, 0x20) 22:27:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x18) [ 2118.625952] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2119.650183] nla_parse: 6 callbacks suppressed [ 2119.650195] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2119.901594] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2120.172078] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2120.446803] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:44 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x19) 22:27:44 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000707000000"}, 0x20) 22:27:44 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xdf00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:44 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x375, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:44 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000002a9ee00000000", 0x2e}], 0x1}, 0x0) [ 2120.759666] sel_write_load: 15 callbacks suppressed [ 2120.759673] SELinux: failed to load policy [ 2120.768135] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2120.793562] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x1a) [ 2120.821859] SELinux: failed to load policy 22:27:44 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600004807000000"}, 0x20) [ 2120.891081] SELinux: failed to load policy 22:27:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x1b) [ 2120.964920] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2120.982940] SELinux: failed to load policy 22:27:44 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600004c07000000"}, 0x20) [ 2121.082681] SELinux: failed to load policy 22:27:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x1c) [ 2121.123789] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2121.179548] SELinux: failed to load policy 22:27:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600006007000000"}, 0x20) [ 2121.339180] SELinux: failed to load policy [ 2121.389562] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2121.413551] SELinux: failed to load policy [ 2121.764299] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2122.027766] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2122.288792] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:46 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600006807000000"}, 0x20) 22:27:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x1d) 22:27:46 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:46 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xdf01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2122.522150] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2122.596665] SELinux: failed to load policy [ 2122.620044] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2122.634023] SELinux: failed to load policy 22:27:46 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x376, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:46 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00000000fffffff000000000", 0x2e}], 0x1}, 0x0) 22:27:46 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600006c07000000"}, 0x20) 22:27:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x1e) [ 2122.897548] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2122.986659] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x25) 22:27:46 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600007407000000"}, 0x20) 22:27:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600007a07000000"}, 0x20) [ 2123.154197] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2123.164088] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x2e) 22:27:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x2f) [ 2123.284271] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2123.303275] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000009000000"}, 0x20) [ 2123.403977] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2123.501553] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:48 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x50) 22:27:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000020000000"}, 0x20) [ 2124.688163] nla_parse: 4 callbacks suppressed [ 2124.688173] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2124.759964] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2124.793883] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:48 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00000000fffffffd00000000", 0x2e}], 0x1}, 0x0) 22:27:48 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:48 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x377, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x60) 22:27:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000054000000"}, 0x20) [ 2125.025433] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000003000000"}, 0x20) [ 2125.090130] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2125.125250] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:27:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x4000000) 22:27:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000008000000"}, 0x20) [ 2125.186605] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000009000000"}, 0x20) [ 2125.282416] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2125.603860] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2125.882930] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2126.257196] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2126.504239] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2126.749106] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:50 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:50 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000010000000"}, 0x20) 22:27:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x200003a0) [ 2126.989709] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2127.038210] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2127.075289] sel_write_load: 15 callbacks suppressed [ 2127.075296] SELinux: failed to load policy [ 2127.368392] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:51 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0000000000000fff00000000", 0x2e}], 0x1}, 0x0) 22:27:51 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0x9, 0x10000, 0x3f, 0x9}, 0x10) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2127.634607] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2127.689177] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2127.714716] SELinux: failed to load policy 22:27:51 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x378, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000054000000"}, 0x20) 22:27:51 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe001, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x20) [ 2127.965565] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007020000"}, 0x20) [ 2128.034925] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2128.053252] SELinux: failed to load policy [ 2128.062477] SELinux: policydb string SE L does not match my string SE Linux [ 2128.076322] SELinux: failed to load policy 22:27:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2128.132654] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2128.162691] SELinux: failed to load policy 22:27:52 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007030000"}, 0x20) [ 2128.191890] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2128.211866] SELinux: failed to load policy [ 2128.254310] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2128.269256] SELinux: failed to load policy 22:27:52 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xfa) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1716, 0x602c9e28}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r3, 0xd00, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x339}, 0x1, 0x0, 0x0, 0x4000001}, 0x8000) 22:27:52 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007040000"}, 0x20) [ 2128.527710] SELinux: policydb magic number 0xfd7cff8c does not match expected magic number 0xf97cff8c [ 2128.541969] SELinux: failed to load policy [ 2128.553803] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2128.573278] SELinux: failed to load policy [ 2128.589452] tls_set_device_offload_rx: netdev lo with no TLS offload [ 2129.328925] SELinux: policydb magic number 0xfd7cff8c does not match expected magic number 0xf97cff8c [ 2129.346668] SELinux: failed to load policy [ 2129.361617] tls_set_device_offload_rx: netdev lo with no TLS offload 22:27:53 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000007fffffff00000000", 0x2e}], 0x1}, 0x0) 22:27:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007050000"}, 0x20) 22:27:53 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x379, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2129.723637] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007060000"}, 0x20) [ 2129.824166] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2130.024544] nla_parse: 5 callbacks suppressed [ 2130.024554] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2130.300549] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:27:54 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe100, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:54 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007070000"}, 0x20) 22:27:54 executing program 0: syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1ff, 0x1) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x40, 'SE Linux', '\x00'}, 0xffffffffffffff17) r1 = fcntl$getown(r0, 0x9) ptrace$setregset(0x4205, r1, 0x1, &(0x7f00000000c0)={&(0x7f0000000000)="2838ba009944ebe6cbb6e0f839c8b9cdec0f3a5dcdcaa5de51916402e7f4395605843bad28c021e64f1ac5fe147b8ae6eb0444219e61745d8938c08df58bc8bc6190a7011d520bf7d68954e8fa57ebad3ac1fa955ec7e175dc29486b781fcb493eb0d54119576b968979117b31997c9b089be471fcc92fec7cd794cbdf408923fb9e83ecdedccd2e0027211d7a26b7a2fb3fedf4892621a99f5c1adb7618a566f510f98f5bb6fab9cbc4580c4c0cb474971ecc", 0xb3}) [ 2130.407429] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:54 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007480000"}, 0x20) 22:27:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c000000001200000000d067000660000007000000"], 0x20) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x696180, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000180)={0x6, 0x4, {0x57, 0x5, 0x5, {0x5a6, 0x6}, {0xe84, 0x9}, @cond=[{0x8, 0x0, 0x8, 0x80000000, 0x6e, 0x57}, {0x3, 0x6a529745, 0xa6fa, 0x1ff, 0x0, 0x4}]}, {0x57, 0x10000, 0x0, {0xf97, 0xa6d}, {0x401, 0x3}, @period={0x5d, 0x6c, 0xb3, 0x7, 0x800, {0x8, 0x100000000, 0x101, 0x1}, 0x5, &(0x7f0000000100)=[0xfffffffffffffff8, 0x9, 0x0, 0x401, 0x1]}}}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xdd4, 0x20, 0xf, 0x7}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x1, 0x204, 0x1000, 0x9, r2}, 0x10) [ 2130.548788] SELinux: policydb string SE L does not match my string SE Linux [ 2130.557625] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2130.576910] SELinux: policydb string SE L does not match my string SE Linux [ 2130.802552] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:27:54 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:54 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006000000074c0000"}, 0x20) 22:27:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYRES16=0x0, @ANYBLOB="75fd4c8a530ade862c37cd6850b7200e4001a27c81f67e0ad143ca5f72ee55d438ca98ab1cb96ef4b3574a39a5d2e5de45d51b271c1bbadd", @ANYPTR64, @ANYRESHEX=0x0, @ANYRES16=r0, @ANYRESHEX=r0, @ANYBLOB="443d816d4c0cf7e5426691e4500000213a09c72fd627e58efdffffff7fe2b415390000ad3c4c"], 0x8e) [ 2130.887514] SELinux: policydb magic number 0xfd750000 does not match expected magic number 0xf97cff8c [ 2130.911603] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2131.183999] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2131.462694] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2131.721568] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:55 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00000000ffffffff00000000", 0x2e}], 0x1}, 0x0) 22:27:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf90800000075781200000000d067000660000007000000000000000000"], 0x20) 22:27:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007600000"}, 0x20) 22:27:55 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x37a, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:55 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe101, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2131.991485] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2132.068004] SELinux: policydb string ux does not match my string SE Linux [ 2132.091150] sel_write_load: 8 callbacks suppressed [ 2132.091156] SELinux: failed to load policy [ 2132.104180] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "1200ff06600000070000000000000000"}, 0x20) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) timerfd_gettime(r1, &(0x7f0000000040)) socket$l2tp(0x18, 0x1, 0x1) [ 2132.116384] SELinux: failed to load policy 22:27:56 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007680000"}, 0x20) [ 2132.201236] SELinux: policydb version 117374994 does not match my version range 15-31 [ 2132.215830] SELinux: failed to load policy [ 2132.224344] SELinux: policydb version 117374994 does not match my version range 15-31 [ 2132.242230] SELinux: failed to load policy 22:27:56 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x20000) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000040)=""/34) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf908000000530000d06700066000000700"/32], 0x20) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000180)=""/175, &(0x7f0000000240)=0xaf) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000280)) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000100)={0x0, 0x3ff, 0x197f4e35, 0x80000, r1}) fsetxattr(r1, &(0x7f0000000080)=@random={'security.', ',]vmnet0trustedmd5sum&cgroup(-\\\x00'}, &(0x7f00000000c0)='/dev/usbmon#\x00', 0xd, 0x2) [ 2132.260236] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2132.285232] SELinux: failed to load policy 22:27:56 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006000000076c0000"}, 0x20) [ 2132.317178] SELinux: policydb string S does not match my string SE Linux [ 2132.329828] SELinux: failed to load policy [ 2132.353786] SELinux: policydb string S does not match my string SE Linux [ 2132.380824] SELinux: failed to load policy [ 2132.394960] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2132.403403] SELinux: failed to load policy 22:27:56 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:56 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007740000"}, 0x20) 22:27:56 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x200, 0x70bd27, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) clock_gettime(0xfffffffffffffffc, &(0x7f00000003c0)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000000280)=[{0x6, 0xf9, 0x9, 0x4, @time, {0x8, 0x80000000}, {0x80000000, 0xfff}, @control={0x4, 0x5}}, {0x5, 0x1, 0x0, 0x3, @time, {0x2, 0x7}, {0x7, 0x2}, @quote={{0x1, 0xed2}, 0x100000000, &(0x7f0000000240)={0x5, 0x20, 0xffff, 0x200, @time={0x77359400}, {0x5, 0x9}, {0x10000, 0xfff}, @quote={{0x4788, 0xcbb}, 0x1, &(0x7f0000000200)={0x6, 0x3, 0x6, 0x2, @time={r3, r4+10000000}, {0x1, 0x6}, {0x67f, 0x7f}, @addr={0xfffffffffffffffd, 0x5}}}}}}, {0x400, 0x8, 0x80000000, 0x9bf1, @tick=0x1ff, {0x6, 0x9}, {0x0, 0x8}, @addr={0x100000000, 0xd42e}}], 0x90) write$selinux_load(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf90800000053452000000000781200000000d067000660000007000000"], 0x20) [ 2132.601155] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2132.672821] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2132.686162] SELinux: failed to load policy [ 2132.712858] SELinux: policydb string SE does not match my string SE Linux [ 2132.734664] SELinux: failed to load policy [ 2133.004169] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2133.293541] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2133.473359] SELinux: policydb string SE does not match my string SE Linux 22:27:57 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00004087ffffffff00000000", 0x2e}], 0x1}, 0x0) 22:27:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006000000077a0000"}, 0x20) 22:27:57 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x37b, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:57 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe200, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2133.644924] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000300"}, 0x20) 22:27:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000500"}, 0x20) [ 2133.762128] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000600"}, 0x20) [ 2133.839456] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000700"}, 0x20) [ 2133.912192] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007002000"}, 0x20) [ 2133.980485] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2134.041593] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:57 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007004800"}, 0x20) 22:27:58 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0610000000001ea000001000051652d39"}, 0x26) [ 2134.214438] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2134.336110] SELinux: policydb table sizes (16777216,16777450) do not match mine (6,7) 22:27:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007004c00"}, 0x20) 22:27:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200, 0x0) bind$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xd4, r2, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xae}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1b6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6e88}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400080, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000040)=0x69) write$binfmt_misc(r1, &(0x7f00000003c0)={'syz0', "0863ee03ea313e3daab9b5efede8b33096471f2992e754dc9d0ee6bede3be5f5a7025a03a605d2eb52cd88bc00dfa8ed6ef182af537e6ca76a4532601e73871798d0e471023755e8e567ab605bf5e23d6169a7f59e44980816946661a59214b484fd93fa9127fade9804ec08e4e3ffc67efef71b961e4d0eaa10d5a789417909e40c4ac8452531936d8fc72d7118f66af0f64095790d3c98a425"}, 0x9e) 22:27:59 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00f0ffffffffffff00000000", 0x2e}], 0x1}, 0x0) [ 2135.174535] nla_parse: 4 callbacks suppressed [ 2135.174545] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2135.232796] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2135.253145] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2135.518201] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2135.793935] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:27:59 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x37c, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:59 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe201, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:59 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:27:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007006000"}, 0x20) [ 2135.851680] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2135.918683] SELinux: security policydb version 18 (MLS) not backwards compatible 22:27:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007006800"}, 0x20) 22:27:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007006c00"}, 0x20) [ 2136.092536] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007007400"}, 0x20) [ 2136.221405] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007007a00"}, 0x20) [ 2136.310680] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2136.384531] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2136.473100] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2136.519574] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:00 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x9, 0x0) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x857, 0x83, 0x9, 0x4, 0x200, 0x3, 0x6, 0x3ff, 0xb4, 0x38, 0x276, 0x7fff, 0x100, 0x20, 0x2, 0x4, 0xeb00, 0x7}, [{0x6474e551, 0x4, 0x6, 0x263, 0xffffffff00000000, 0x5, 0x0, 0x6}, {0x5, 0x8, 0x7ff, 0x5, 0x2, 0x7fffffff, 0x5, 0x6}], "09fb091c45f91277789f4366bc4a6c0bbbc294c4e8a44a15f014a5645a9908e13d75aa7ea5aef89df413c2c507c842aed5b70e42d7132a72258001d4ade5a018c9a104fcf2b00c98c1d3aa15fca3c0f9d96041474c5663a78bb9f77f0a30d5f96a25590f1b46da4bc7d693e1567b51b6", [[], [], [], [], [], [], [], []]}, 0x8e8) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2136.624371] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2136.698259] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2136.970246] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2137.232666] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2137.473832] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:28:01 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000200"/46, 0x2e}], 0x1}, 0x0) 22:28:01 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2137.721497] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2137.792566] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2137.817211] sel_write_load: 20 callbacks suppressed [ 2137.817217] SELinux: failed to load policy [ 2138.045392] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:28:02 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe300, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) getresuid(&(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x100000001, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="3d867a088281c63e0fbff119760708caa1a53323ab317e9253abbfe394cbbb4351b36a9fecbfda60ca699a064592505433ea01484eb660f6e4bd4cdb4031a10a8797425a5953c999fd7aba8fa7a51997197850ac66919d3d54526b13a07a4d47912f6d710e750ff32a96596fe30fe428b856bd934c4c792597e63a531ab38d6017421e1237265b7ff255", 0x8a, 0x4}, {&(0x7f00000003c0)="f25da234c1014f0958d69944d1675ef4e0ef008c265eb74111a6f4fa56cbb495758c06a944ca4bf901a5ef8fd57f66cd7746c94a6ac40df87a8d5fe5c2964dd92950bb3d19fe3c7ebd9336d1ba2d4ef86c1f39adc89781a3d02e4678bd78b28530414fd8bef82cc25dc3eaf691a9b05ece673299499d5ac22942739f2c601c33ea81eb1b972993fa97d90d71a36db5662a8285c0b67a6f2580b06a739843bf704a2bd8ad39ff3e2451ef9b346ffe9a8b2d76aee23783099b1c2a6ae5d3296f4fa10358dda9c1a4bbdf5f05309384fa7c6deca424c306e66a50b9cf3fa2ac53edb1", 0xe1, 0x101}, {&(0x7f00000004c0)="febc4d1090ec56ecbd0355478342dce04ccb9253d1c7d48d8a1df2e8f044dafa46e7450b47813b8b66837237accdae07ce3738e52923fca932af61de6df91825d0671fd6cc89425b2c1e73e5ce48ecb2b18751a9297bc91b06c324cb065445d1f006707b8ecce35926b4a73f574c99036d819890c12f4ee7", 0x78, 0xa6e}], 0x20c4, &(0x7f00000008c0)=ANY=[@ANYBLOB='nnonumtail=1,utf8=0,shortname=winnt,dos1xfloppy,utf8=1,uid<', @ANYRESDEC=r1, @ANYBLOB="2c7375626a5f726f6c653d73797374656d657468305d29402e76626f786e65743070707031a5626465765c6c6f6d643573756d656d312b757365725c2c6d61736b3d4d41595f57524954452c7569643d", @ANYRESDEC=r2, @ANYBLOB="2c6673636f6e746578743d73746166665f75c4e161736b3d5e4d61595f524541442c7375626a5f747970653d0c00b28e2fbd910da2437bed9f3a74634c2c408fb8217e6d9cda680a2ee6dee68ce56afe6aa2eb01dc25bfd2e8f1f821af8bff38c2a74984807658906db7a7bf540803528808df4b478e2346d6a77898987db5823fcc6515b2c06c99db522c5c501725e7a78d5d802a868ee8b6f748b02232473fe9f785a21f4f73974e920941000000"]) getsockname(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000080)=0x80) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='trusted\x00', 0x8, 0x1) 22:28:02 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x37d, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:02 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2138.321968] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2138.398231] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2138.445830] SELinux: failed to load policy [ 2138.456675] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2138.464638] SELinux: failed to load policy 22:28:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2138.550806] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2138.565654] SELinux: failed to load policy [ 2138.576480] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2138.585738] SELinux: failed to load policy 22:28:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) socket$can_bcm(0x1d, 0x2, 0x2) [ 2138.728487] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2138.750496] SELinux: failed to load policy [ 2138.763087] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2138.779173] SELinux: failed to load policy 22:28:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2138.834686] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2138.856311] SELinux: failed to load policy [ 2138.947859] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2138.955778] SELinux: failed to load policy [ 2139.041118] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2139.055003] SELinux: failed to load policy 22:28:03 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000300"/46, 0x2e}], 0x1}, 0x0) 22:28:03 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:03 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x2b, 0x6, 0x0, {0x6, 0x0, 0x2, 0x0, '^^'}}, 0x2b) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0x0, 0x1, 0x1, 0x1, 0x200}, 0x5, 0x7ff, 0x1}) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:03 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe301, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2140.203608] QAT: Invalid ioctl [ 2140.207591] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2140.228595] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2140.245092] QAT: Invalid ioctl [ 2140.252446] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:04 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2140.498886] nla_parse: 5 callbacks suppressed [ 2140.498897] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2140.570791] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:04 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2140.824264] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2140.896697] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2140.930561] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf96dfeffff5345204c696e75781200000000d0670006600000070000005992ab760db5fe071adcb808014af5d76d2727b22cffa30848317b524456efdb33e50f04d9fdc01bda5996cf0b5eb8e67a95f924f845140fe7985796fe6bf2ee0f980b910a001f62c4f7b7f1698024121a814b51fed575bb8c21669510d767e025058e654367e9864585b6bd38d8d67cc5e877aa10617328e8407409b5c6558fcdbb55bf9b435b2a5fd7a007d8a07e2dda4ee7863dc9dd361378f38357819c1204ed24547e4bb066ccea"], 0xd0) [ 2141.040060] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2141.063669] SELinux: policydb string length -403 does not match expected length 8 22:28:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2141.155763] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2141.387541] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:28:05 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000400"/46, 0x2e}], 0x1}, 0x0) 22:28:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xe41c0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x0, 0x6, 0x8, 0x8000}, {0x100000000, 0x5f, 0x0, 0x7}]}, 0x10) ioctl$TIOCSIG(r1, 0x40045436, 0x3e) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000000d067000660000007000000bd297ebfdfaa6e755b1ff5036bdb36dedbff663cc8c582234e8b97e95fc3cad62e05318438579af05c54b210f841e3a8513aa3db8209e846c19703cff99d5b1e8b5ce777d821aa146c1d5f463c11185736494a6ad89bd306608e9bc7a909bd6d3095a23ad17cf8759fb03b9780a14c955eb11b80d759a65f6473800efb"], 0x20) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 22:28:05 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:05 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe400, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2141.653093] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2141.694843] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2141.729834] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2141.758769] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2142.042444] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:28:05 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x37f, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:05 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2142.137185] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2142.370590] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:28:06 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:06 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x181040, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0670006000000077fffff"}, 0x20) [ 2142.625487] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:28:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2142.693819] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2142.705476] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0xfffffffffffffe26) [ 2142.784003] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2142.833425] sel_write_load: 15 callbacks suppressed [ 2142.833430] SELinux: failed to load policy 22:28:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x200, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x12) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x6, 0x8001}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000007000000e6bb3f75919dc28733dcd9b7ec80b5863b10f577d8749e73825c00c66672d02196d4acdddd53843f53191fe1f926a448be07bc6fa93135c762b0acf754e60fbbe7d070a36b19c044e99e2ff1faa1aa59598eb38733ca861905bba931c66ec2935e1b029dc571b03b31eec4653753db136fb5339ff7dac0d298d0e1dc34052de383bc0feb3eeccadcce5605e24b644a1b894ce4c7b4fe9b927473686ad4b2851a4b9c3094"], 0x20) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @remote}}, 0x52fd665a, 0x2}, &(0x7f0000000100)=0x90) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f00000002c0)) rt_sigpending(&(0x7f0000000380), 0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000240)={r4, 0x1000}, &(0x7f0000000280)=0x8) [ 2142.999084] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2143.011856] SELinux: failed to load policy [ 2143.023501] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2143.041408] SELinux: failed to load policy [ 2143.113090] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:28:07 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000500"/46, 0x2e}], 0x1}, 0x0) 22:28:07 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:07 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) getsockname(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:07 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe401, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2143.380681] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2143.465602] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2143.495563] SELinux: failed to load policy [ 2143.574665] erofs: read_super, device -> /dev/loop0 [ 2143.614908] erofs: options -> [ 2143.624333] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2143.631181] erofs: cannot find valid erofs superblock [ 2143.654689] SELinux: failed to load policy 22:28:07 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:07 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x380, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2143.854071] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2143.910382] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2143.946346] SELinux: failed to load policy 22:28:08 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf90800bbe85345204c686e7578097d8b5346000000d06700"], 0x20) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0x1, 0x7, 0x800}) 22:28:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:08 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe500, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2144.831244] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2144.860992] SELinux: failed to load policy 22:28:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2144.873684] SELinux: policydb string length -390397944 does not match expected length 8 [ 2144.889787] SELinux: failed to load policy [ 2144.903115] SELinux: policydb string length -390397944 does not match expected length 8 [ 2144.913056] SELinux: failed to load policy 22:28:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2144.967053] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2144.976865] SELinux: failed to load policy [ 2145.005475] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:09 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000600"/46, 0x2e}], 0x1}, 0x0) 22:28:09 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:09 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$RTC_UIE_ON(r1, 0x7003) 22:28:09 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2145.339669] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2145.368317] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2145.378606] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:09 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, @dev, @loopback}, &(0x7f00000004c0)=0xc) sendmsg$inet(r1, &(0x7f0000000580)={&(0x7f0000000300)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000340), 0x0, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6000000000000000}}, @ip_retopts={{0x28, 0x0, 0x7, {[@end, @end, @noop, @noop, @cipso={0x86, 0x11, 0x9, [{0x7, 0xb, "7bcd18204b7753a671"}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @dev={0xac, 0x14, 0x14, 0x23}}}}], 0x60}, 0x10) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x200000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000180), 0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) r4 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, r4) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="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") fallocate(r0, 0x8, 0x4, 0x4) write$selinux_load(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000000fcac90b80154ee0a7f68ce69f10f5f8663af9ec7842b5558969d9a00000f55325bd409353426d0220b0000000007000000"], 0x20) [ 2154.803611] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2154.824920] SELinux: failed to load policy [ 2154.835420] SELinux: policydb table sizes (-296484424,-832012534) do not match mine (6,7) 22:28:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000003"}, 0x20) [ 2154.858517] SELinux: failed to load policy 22:28:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x2800) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000040)) [ 2154.912012] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2154.929362] SELinux: failed to load policy [ 2154.988308] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2155.012712] SELinux: failed to load policy 22:28:19 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x386, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:19 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000005"}, 0x20) [ 2155.501135] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:19 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac001000"/46, 0x2e}], 0x1}, 0x0) 22:28:19 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/188) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES32, @ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESHEX=r1, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="b7a96fa95d64f89c2a797f11d6eaab01c105cc666dd97541b5b5cb33eddb04caf893529c1b6896b66dfe57fcb4090ef65b263bcda67644ba2feda35d04e1620cbdeadf0243146fe0a9a619433e8710ad89d6bd", @ANYRES64=r0]]], 0xd9678662639fd8a3) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x12400, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000180)=0x4) 22:28:19 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000006"}, 0x20) [ 2155.805770] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2155.964088] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2156.163045] nla_parse: 5 callbacks suppressed [ 2156.163056] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:28:20 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000007"}, 0x20) [ 2156.443942] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2156.494844] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2156.813507] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:28:20 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe800, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000020"}, 0x20) 22:28:20 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x387, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2157.108338] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2157.173465] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2157.206984] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:21 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000048"}, 0x20) 22:28:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf97cdf2660080900005345204c696e75781200000000d0670006600000332dfcff3d3c244b72a1e85c784ba512d2800d139b45c478fcf9dc7b8d4e45c6dcdecca18a942f3976a0de9a74ee97b2d6086a08cc7022eaf2335e185b9a13d3f434af1c0406a62110eba8e0dd93f7d2463b4e440ccba08710d4b4822e4f0b6b3d7698085a569ad315e6963aae177655440fcff0f6d10e8532cc3e3ffcef01cc89d11860843435d6ca85a13c5a04b46b959bfaf7c236dfc8293579a4e2b6d383462f30d6845d853be5d115be4526a2e4dfc2ac7062e76c003dd1c71f036d3b54b757f52596658a5a63"], 0x20) [ 2157.357503] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2157.381265] SELinux: policydb string length 1613160316 does not match expected length 8 [ 2157.604182] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2157.877653] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:28:21 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700060000000700004c"}, 0x20) 22:28:21 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac004800"/46, 0x2e}], 0x1}, 0x0) 22:28:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005300000000d06700066000000700"/32], 0x20) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "025af14ed033880c04f214b26200ca7d8eea520521c7ed387efcbf885db2ffdf6f5b2aa099fdf4885fda7b32f75c71c4983971f7"}, 0x44) [ 2158.151447] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2158.206893] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2158.242551] sel_write_load: 8 callbacks suppressed [ 2158.242556] SELinux: failed to load policy 22:28:22 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000060"}, 0x20) [ 2158.267447] SELinux: policydb string S does not match my string SE Linux [ 2158.275407] SELinux: failed to load policy [ 2158.286483] SELinux: policydb version 1324440066 does not match my version range 15-31 [ 2158.327810] SELinux: failed to load policy [ 2158.352343] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2158.361235] SELinux: failed to load policy [ 2158.373959] SELinux: policydb string S does not match my string SE Linux [ 2158.400647] SELinux: failed to load policy [ 2158.418245] SELinux: policydb version 1324440066 does not match my version range 15-31 [ 2158.440646] SELinux: failed to load policy [ 2158.622316] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2158.911445] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:28:23 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000068"}, 0x20) 22:28:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10301, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000040)="b68276404aea983b0d9c85001ba58492ea9e4494908690e31c1c5f2bc6fd52af498a5d2a025084818a0e59062fbdc0f7c3ae4adadfb708df304f01bdbd4435972528ae41a356c94bc4e6"}, 0x10) 22:28:23 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x388, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:23 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe801, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2159.187422] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2159.255974] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2159.296367] SELinux: failed to load policy [ 2159.314812] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2159.327087] SELinux: failed to load policy [ 2159.338293] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700060000000700006c"}, 0x20) [ 2159.356453] SELinux: failed to load policy 22:28:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x400000) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)="7aff87f0078762ec28467d31daa7463632a7e0b86dd9e1f5c1da08863d558d47837ead0394c2354a2f0855addb5fdd363f3fed2e8e1ac863062d109ce3868604653ad17eed30a6b8bd1384c9b4cd9d9b31f43e32203d58751f7ddb3285071ddf4485d1c5e6098d8f1679434668216d5c6240b82e9c206e03f20945eb6376a28a6f6a23e98e02a48ce81ac41ea2ebd2a3df9a4e04444fa6aca2d5fab5ac4b4455c78e30215e5b6792582cdb7a3938b3008367fdba3b8f340ef1a718392d8d368c36fc05be32daade9e3cf14b61cac5eb4f6926ae36edda0a6508750c4f860ec7f16597c832b590ade7b3f03", 0xeb}, {&(0x7f0000000080)="8ff6914b877dfe9ffaf51b8871e24a92441a3c37980947a81c51285ad2eb36baadaa83a0283531ab", 0x28}, {&(0x7f00000000c0)="ed2dacd1c403518095c04802fe55a5975893ba4c8b60b8211ccd1368621f10c39fb659d9d0c85ab8356f6e1e80aa773798933f62b78a3046", 0x38}], 0x3) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000140)) write$selinux_load(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf90800010000000000000075781200000000d067000660000007000000d491662ec6d404aa9722e6b28242e037966c1b1ac04b659c684a4730dab4d459600ebf2b8d396fa3141dc019f257e755785cc18c033e009c193243cf12186799cb731350402b7762bafa806bbca7fe1d44440581f22acacdc740ddc356f2bb40c044d1511347f8ecae992ef6a087db2b17c10f942377b50d6bf7a2e1b6ffe5255567cc35cdf64a40b365bd729d7cb8edc2e6a2c7aec0c533bbce9564a37b9fbe05bca312a36481c99870c64715fc7d84ebd4947e0386d3a27beb6574e64156d12e9b32acdce86d2d93b60d1479b43ef84547fa"], 0xf3) [ 2159.432667] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2159.465474] SELinux: failed to load policy [ 2159.476833] SELinux: policydb string length 65544 does not match expected length 8 22:28:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000074"}, 0x20) 22:28:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xdd, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0x4, 0x8, 0x9}) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812066000000700"/32], 0x20) [ 2159.594004] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2159.615678] SELinux: policydb version 6293010 does not match my version range 15-31 [ 2159.641296] SELinux: policydb version 6293010 does not match my version range 15-31 22:28:23 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac004c00"/46, 0x2e}], 0x1}, 0x0) 22:28:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700060000000700007a"}, 0x20) 22:28:23 executing program 0: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x2, 0x1f}, {0x6, 0x101}]}, 0x14, 0x1) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005345204c697275781202000000d067000660000007000000"], 0x20) [ 2159.831198] SELinux: policydb string SE Lirux does not match my string SE Linux [ 2159.858504] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2159.869804] SELinux: policydb string SE Lirux does not match my string SE Linux 22:28:24 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:24 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200d067e4056000000700deff"], 0x20) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0xffffffff, 0x9, "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", 0x7b, 0x10000, 0x2, 0xa457, 0x1, 0x1, 0x7, 0x1}, r2}}, 0x120) 22:28:24 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:24 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe900, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2160.824722] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2160.864891] SELinux: policydb version 1741684754 does not match my version range 15-31 22:28:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2160.889257] SELinux: policydb version 1741684754 does not match my version range 15-31 22:28:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x300) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000001c0)={r2, 0x0, 0xfffffffffffffffe, 0x3f, 0x7, 0x1, 0x50}) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2160.996441] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2161.017034] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2161.034450] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2161.125537] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2161.204990] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2161.257145] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:25 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac006000"/46, 0x2e}], 0x1}, 0x0) 22:28:25 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x40000, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) mq_unlink(&(0x7f0000000000)='SE Linux') r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000000c0)={0x0}) r4 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x3, 0x200000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000140)={r3, 0x80000, r4}) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9fcff00005345204c696e75781200000000d067002660000007000000"], 0x20) [ 2161.418771] nla_parse: 4 callbacks suppressed [ 2161.418781] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2161.488129] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2161.529664] SELinux: policydb string length 65532 does not match expected length 8 [ 2161.565457] SELinux: policydb string length 65532 does not match expected length 8 [ 2161.887934] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2162.152972] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:28:26 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:26 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xa85, 0x600040) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000040)={@mcast1}, &(0x7f0000000080)=0x14) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='SE Linux') [ 2162.419881] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2162.485801] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2162.506747] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2162.524947] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2162.789410] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:26 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x38a, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:26 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe901, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:26 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x204000, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000040), 0x4) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:26 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac006800"/46, 0x2e}], 0x1}, 0x0) [ 2163.074134] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:28:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2163.158506] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2163.192646] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:27 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/checkreqprot\x00', 0x400, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000440)='syz0\x00') r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/load\x00', 0x2, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000480)='security.ima\x00', &(0x7f00000004c0)=@v1={0x2, "8ba27a34aaadbee1b79d978a"}, 0xd, 0x3) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x20002) read$rfkill(r2, &(0x7f0000000040), 0x8) write$selinux_load(r2, &(0x7f0000000600)=ANY=[@ANYRESOCT=r1, @ANYRES64=0x0, @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYRESHEX=r1]]], 0xffffff01) recvmsg(r2, &(0x7f00000003c0)={&(0x7f0000000080)=@tipc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)=""/161, 0xa1}, {&(0x7f0000000100)=""/58, 0x3a}, {&(0x7f0000000240)=""/60, 0x3c}], 0x3, &(0x7f00000002c0)=""/169, 0xa9}, 0x1) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)=0x0) ptrace$pokeuser(0x6, r3, 0x2, 0xb3) [ 2163.251614] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2163.260041] sel_write_load: 24 callbacks suppressed [ 2163.260046] SELinux: failed to load policy 22:28:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2163.341109] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2163.361774] SELinux: failed to load policy [ 2163.434063] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2163.453012] SELinux: failed to load policy 22:28:27 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x400, 0x14000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x41000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x4c, r2, 0x700, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6d}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40080}, 0x80) 22:28:27 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2163.698936] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2163.763811] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2163.800347] SELinux: failed to load policy [ 2163.805465] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2163.818133] SELinux: failed to load policy [ 2164.114681] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2164.412274] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2164.553645] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2164.566790] SELinux: failed to load policy [ 2164.708649] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:28:29 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x38b, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:29 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac006c00"/46, 0x2e}], 0x1}, 0x0) 22:28:29 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xea00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e01781200000000d067000660000007000000"], 0x20) [ 2165.272976] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2165.309657] SELinux: failed to load policy 22:28:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2165.372393] SELinux: policydb string SE Linx does not match my string SE Linux [ 2165.410398] SELinux: failed to load policy 22:28:29 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x100, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x2c, r1, 0x8, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000000}]}, 0x2c}, 0x1, 0x0, 0x0, 0x880}, 0x20004010) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) prctl$PR_GET_SECUREBITS(0x1b) write$selinux_load(r2, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40c00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xf0, r4, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xdc, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x75}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xda6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x72b6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x50e9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x80c1}, 0x4) [ 2165.424830] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2165.453706] SELinux: failed to load policy 22:28:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2165.564198] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2165.585282] SELinux: failed to load policy 22:28:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2165.665609] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2165.688324] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:29 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2165.882101] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007007fff"}, 0x20) [ 2166.025618] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2166.632893] nla_parse: 4 callbacks suppressed [ 2166.632904] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2166.903083] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2167.167235] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2167.440821] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:31 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x38c, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:31 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:31 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xea01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:31 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:31 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac007400"/46, 0x2e}], 0x1}, 0x0) [ 2167.798509] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2167.800331] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:28:31 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="49e9ff14c6c8f36fc97d82bbf536e8d26dc2d3cc0e2324e562673ea207860706337f036c45918f33e5a97d6272050d64dfd6190b76a785cfdb9ccbe708c9cca749422f48560aeadb73670366df9fad307827d725cb5625268693294d7bff7c189c401d19631a42b33aabc5a668286415125fa834", 0x74}, {&(0x7f00000001c0)="ac9e57b593a8b72acf7ed11c19532586d06f9ea3b2dbfeca83bad0a8d0864b42ae0772502013140c77", 0x29, 0x5}], 0x800, &(0x7f0000000240)='(:-em0\x00') mq_unlink(&(0x7f0000000080)='/selinux/load\x00') write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812cda5cdfbd035be008e22a867000660000007000000"], 0x20) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='\x00', 0x1, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x2800c0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) [ 2167.966825] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:31 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2168.025236] SELinux: policydb version -844772078 does not match my version range 15-31 [ 2168.071533] SELinux: policydb version -844772078 does not match my version range 15-31 22:28:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000100)) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) [ 2168.149164] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:32 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2168.270890] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2168.305426] sel_write_load: 9 callbacks suppressed [ 2168.305433] SELinux: failed to load policy 22:28:32 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8c4bd8f90800000075781200000000d067000660000007000000063e8bbdc3fc46db59b23109d527d6b6f57d740539f09e9f80da268d9a2cea348d5f9a53904a566713758bb5ed8bfc7607addb79934aed9f1d5616ae7655c468dfa80410c180bc09adeb532638f9a130c87dcf2da43186fbe5ab102d18217f6e302f9c310aa94ce00a6e53d1511cac8b66d7cbeca2283518c98bcf3cfc0dd2879fa731430284e8fd3f3e0516b87fad4254956c88f77aa4a81bf4ccab81d1d522d96212d7ac00aacf4ad407880e0159911d12d9bd83b16c829a5fe658"], 0x20) [ 2168.316152] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2168.324030] SELinux: failed to load policy [ 2168.332552] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2168.348001] SELinux: failed to load policy [ 2168.421079] SELinux: policydb magic number 0xf9d84b8c does not match expected magic number 0xf97cff8c [ 2168.431294] SELinux: failed to load policy [ 2168.458948] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2168.481960] SELinux: failed to load policy [ 2168.797638] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2169.064294] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2169.307170] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2169.546621] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2169.783733] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:28:34 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x38d, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x101000) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000040)={0x0, 0x9, 0x3ff, 0x0, 0x4}) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x81) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf7e1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffff9}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x80) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000280)={0x1, [0x1f]}, 0x6) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff2f1223043b2f02c648fd60ce73679d97790bff00d06700066007000000000010"], 0x20) 22:28:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:34 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xeb00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:34 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:34 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac007a00"/46, 0x2e}], 0x1}, 0x0) [ 2170.384700] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2170.415237] SELinux: failed to load policy [ 2170.422134] SELinux: policydb magic number 0x122fff8c does not match expected magic number 0xf97cff8c 22:28:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2170.441021] SELinux: failed to load policy 22:28:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2170.499399] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2170.507716] SELinux: failed to load policy 22:28:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2170.569195] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2170.583401] SELinux: failed to load policy 22:28:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2170.674828] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2170.689304] SELinux: failed to load policy 22:28:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2170.754564] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2170.853575] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2170.934702] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2171.809754] nla_parse: 4 callbacks suppressed [ 2171.809816] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2172.069416] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2172.335577] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2172.642092] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:36 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x38e, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:36 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xeb01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:36 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00f000"/46, 0x2e}], 0x1}, 0x0) 22:28:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf90800ad0045204c696e75781200000000d067000660000007000000"], 0x20) 22:28:36 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2172.974948] SELinux: policydb string length 11337736 does not match expected length 8 [ 2172.981193] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2172.988807] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e16d814445204c696e5046cae3bb0000d067000660000007d95a3c0000000000"], 0xfffffffffffffff9) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000180)={0x18, 0x0, {0x3ff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'nlmon0\x00'}}, 0x1e) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000100)={0x61, &(0x7f0000000040)=""/97}) 22:28:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:36 executing program 0: socketpair$unix(0x1, 0xa, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xd40000000, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "1200000013d067000000010000000700"}, 0x10) [ 2173.159676] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:37 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2173.298830] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2173.307351] sel_write_load: 7 callbacks suppressed [ 2173.307357] SELinux: failed to load policy [ 2173.318753] SELinux: failed to load policy 22:28:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x100) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000040)={0x0, 0x1, 0x3, 0x0, 0x1}) write$selinux_load(r0, &(0x7f0000001400)=ANY=[@ANYRESHEX=r0, @ANYRES16=r1, @ANYBLOB="975c9232b45fb9c45ed3d375634a44fa985ce16352da8a757478b2c4e6aafb1068ac8d3f7c79c72c1183d51814b27556193f23a97e80656ab3230a6eb25543796c7aa97ce9fdbc73bf67abe21688a0979d2e5ab2db0879f1f6a7b13196d403bc31c1e2aa317d4386817bcaa0cd7207ce02da3186636cc3c245fcf4698be667da13f7b28ee3cc77723c7615dc5f583dc154614c72deffc34e634abc08ce9278a8b760e062721571d50d", @ANYRES32=r1, @ANYBLOB="e8cbc35c38a27e37b96c38089f2930f04e5a7127", @ANYRES32], 0xd9) 22:28:37 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2173.469641] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2173.483982] SELinux: failed to load policy [ 2173.490039] SELinux: policydb magic number 0x30307830 does not match expected magic number 0xf97cff8c [ 2173.507406] SELinux: failed to load policy [ 2173.875287] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2174.126154] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2174.374613] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2174.623110] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2174.871243] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:28:39 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x38f, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:39 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6af9, 0x482000) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000040)=0x76) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:39 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:39 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xec00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:39 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac005a02000000000000000000", 0x2e}], 0x1}, 0x0) 22:28:39 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000002"}, 0x20) [ 2175.719082] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2175.740870] SELinux: failed to load policy [ 2175.748847] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2175.759876] SELinux: failed to load policy 22:28:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x10000) lseek(r0, 0x0, 0x3) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000200)=0xf3de46b47349f664) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x101}, 0x10) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00ff7cf9080048085345f3290be0204c696e7578fdffffff00d06700838322a35926642f"], 0x20) [ 2175.865052] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2175.893315] SELinux: failed to load policy [ 2175.905064] SELinux: policydb magic number 0xf97cff00 does not match expected magic number 0xf97cff8c 22:28:39 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000003"}, 0x20) [ 2175.931170] SELinux: failed to load policy [ 2175.947565] SELinux: policydb magic number 0xf97cff00 does not match expected magic number 0xf97cff8c 22:28:39 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000018c0), &(0x7f0000001900)=0x4) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d0671b0660000003df38da"}, 0x20) [ 2175.979586] SELinux: failed to load policy [ 2175.985734] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2175.994532] SELinux: failed to load policy 22:28:39 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000004"}, 0x20) [ 2176.085307] SELinux: policydb table sizes (24582,-633807101) do not match mine (6,7) [ 2176.125026] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x80200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@initdev}}, &(0x7f00000014c0)=0xe8) sendmmsg$inet6(r1, &(0x7f0000001d80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0xfffffffffffffffc, @loopback, 0x1}, 0x1c, &(0x7f0000000080)=[{&(0x7f00000003c0)="0c3a6d5e67b285eb71fa773e4815825f1b1df3979689efe27dc0d7d759c8f2050b50564f0ed7b1a72d3d548fa8a68617df24988cb0f7ab0c57eb0ecccbeb1894f7ba77e56044b7ea65ad3d060247a6f68fae48500f870d247a1459fdaa1a033e1ed184544da320bac08b7f4d3fae7516579cc35431cb3a35b63dc54616d4eb68068e7b7a586fc7579f9b8066098603d5debc2a8b8da680999c5da45101edb7e4f0f01700a3ca7c15e83a4f42141de6d49eb8bfc9b8ef1df09e0c379e0f382d58480f872aa749c2eff45e8bf578b8bda5d9b841535fbda884bfc51c05e53806bc367cb96067d918d5f4d35507eea4dd69024944a0256dd8fd63fd97efb86bdcd5794011a1e8d5c094b44c8cab1e3930fc6cdd0a27f628a929c95be18dd200bbac2f628a18989924c38d70e9e3b7f7ea09e6239cfa6049d913a8fd46d712cb4ae03e4354de548ffd8be6cc2877e1a743f24790c25696d651681da95ef6a7fe10e95eb1d0598c2d1e23014005756270a9dacd41cdd930dcbcaa99f81ae7b1ad0e1949799997f5cf70cf00099d36b52fe2a824782f588660bfecf50eff98b34d3aa9a43dd50be8808abfefdcd6fd7295db0b25bdbc3f56bebd958e67762286a31116d331a48e0f841a754e0a0f15d7ea5aee5d502a80dc228905329914b0acdcb87b0d17e29c16f08a74b06810a9dd67b6e1626212aa77f4255fd52300a72a660af3ab9348c7850e6cbb0512be75aae93f2912f559cf61743f3ebcd93720f09ea1a5ab00b481c123e22ee0c32c8b5d2da968d873bc21121b93f03fb7969c08fd1811f1d7b626c9ba154be613d6729ca7c76413fccd4d6c6bbb965f92eafc3d87b64f2db4ee29081cc2c36295e8a60c2a5d2c07514866e27c109ce3d8185f3d5575b42b2391dcb1e284eae8ee88c38d37c4ee3ee2064a8fa1dbc7ba0fd66921cdc3da629b5d909d3e4a2499321502e05a43ca57ec8de593f5a404d449da811775d3f9dcaa1209e276797d200db5b5d0fcba68b39686d65949b9d1b3135026e9c353617cd9ca83f0a37a28a0b2001d36b0b1973837a36f43978926d154ba1197944ba6d27963b674f40a0d99246614c4103aa9ac6b5d01b7a3ff0ac73cb0ceadd8428838991f00182464339d48cfb0d9ae447b5eec54143e6aa8a1f3fcc912c464e9e0e492d323fa2bf088c495be8441e5671a5b3678dc93a1b779487d038ede797c41a4259db5222cff70e2eb3e09366d83222d37dce552b2458b1e4422baa6c7d78c8e916ae1ff063f9d0dcdbcd057275f5cd7c81ef2258af52de72ec59a8ed817033192c15bda8c2cc293e387b71164c00b6a24f2f467efa668cef729bd00f043a27b27451a12b118a645dabf3df1c150a03baa8342e69f2113763bf46662df1603e24d2e7ba5c918badb50490655cc6b77d9ac3151e3af8f6f37a04bb36b715956d40e438befcd577903a8512ca6729f71648fb8ba75318a98750f46edb8d6270edb51fa6c85d1184d14d75288b908c69fd86319fc23a22996cdb1f87b8c9129519240896b04c8de580a04a5a6797b454b42f73c4b171f8ac5abc43ce8eb4bd912aea3fefdeb005cbc8b07f3ae781ea28e36fef4ff2a616bbb491a0c2ea8d7122f23e2b89d0834e0264e4bd07fe75030afff4ab27cfc92f67f54a369c4cd703950338eeee7ad3ad6db41bda16241563c2bffffdf2dc696238b557edfc43fc7b4edc0594efb1029b209fdb69e35e75d1c4af4c38d2896234efc7f5d39fd9267757bc4cd8634246a890a01fefe829e27cd55e5e997bd1d8191d3cab1ba6bd319a6cd13363ccf8f2ed429a24da22c0daf3bb04261f3d68194d12bc3dd2969a27a6b7c1b76989b31eeafaaa52bc517ea723edaa5612753b63fa3cb6065fd3b4b0c694378a3e60a9f9dcbca49cdcf2f2c3e28628935b0cc028eefb0adc4153c3ac52218c5a6aeb040212d23e912d801f826f5857d0ca4b5a0ea0a23f93cd6a086bba6db2856ff0d248e95080318cae5ddec52711c77f6f607b0d5d422175d95e3d1311441d36dada7ed1aba151228abaa348b9486ac6b828965b41f59444c80dcbe97e1519db5025ac506057793881631c3e9e1249c3ea0ad56b4d14d1f7145fdbee9aadc5ea58d2fd5c05bc93b2d9025f1c44c43e3bfacbf1a977139c7988d5ab62bffe7a644724a494325b65168cbd0942511f2052ba4be3696a321cc0aa21c5151b7d8887b06889a3a1705831a1b2af21ba7269eb97f3b520125e69a9228f701752127d3ddcc1dcef97e1caa6c5308b68443efaaf4cab92f0d026b95813aa08695fd70cdc1a09a5908f358fff1bcafd93686a77e6023e2cabaa33330ff90d71f34d0d677792a87b8371ffb4bc48fa94d5b7f3e425322af4d2563bafc945777073ee5b2a6e2fbbfe509e0d8c8bdd710291d740c7d1e85cc32b2c67e51fa14f784473a3884a95682e5223f264cf2c49e7e4dcedf459ddf63c5814f2083c231ee44f20dc4dd3a47d48e7c031c1e9f59952d6de8f58fdba120255514ff3300fb015e41f8da31cb6ce795f6d92fda2adae396e12afec6d40b086dd598a49616a8928481e56b40013bcd71409359bf01f100399c467b66b11129d696b9743f80ad839f6ee074add3ddeac55d0223e51c3050c5565b0bbf91fa4eafa2c32fd616406caf84977a2c7a84f88d58b0500ec18ee9dc37d85e63a342346b85ccd1826893361b5552fd4019911191755fcef948e90216fad932fecb2f692a849885f987109c1390d322254cf3c07a186e30892bc096a069c81a6273e58aae96b6a4ee05f79c3242e21abb2e5fa7fa559cd85753f33aec0ac446dd3a4a408c091c7cfded797f45597525de53c16df9ce8568eb699f1d40b60f84bad442f7aa629e1a7ab3832ac642aebc633c838e3be06a2628deab2f8cf3c8a445b354d29bb5501d7b5b06997b7832c8b3c92ed00e734c2c2cac486b7c66a682aae1ae9182438db3cb04feafe9e478a420f3e0e7e93260f5a2d0a69e47ecb1c3345993f8823696c9bc7276e67bc43d024f31db4391d4581598a1e6d491c1779da5d039bb8e307a7c5ab0dedf3b930f60da6a2bdd6f828a50ec9e938652c27cf0b6bf55e413b65bf9602140eb783721ad0fcbe9fe63a9a043f14c90c72056807e17ef0522cd7d8304b2c4cc462b9dda95dc020d3e93a2eeb596aab4d1d3b9e9607bde1029619d89cdd8e72a136ebde13cc008c10377ac0568408d97c6dac498b77900020f935c8981fc42e1a75c2668b567b69328008a3b67d851c3ad483a4e2cdae909b541015fbc213cd52f77c62c4d4e9b363af4dadc9c103ff984e64a577865932cf4525e93d0ef5d9a8d5e892a83bcf1b53c0e855fab52249a2c1dd2d90780c114063cfd3193f69dd105e03fc7e38ea14029ee5b6571f497560dc8a6c304d65b3949192a79ee2b41346a55772cb89ee19eaafb218a397e4bb1177b810f7511eb93027429f7c9d1992133f4323729c494a91a4115da401691710541d443e13e091999a027d9765931b93f4bb8d1acf99ce7937b7ecd91c540aea87d03fc3e381e3778c46073711e2ae1cf2725b62a7a0cf0a19ec16c8215c2ea410d48efdf08f071ec870f31feef502aab56aee7bd046cc17d27018d12adbdd982102540ca284c4042beb72f296cd0edf6ef2a550a5a3990030bdedab60f1476c2393c0c098798dbc3441056d98a89bf3ede5c7035cb270026c3d7c67e3a8f7bdb436d0ee557fee8609fada0d95fd54f616ecc8e3d4303504fe6a6245a72a1cd5df8a8e40d97e273dbde3f78e0ccfa30d185fb6e77cd042b48bc6557a69b74acb1d1fcfad6994d7220ed89d4563e7dfb9afcf4262f69f2d37c34d41e999a7737691fa6f56b82588c2c50d8df96b38c78edc97fd693121a4dab6ef93c72183f054b01c355767d325775c4f5fa2842a420e93c8d64d6a864fca6fb4eb05f0fb1b03491a3166de9cff10458f9bbcda455ad63792ff5ffaaf2eed4952852234a80174a01d62dfeac0a8e8ffbab063fd779040420eaba1dcd358bd4e4ad6cc5d421a2c1afd88bd0e96a63f2a194abb29e3927e4801a78cd12499c536f4978976722509a037614e936ce3693824c58c3c11b36d802ab22769beb27e9ebda14782b2282979bbdf869264cb892514662459648d1442325f632a9cd1d67b6badc8920c57f171cdd74d40afaf97ea65036460336010a3bfb80b7c84f8981a54d35277ad8a9186dd6fba6f17df80f7a666814366b7c18a9e689840cc3817b87b649d42d099a40938d83acee4c6366d6e7e768b34daa5bc22e7bf4571bdd52974e2f7973f3bc9c6a4b0276c23b6770cff21881f831e5a566c8cdda0193ea321a323ad15f165bef37bc103408c48b8ffc6e9eab5403c06303d383269a939d0a0dc93ccc80852281081c29f33b04ae4f34571e8aefb6f0c9e6660306ddd90c01b30e17c175897b352d70fa81bd83352363a14768e891cda649ea331855f74c5d950f5f06809a9e46fd42764bc2dc2de5a01a038149191872c2f1c752a3b650c4702bfc725a0c0a0a80302e7ecb859061770d946613e0045d748c123ffb0b20bc556dcf70d57f12447749e1d7b6b0b0282e452794fdca3917e4fb133faa41ccdeb69ec0dab503c875c18df42067809e5fbb009715ce5eda203c010451b11a9420cc2d8d83dc5ffe7b57bc051541ca3bcbdb6ca56ef66f8eb890907b6b6895b89c44ee8cb2f8309a044b5c3450338ebf3a0afac9ed5dd703256e0e4f234e566ff98838e0b7eb5a4ec12658490059f20961ff08f17f70a06e5f0f6df3d15738abaa9ee4b72e3ca0ea826dfcd3ecd6cedd64fb6edbbb1622edf464226fa473ac58cb4cb5c491e800dccf7d76e8df22e38647099c4f367f859fbe31b86043804eb112920ce0d8a2ebdac84a4ec1b0bd06a9f2581cde9bac81f18b25f8fe40c767d8ffaaefa5fb89637b07d38875490e329fa309ae30908c0c5814f09abf7cc3dd9a9b0343be52b68062d5d4dc64398c63d41d2419e457228747ec9ab7bf9dee84e7551a9789b8db4d76f6fdb0d60f4bab983a70027491bade6a3a77d873cd64cb4be118109320479f87fb8e8c376ce860a53202ac02c31d754943ebd5e04113b40a47f154cef7f7f81796b2f1ba3d6fb2bd45e070a1940495b611efa24da11c3644a1b02f8165722c3dd9ab11e3b60cbfa87a9cb665af5f2145504b3ad7d480c001f897363f3ad1721124b075577869ff3b543aea611895a963dfa2019d8373c0ee94104568cfbca207a8db5aab9c472f9ee56ab097cf8e93b4c02e4d559e8aca075c0070dd532427b61efb1f7abbc4fd8b3ba0f1588d8c560ac4f107a1ca415a9035b368b4b12a2a52555766e58259f0c23ab506c4076ccff225c69c2f08f0dd274549218b3e632d92c71dc9358a227ee55f62aefd9c98e0aaea830ff0d21a6c67eea73f734a10cc23e28458af297e15f37a2740a590ea81b66cf6a1cce1aeb53f5cd1c387b8c6e6eb0ad1dff648c1b214c547886a9c55d1185398b7436c5703d389736df37ef403100ecef4b78e6b5701200d559d77d401e5ce6a267d4b4bc55bec6929695ee0fa2691ad7f8a0a6340fb0cf260239d12d5977f33ff98a5ced8f8c38d1aa24c73e46a8a38eb02f7767d21ed9c02c4d9702a011615ce2c03d4f2d93cca21dfd470781521bd023a2b6c682f03cbdc2bf476121b1b416ac4ee681dc8d7f16482408e6825873bdae7c4aec8a299d1029f3436cae9840db7aa66d10a03544796de67f246983d73884ced0e99cf7f6128bd37c054b8b7c01b0a", 0x1000}], 0x1, &(0x7f00000000c0)=[@rthdrdstopts={{0x28, 0x29, 0x37, {0xff, 0x1, [], [@ra={0x5, 0x2, 0x5}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}], 0x28}}, {{&(0x7f0000000100)={0xa, 0x4e24, 0x1000, @ipv4={[], [], @empty}, 0x1000}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000180)="d36475b61ba9400ed385c2907ce4cca8072e5cd04145e9ccc815046fc68f17f03d448ce8fead5c5e3d87e642c21c59b7381a31a075e4165cfc735ba19266acf1f75d996cec87d4293e11668ec19dbf6d88ec60c0571a95296b4971ed3d07588b1ed9332eafa6e229f55a2d858d1e2ebb1ed21d1e683705ae04ac27f88439c27c6d76", 0x82}, {&(0x7f0000000240)="3ef5b5c9605b94d7bbec6d60c6390b17fd668836cb9098e22deda37202c1537d18e9f147c788d95e5a849c5cb3de3ad15bd63d72c4dfb953f2966ff06d05df656dfaa707c78bc826d7b716f6d0ef3e7be25e7672b3d73bd7cffa7c361e80a79535dd09d8d98515c39a5994efc3d95189fb2aa9be387a62c62e64c85266fe82edff2b02721d277864cb356bc71c8601f47ed7d2d6f14ff71a9e62b1086add5a6dda2694b74c25f441e1fb7fdee58300320f7a7f40c1df966b40314d31605bd6316065cdc8f3152783401beb4dc9212025b3", 0xd1}], 0x2, &(0x7f0000001500)=[@hopopts={{0x50, 0x29, 0x36, {0x6c, 0x7, [], [@ra={0x5, 0x2, 0x225}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @padn={0x1, 0x1, [0x0]}, @enc_lim={0x4, 0x1, 0x80000000}, @enc_lim={0x4, 0x1, 0x2}, @enc_lim={0x4, 0x1, 0xdc1}, @ra={0x5, 0x2, 0x80000000}, @hao={0xc9, 0x10, @remote}]}}}, @tclass={{0x14, 0x29, 0x43, 0x7fff}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7f}}, @hoplimit={{0x14, 0x29, 0x34, 0x3}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x73, 0x0, [], [@ra={0x5, 0x2, 0xffffffffffffff00}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r2}}}, @hopopts={{0x28, 0x29, 0x36, {0x73, 0x1, [], [@enc_lim={0x4, 0x1, 0x80000000}, @jumbo={0xc2, 0x4, 0xf61}]}}}, @hopopts_2292={{0x60, 0x29, 0x36, {0x32, 0x8, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x3f}, @jumbo={0xc2, 0x4, 0x800000000}, @jumbo={0xc2, 0x4, 0xffffffff}, @calipso={0x7, 0x18, {0x9e43, 0x4, 0x903, 0x4, [0x6, 0x7a6]}}, @ra={0x5, 0x2, 0x3}, @jumbo={0xc2, 0x4, 0x4}, @jumbo={0xc2, 0x4, 0x10001}]}}}], 0x168}}, {{&(0x7f0000001680)={0xa, 0x4e22, 0x5, @empty}, 0x1c, &(0x7f0000001c00)=[{&(0x7f00000016c0)="05b4097258e244ef45ee3242adbc58114ff080c8c2ee50c37f3cca65c14145f69f6e41a22b57028f9fb610457ab5c38173c7447285496fa27a46d50901e67a1e0612016db0ae4a0dcd9da0ac99355ed710640bf0c2f67b02438ce363db772eae05a1845ea884d4da127e773e533e4679580831963c24c09a2ecc0a821bf2afa90540a9fe90f778a7171ddb18f08a837b8018457fa453e59eea6023a98bae702458a081e0019fad52ccc419997a2a45224c00ca17e35fc5157a011bd115", 0xbd}, {&(0x7f0000001780)="ed13c75e0ebfae0cfb97d45bfc38d80d8543175f0629d5227962", 0x1a}, {&(0x7f00000017c0)="4d8bcaaecd4b1e885bd5db67c025972b454361d2e429ef89cfffc1fe07bcbe76c7e7984107194cda8bcecacc464f2b3237940e1fcbe26d3bab48427132ee5e441fda808ab3bcb6338a0bd6c473bba137973295edba0da45333c1dfe90d9036da3101e976b4a840f1632ef3a3ac554f8942a75ab4715233bae10ea5e3fefe057a612974ff94a5", 0x86}, {&(0x7f0000001880)="bf9d23683f51230f871f0bdb24d432db", 0x10}, {&(0x7f00000018c0)="6e2c64ecd042472eb29d3cc252b707c2dc70b47553b6ff8e18391f2e6c23a063ad5a14046cfa5620c4e9439c0d2a85fa79135cc5d225510bf8da7ec77bf2d4af75edec968295114c8ab1d1fd4a5fe37a1af2182692657ea5bee8a00598b963b00ed95a3350bf6c19426bfdceb2e364072c382ff24f115490a2608a04a21d81f79ab21912bdf961fefc2416b2ddf683c4e62b5ac108db9c041a797c47074d94435206153f", 0xa4}, {&(0x7f0000001980)="33e9631bd45945441f5a123422840580f4f02621bb1fb34f19fe288e31c12e3feee2c7a685948a3366cb7a7f44ec5d466769fa444be2deeb47a335ceab1dffad0ebde4ab15ffd054941640abc2d2737865805c68162dd33edaedcd00926905278d4d7e4f2b356af400b4b4a61ab052b60e7224228532f5314d97e6719aef71bc119085e9", 0x84}, {&(0x7f0000001a40)="f13e035af44963440abb2cb5ab3918106d11deddeed4f3802af38f5682039c56045227b4412addfced197d21eef6bee58eb0849d0e0ad53c6bbf4ebd78977d40d0818b27c9e5b7cb3f845ec11050b450cdc52ad6c3de63736af41282622ab2f5ea4610332d4458e04661c913077578f37184e0b741408c23c9", 0x79}, {&(0x7f0000001ac0)="873cf514482b17ad024d186e8ac84a486a44aa7bbfa7693d9881ad4fb44d400eaf7d90fa1b103e9554d47522012318d250768555883b228af1462b849e4e81b5d4cf1aacab3297ce6706402b1f78f12a20565e414287827485cb9d53fd2c213690f2210398b2958f0498c5fef3e19bf2d283ec14540191ea8f", 0x79}, {&(0x7f0000001b40)="c86ab6b21686b42598dda3e76fb34249252e63c340cbdd1f5def3c09d45672d7449f605392bbf8b533d5502f00fe5b138c061763895e57e5fa737f8ca0126d242a9fb7b9e441adc5a76a20381261c1d4cb83f86eebe4bb1ea37edca02b36df0dec046ea25e1d7a3a4b47d8879b9603b47f62cf914ade1c86a56034fccab0d9692cd0139a1152d45c6d8c77f8ddd3a60bc987976c7e20f559c4", 0x99}], 0x9, &(0x7f0000001cc0)=[@rthdr={{0x38, 0x29, 0x39, {0x5f, 0x4, 0x0, 0x100, 0x0, [@remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}}}, @dstopts={{0x70, 0x29, 0x37, {0x2b, 0xa, [], [@hao={0xc9, 0x10, @remote}, @generic={0x0, 0x1a, "6e667d4cf921c789b9c7fefddc1dafeffd38ac0ec80ac55f08dc"}, @calipso={0x7, 0x8, {0xf2000000, 0x0, 0x10001, 0x1}}, @pad1, @jumbo={0xc2, 0x4, 0x7}, @calipso={0x7, 0x10, {0x9, 0x2, 0x8000, 0xffffffffffffffc1, [0x5c]}}]}}}], 0xa8}}], 0x3, 0x4000800) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2176.260515] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2176.281626] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2176.987025] nla_parse: 5 callbacks suppressed [ 2176.987034] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2177.253591] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:28:41 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x390, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:41 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000005"}, 0x20) 22:28:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000080)) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x3) 22:28:41 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:41 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xec01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2177.354093] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:41 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000003000000000000000000", 0x2e}], 0x1}, 0x0) 22:28:41 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000006"}, 0x20) 22:28:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000000d06700066000000700000023329dc4da3f1636de123f5092d302f6d4aec2a277935cfdf6f2d911d27de55b09e23c655eac5ca7d8d0ea8e7beac818b919dc762de74c2924c75c8f162ea80eb95194e63420d9cc147526a7acc683a9f20190cf37620cf1298503b30f11ca18451003fc61c5db507ece4d09e68e"], 0x20) [ 2177.625724] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2177.697363] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2177.729185] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x200, 0x5, 0x0, 0x5, 0x5, 0xffffffffffff4dd4, 0x7, 0xfffffffffffffffe, 0x401, 0x9, 0x8}, 0xb) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x3f) 22:28:41 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000007"}, 0x20) [ 2177.872482] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2177.892106] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2177.911128] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:41 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000048"}, 0x20) 22:28:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = getuid() ioprio_set$uid(0x0, r1, 0x9) [ 2178.019952] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2178.062564] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2178.091611] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2178.405012] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2178.681130] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2178.939143] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2179.181203] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2179.440067] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:43 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x391, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:43 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700060000000700004c"}, 0x20) 22:28:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) 22:28:43 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xed00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:43 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000005000000000000000000", 0x2e}], 0x1}, 0x0) 22:28:43 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2179.752656] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2179.769214] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2179.792799] sel_write_load: 14 callbacks suppressed [ 2179.792804] SELinux: failed to load policy 22:28:43 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000060"}, 0x20) [ 2179.823778] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2179.837625] SELinux: failed to load policy 22:28:43 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x88100, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xccc}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e20, 0x10000, @mcast1, 0x8}}, 0x100000000, 0x1fd, 0x43, 0x80000001, 0x20}, 0x98) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000500)=@gcm_128={{0x304}, "c7e4418e483ec17e", "002b1a96dc8ee83e29ee580221b9e66f", "8fc6671f", "c24530e66a8108a2"}, 0xffffffffffffffa7) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="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", 0xfe}, {&(0x7f00000000c0)="ad8f5286b9a794abd071b93e650b7284e91385c8d539e0f6e5b309cbb8a62e2ddd699d3b89ae395c680457e7", 0x2c}, {&(0x7f0000000100)}, {&(0x7f0000000340)="5b2285c77b9b16d6c43e52bf8f79f7634e87d86e97c32fe43cb369d7", 0x1c}, {&(0x7f00000003c0)="36ea25bc0a821445d4b3ec3777eab493ef236f19a44d12609ff10a52e60d1fc0bdc0067f9cc2edc13507b4603d278ea7305b455093b905dd9b5845bd954fed2d4497310ae470602f8c20271ea5b445f69dbe0beca4565a9542b96b936ac9a56c4c0f5cac4dbb2aa47588304c93aeff8bcf09", 0x72}], 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB="140000000000000029000000080000002b000000000000001400000000000000290000000b000000714db281000000001400000000000000290000000b0000000000000700000000600000000000000029000000370000ff08000000000000c910000000000000000000000000000000000732896362cc464c7219dd56160686d56f9ad85d5c403c8a3283fc12b377702499cb3ccf9a096d2dd8c453a90d2afbab9caa18470000"], 0xa8}, 0x20048080) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000540)="0538a60a517788ed621206b83dcb356bc6f67bfd60c58324f0124cebe58dfeb3a075691ee54b8421a2775a8e6a04f2047b64e4e6730ec1b16f2f4cb5bcdf798c8e07acbe4bc3f268637ab8784729640a39db1a5310525c95b3d441c60c0ac571332f272405d605c21af66679228a8d7880e516e8c8930d01010000000000001942819917648fda45570dab01dae200100000bf856d43b469a2ed3a62fcdfbf8449716db0000000") write$selinux_load(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005345d067000660000007000000"], 0x20) [ 2179.971477] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2180.005479] SELinux: failed to load policy 22:28:43 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000068"}, 0x20) [ 2180.023235] SELinux: policydb string SEÐg does not match my string SE Linux [ 2180.040711] SELinux: failed to load policy 22:28:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf90800000a5915592e7ca8f178120000000007aa000000000000000000b7abeada2fd6c1b5aaf678d5a29258bd97dce862f2936c239976f94ddd211808be7477d2690926ccd3ea507ea698e939e646e18997a0afd00a455cdb04e2ccbc9455c6506f09799748a25247446ce06ef8d08204d2937325d5bed4ec"], 0x20) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x0, 0x2, 0xdaa, 0xe30, 0x7, 0x9}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f00000000c0)=0x9, 0x4) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000080)={0x7fff, 0x7, 0x3}) [ 2180.229063] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2180.266721] SELinux: failed to load policy [ 2180.274060] SELinux: policydb string length 167772168 does not match expected length 8 [ 2180.302211] SELinux: failed to load policy 22:28:44 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700060000000700006c"}, 0x20) [ 2180.325777] SELinux: policydb string length 167772168 does not match expected length 8 22:28:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') accept4$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14, 0x80800) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="11052abd7000fbdbdf250100000014000900fe880000000000000000000000fc000114000700119a2ccb11991deca9974e1134f0ab13080003003a0000001400090000000000000000000000000000000001080003000000000008000b00", @ANYRES32=r3], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x8010) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) [ 2180.376663] SELinux: failed to load policy [ 2180.451668] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2180.464259] SELinux: failed to load policy [ 2180.477533] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2180.487346] SELinux: failed to load policy [ 2180.753221] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2181.264344] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2181.275130] SELinux: failed to load policy 22:28:45 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x392, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000074"}, 0x20) 22:28:45 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xed01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:45 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:45 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000006000000000000000000", 0x2e}], 0x1}, 0x0) 22:28:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000180)={0x7a, 0xcb0, 0xa, 0x5, 0x2, 0x81}) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000000c0)) write$sndseq(r2, &(0x7f0000000040)=[{0xbc, 0x5, 0x5, 0x0, @tick=0xa0f9, {0x2, 0x2}, {0x0, 0x81}, @control={0x6, 0x1, 0x2}}, {0x10000, 0x80000000, 0x100000000, 0x9, @tick=0x6, {0x72, 0x5}, {0x1, 0x3}, @result={0x980, 0x8}}], 0x60) write$selinux_load(r0, &(0x7f0000000380)=ANY=[], 0x0) [ 2181.653253] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2181.695258] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2181.725211] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 2181.738319] CPU: 0 PID: 673 Comm: syz-executor.0 Not tainted 4.19.53+ #25 [ 2181.746760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2181.756122] Call Trace: [ 2181.758746] dump_stack+0x172/0x1f0 [ 2181.762419] warn_alloc.cold+0x7b/0x173 [ 2181.766409] ? zone_watermark_ok_safe+0x260/0x260 [ 2181.771273] ? lock_downgrade+0x810/0x810 [ 2181.775446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2181.781000] ? avc_has_perm+0x404/0x610 [ 2181.785001] __vmalloc_node_range+0x484/0x790 [ 2181.789515] ? sel_write_load+0x1de/0x470 [ 2181.793679] vmalloc+0x6b/0x90 [ 2181.796882] ? sel_write_load+0x1de/0x470 [ 2181.801043] sel_write_load+0x1de/0x470 [ 2181.813095] __vfs_write+0x114/0x810 [ 2181.816836] ? sel_make_policy_nodes+0x1520/0x1520 [ 2181.821778] ? kernel_read+0x120/0x120 [ 2181.825685] ? __lock_is_held+0xb6/0x140 [ 2181.829773] ? rcu_read_lock_sched_held+0x110/0x130 [ 2181.834805] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2181.839576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2181.845126] ? __sb_start_write+0x1ac/0x360 [ 2181.849462] vfs_write+0x20c/0x560 [ 2181.853028] ksys_write+0x14f/0x2d0 [ 2181.856668] ? __ia32_sys_read+0xb0/0xb0 [ 2181.860837] ? do_syscall_64+0x26/0x620 [ 2181.864854] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2181.870230] ? do_syscall_64+0x26/0x620 [ 2181.874821] __x64_sys_write+0x73/0xb0 [ 2181.878726] do_syscall_64+0xfd/0x620 [ 2181.882544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2181.887747] RIP: 0033:0x4592c9 [ 2181.890954] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2181.909871] RSP: 002b:00007f95970f6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2181.917689] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 2181.924981] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000003 [ 2181.932267] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:28:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700060000000700007a"}, 0x20) [ 2181.939554] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95970f76d4 [ 2181.946838] R13: 00000000004c9279 R14: 00000000004e0280 R15: 00000000ffffffff [ 2181.956691] Mem-Info: [ 2181.959161] active_anon:90383 inactive_anon:209 isolated_anon:0 [ 2181.959161] active_file:17720 inactive_file:61991 isolated_file:0 [ 2181.959161] unevictable:0 dirty:261 writeback:0 unstable:0 [ 2181.959161] slab_reclaimable:182828 slab_unreclaimable:407332 [ 2181.959161] mapped:58936 shmem:262 pagetables:1091 bounce:0 [ 2181.959161] free:769650 free_pcp:830 free_cma:0 [ 2181.993336] Node 0 active_anon:360128kB inactive_anon:804kB active_file:70616kB inactive_file:189980kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235744kB dirty:512kB writeback:0kB shmem:1016kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 92160kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2182.029467] Node 1 active_anon:1404kB inactive_anon:32kB active_file:264kB inactive_file:57984kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:532kB writeback:0kB shmem:32kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2182.056364] Node 0 DMA free:10448kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:308kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2182.056406] lowmem_reserve[]: 0 2555 2557 2557 [ 2182.056434] Node 0 DMA32 free:34616kB min:36248kB low:45308kB high:54368kB active_anon:360128kB inactive_anon:804kB active_file:70616kB inactive_file:189672kB unevictable:0kB writepending:512kB present:3129332kB managed:2619960kB mlocked:0kB kernel_stack:6912kB pagetables:3860kB bounce:0kB free_pcp:1948kB local_pcp:1232kB free_cma:0kB [ 2182.056473] lowmem_reserve[]: 0 0 2 2 [ 2182.056500] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2182.056544] lowmem_reserve[]: 0 0 0 0 [ 2182.183010] Node 1 Normal free:3033572kB min:53608kB low:67008kB high:80408kB active_anon:1504kB inactive_anon:32kB active_file:264kB inactive_file:57984kB unevictable:0kB writepending:532kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:608kB pagetables:652kB bounce:0kB free_pcp:1624kB local_pcp:612kB free_cma:0kB [ 2182.222560] lowmem_reserve[]: 0 0 0 0 [ 2182.230482] Node 0 DMA: 4*4kB (UM) 30*8kB (U) 27*16kB (UME) 9*32kB (UME) 8*64kB (UM) 2*128kB (UE) 2*256kB (UE) 2*512kB (UM) 1*1024kB (M) 1*2048kB (E) 1*4096kB (M) = 10448kB [ 2182.253379] Node 0 DMA32: 1364*4kB (ME) 1367*8kB (UMH) 839*16kB (UM) 77*32kB (UMEH) 11*64kB (UMEH) 5*128kB (UEH) 0*256kB 0*512kB 1*1024kB (E) 0*2048kB 0*4096kB = 34648kB [ 2182.276013] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2182.294753] Node 1 Normal: 1*4kB (E) 62*8kB (UE) 17*16kB (UE) 5*32kB (UE) 2*64kB (ME) 1*128kB (E) 1*256kB (E) 2*512kB (ME) 4*1024kB (UE) 6*2048kB (U) 736*4096kB (UM) = 3033508kB [ 2182.318943] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2182.333066] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2182.345125] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2182.359352] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2182.373045] 79972 total pagecache pages [ 2182.381078] 0 pages in swap cache [ 2182.384991] Swap cache stats: add 0, delete 0, find 0/0 [ 2182.394530] Free swap = 0kB [ 2182.401558] Total swap = 0kB [ 2182.405029] 1965979 pages RAM [ 2182.412376] 0 pages HighMem/MovableOnly [ 2182.420476] 338859 pages reserved [ 2182.424377] 0 pages cma reserved [ 2182.442259] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2182.467135] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) 22:28:46 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2182.493644] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 2182.507755] nla_parse: 3 callbacks suppressed [ 2182.507767] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2182.536522] CPU: 0 PID: 681 Comm: syz-executor.0 Not tainted 4.19.53+ #25 [ 2182.543524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2182.552903] Call Trace: [ 2182.555527] dump_stack+0x172/0x1f0 [ 2182.559187] warn_alloc.cold+0x7b/0x173 [ 2182.563190] ? zone_watermark_ok_safe+0x260/0x260 [ 2182.568323] ? lock_downgrade+0x810/0x810 [ 2182.572613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2182.578169] ? avc_has_perm+0x404/0x610 [ 2182.582173] __vmalloc_node_range+0x484/0x790 [ 2182.586693] ? sel_write_load+0x1de/0x470 [ 2182.590865] vmalloc+0x6b/0x90 [ 2182.594074] ? sel_write_load+0x1de/0x470 [ 2182.598238] sel_write_load+0x1de/0x470 [ 2182.602277] __vfs_write+0x114/0x810 [ 2182.606012] ? sel_make_policy_nodes+0x1520/0x1520 [ 2182.610957] ? kernel_read+0x120/0x120 [ 2182.614860] ? __lock_is_held+0xb6/0x140 [ 2182.618946] ? rcu_read_lock_sched_held+0x110/0x130 [ 2182.623980] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2182.628752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2182.634388] ? __sb_start_write+0x1ac/0x360 [ 2182.638723] vfs_write+0x20c/0x560 [ 2182.642283] ksys_write+0x14f/0x2d0 [ 2182.645922] ? __ia32_sys_read+0xb0/0xb0 [ 2182.650000] ? do_syscall_64+0x26/0x620 [ 2182.653987] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.659366] ? do_syscall_64+0x26/0x620 [ 2182.663356] __x64_sys_write+0x73/0xb0 [ 2182.667301] do_syscall_64+0xfd/0x620 [ 2182.671124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.676321] RIP: 0033:0x4592c9 [ 2182.679526] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2182.698440] RSP: 002b:00007f95970d5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2182.706171] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 2182.713557] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000003 [ 2182.720933] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2182.728744] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95970d66d4 [ 2182.736030] R13: 00000000004c9279 R14: 00000000004e0280 R15: 00000000ffffffff 22:28:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) 22:28:46 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2182.772303] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2182.831744] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2182.864108] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x40000) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) [ 2182.904897] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:46 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2182.968164] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2183.012321] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2183.036979] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2183.144930] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2183.407096] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2183.670759] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2183.921006] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2184.195002] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:48 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x393, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000040)=0x80000001) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578129db95175a3232ec960000007000000"], 0x20) 22:28:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:48 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xee00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:48 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:48 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000007000000000000000000", 0x2e}], 0x1}, 0x0) 22:28:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff8cbd75825ecabf7cf9080000005345204c696e7578849a288e27b3333e80fdf25b66e1852e"], 0x20) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x101000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000740)={0x15}) r2 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "9c28b891a0d71592e2eca623cb71831e8cacdf26fe528bc868927da78e87c6a2"}) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@ipx={0x4, 0x7, 0x4, "f01d3aa4521d", 0xb3}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="fb4c8d95dc9c2992d0308ba783616c90", 0x10}, {&(0x7f0000000180)="cf245b88ae303aeb4d3285b5df40f713f659bcfaad2d23d54883e564136708f481515c4550e6b2bb599fdaf70aa6c43e10736d756f21fee8ddb67a41b064c1283bc4a2af6537d0663aaebfd70ba7a5ecf3e0b8cdbf72704c9898df8b3795907f21381d731c215fb8d26e00aee9f80c3092f5bf0268a349", 0x77}, {&(0x7f0000000200)="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", 0xfd}, {&(0x7f0000000300)}, {&(0x7f00000003c0)="938141d5bad2b5f861294693dcedafdeed5d7dcc1f9868e56b0aeba3575f38ba622315aaeb29c09f55ac3bdbee6be18591341a8048f4c067cccada0b6963abe0467902eee7f5a9d53833547b5d64b101a5a622e41ee0678238192976cff36284758154465231dd72faccc9a0b87e5159746822dbc9f7fdf365935a6350c604828c7ba15d4f25b2fe0d2123417bd3c7fa7dd60021f3dc662723486bc78dee9fb612a437d844172b3e1fe5d44b2bfb8045de4d48d308a40f2ebca9f6a79931ec8890babafca7b7ecb254dd000b2c0f4eacbb66fe91ff87ac26fa6c424d80d2e74d92f033009af045ffd9f89c", 0xeb}], 0x5, &(0x7f0000000540)=[{0x48, 0x3a, 0x80, "0093c00292bed9e17f0f632e5f258d87c665ba7fb869edafd191b4423041d6f74a06fc0e1d9d14a01699416fcefe9fb6d14499622e6be060"}, {0xe8, 0x0, 0x40, "ba79a276151055539ebc10e1c6859c490b184ca4ec760bf8aee95d4d1f35585123b8d80c4f334769328ba6b46a7612ee6a9313fe3843908877320c8fe9f11470ecdacf73718b248b8c6c37c071096cc0c0bb2bfcc2ab0b41133259c2397aa1584a7e580c3881c2a5c7f54108a48fefbdb76056b9c2d9a7d5241ac3a8b9bd1240a4c7b703554cf0f301cf0fd98bae2b817455aac762accc9d3102fe79afa821a467aef2cd797a5c80a194f21c1e8767815b2d579442ebc993c17ecf66c2c837cc564cad4d57f88aa579072276887600cbbb6de8"}, {0x60, 0x11f, 0x9, "f7302742556433f0ce98fa2371c1686c53d66a16777c5401d93d6e0bee1da616e27b96a5333182aebe8fcd157d4cbf737d2c522e0427e26f2845901bede0295da85103df262d4bc6ca63e1bf7665c935"}], 0x190}, 0x800) [ 2184.518302] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2184.534689] SELinux: policydb version 1371118866 does not match my version range 15-31 [ 2184.548746] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2184.628627] SELinux: policydb magic number 0xbd8cff8c does not match expected magic number 0xf97cff8c 22:28:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2184.685728] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2184.718331] SELinux: policydb magic number 0xbd8cff8c does not match expected magic number 0xf97cff8c 22:28:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x3e8) 22:28:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2184.781771] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2184.861433] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2184.884925] sel_write_load: 15 callbacks suppressed [ 2184.884932] SELinux: failed to load policy [ 2184.898132] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2184.915808] SELinux: failed to load policy 22:28:48 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2185.001866] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2185.016498] SELinux: failed to load policy [ 2185.172975] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2185.532339] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2185.795238] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:50 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x394, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:50 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000040)="1564894ef46ffbe3693879c40dabecbdee4b961363c8d6918b9aa0cc924a8835de1f7e1e99fda8f6798ffcbd52adfe318531bff07d6046dce3a853f532777abff590b30fe93e3a24fc06aa7ceef11e3d47038bb7019d0ad3f5f17d5c734033e90615100dc1053c0534ae148b11ce4dd218e2529aa816113eb3b1b8e28ef60c3ad9097c62d853dce736dc030e6e36003927e303ef7d98ba83aec4384351359b6ae20481f8877d7e457571fedfaa28902e9989279520ee6f1088e881", 0xbb) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:50 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:50 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xee01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:50 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:50 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000e08000000000000000000", 0x2e}], 0x1}, 0x0) [ 2186.837155] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2186.844699] SELinux: failed to load policy [ 2186.865826] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x5, &(0x7f0000000480)=[{&(0x7f0000000080)="bf347ed9a6d23874749ae34d451e4e1ba639853c2b341bd03be0f1672063459e10", 0x21, 0x4}, {&(0x7f0000000180)="b5a543df4fe9286e9576ab5ed7b82b7fd9e7d78b93ce615962c18d4b0092eea76f58255b99ee54ab78e12e5264582b5213565d05d496c76997dd7cf7346b1696ce66e8d03e3e6dc084ff103b570d4d4b572bee7c23d57a62a9717c15dcc92fee1047f5590a9d90ffa191fc34a392d83d539417e4a8b027f12fab9a72e9b5afbdf25fb23104e7aca40b28458a1ad1f82f5fb7e047e601e103b0e72ec4f476b3d0ad4a9d546d07f0b9ab1b7ab2843d72f14f36b6344787acbd54808c91841eec4e5c729d3061c6", 0xc6, 0x9}, {&(0x7f0000000280)="0b139f393b6bfd4850d0fd74ce9b7c8ccf1905f0111ec3fd8200f9254a8093aec93ed4e6ea5f7d3f7cdb56ad9dc77b3ce82f9cceee3c5848a691bd17322eab12f8203b92efbb63d956ebb52c0af9092897ad4cab455fff457dcd25cecfa89fc8490ac6deb15c30775bd255b713b418eedc87d4c2b7d1f955319e827ffc67cbeca466f9ff07e0addeea2b2aaed096249e20e4dfd6f2cbbb0f6d5eb041c9f0", 0x9e, 0x9}, {&(0x7f00000003c0)="43b3acb79bc185d350ecb203d8b521fbe80d171f2be6e6bf5eaa5b28efd3baf90a2f20f606e9eb0fb4fc8bb8dccb2451343cba2635ca0ac6f83c86fab2b9045b5e28653c55c2d18e6e155b9b4eb1a500ee98c33e94e7965dfdef69d7fad3853975ab9f97c66d0522a5278736c5974efe73af4f7deb3ae0794f94030a4e5e7a620ffd6e26132f93af7116b49c394e5ccf6b1dc71b11e57d75eca794f37e376c", 0x9f, 0x20}, {&(0x7f00000000c0)="67eb1c64bc3959", 0x7, 0x11}], 0x29c00, &(0x7f0000000600)=ANY=[@ANYBLOB="757466383d302c6e6f6e756d7461696c3d302c736d69636b6673666c6f6f723d2f73656c696e75782f6c6f6164002c7063723d30303030303030303030303030303030303031312c00f25d9bd0afe22450afd1426a1b9f43e72f970758c0a15a2f6edcc9a0bec6ae7d5e8971c7c072ce15f02d9d81e07f8dfbdca2006314a2b325b444de56ec0c7f00bda3de89c3c463b7931572bebd3aa3ca486d8db68be9fc4a0c09d90333f713cd58123589df3b86dcd405b5e8c300fab468c5f63cf753cec311a834d9a245bde59649ea2fc49231cfe6a41895ed"]) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x3, 0x400) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000500)=""/156) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000781200060000d067200660000006000000"], 0x20) [ 2186.895305] SELinux: failed to load policy 22:28:50 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2187.002790] SELinux: policydb string length 2013265928 does not match expected length 8 [ 2187.036422] SELinux: failed to load policy [ 2187.041349] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:50 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2187.049619] SELinux: failed to load policy [ 2187.114992] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2187.131504] SELinux: failed to load policy [ 2187.138837] SELinux: policydb string length 2013265928 does not match expected length 8 22:28:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2187.164125] SELinux: failed to load policy 22:28:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff74f906000000531c241656b98bc97bd063a67bb2f10c679845204c696e757812"], 0x20) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x440040) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), r2, 0x2}}, 0x18) [ 2187.269659] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2187.299385] SELinux: failed to load policy [ 2187.304791] SELinux: policydb magic number 0xf974ff8c does not match expected magic number 0xf97cff8c 22:28:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2187.344974] SELinux: policydb magic number 0xf974ff8c does not match expected magic number 0xf97cff8c [ 2187.417237] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2187.847758] nla_parse: 4 callbacks suppressed [ 2187.847776] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2188.124328] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2188.374728] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2188.622154] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2188.872897] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2189.137287] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:53 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x395, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x181) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:53 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xef00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:53 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00000a000000000000000000", 0x2e}], 0x1}, 0x0) 22:28:53 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2189.448474] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2189.459367] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2189.488703] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2189.533957] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:53 executing program 0: sync() r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8000) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:28:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2189.595081] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x400) [ 2189.677504] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2189.697375] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:53 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2189.777631] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2189.802906] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = dup3(r0, r0, 0x80000) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0x7) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, {0x306, @local}, 0x40, {0x2, 0x4e21, @broadcast}, 'team_slave_0\x00'}) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000180)="c61420b5cfe38d929933bc00983cbcc753f4e874ef819506e3579b5c5b2b0acc4d7937f995f9f8e3f87349f095f352fd3174d5de075a300f999a03fd4d7f48b3127a9bf1fd1d6b62f7ee48fdecc8642cd79ec6b4", 0x54, 0x9}, {&(0x7f0000000200)="88b9252da1f3aed988612e7ae4efe33868dfdef8b7c622917d0b38aeeee4587738171f3d8f67cdc3d0d6f1bef1432d10db00e6a2970a01ac4ae8b08b5959c08beffcb3ccac7f89a420574e8d315899bf1c4e292f585cde5e20506183755a", 0x5e, 0x81}], 0x40, &(0x7f00000002c0)={[{@fsync_mode_strict='fsync_mode=strict'}, {@adaptive_mode='mode=adaptive'}], [{@permit_directio='permit_directio'}]}) [ 2189.832215] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2189.926526] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2189.950068] sel_write_load: 12 callbacks suppressed [ 2189.950073] SELinux: failed to load policy [ 2189.986041] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2189.993564] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 2190.002102] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2190.010000] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 2190.018248] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2190.025818] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 2190.033838] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2190.041380] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 2190.095513] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2190.127445] SELinux: failed to load policy [ 2190.209417] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2190.490999] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2190.751827] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:55 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x396, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:55 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x200, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x1, 'SE Linux', "12003eef5079258172d900000853748010d06700067bab35b2930000"}, 0x2c) fcntl$dupfd(r1, 0x0, r0) 22:28:55 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00000e000000000000000000", 0x2e}], 0x1}, 0x0) 22:28:55 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:55 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xef01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2191.295164] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2191.316273] SELinux: failed to load policy [ 2191.321040] SELinux: policydb string length 1 does not match expected length 8 [ 2191.334058] SELinux: failed to load policy 22:28:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2191.362808] SELinux: policydb string length 1 does not match expected length 8 [ 2191.383352] SELinux: failed to load policy [ 2191.389919] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2191.405803] SELinux: failed to load policy 22:28:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000003c0)={0xf97cff8c, 0x8, 'SE Linux', "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"}, 0x14e) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x10000) 22:28:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2191.504123] SELinux: policydb version 1246101522 does not match my version range 15-31 [ 2191.539768] SELinux: failed to load policy 22:28:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:55 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x300) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000240)={r0}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "5b26829d2146493b", "716b70c87b2970d9a5ca99756b6fcdd253a1d3338ed147a6f7bd68ebae6063ad", "b0f4853c", "d400e4f29bbcc445"}, 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2191.553642] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2191.562125] SELinux: failed to load policy [ 2191.567464] SELinux: policydb version 1246101522 does not match my version range 15-31 [ 2191.589923] SELinux: failed to load policy [ 2191.670601] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2191.687577] SELinux: failed to load policy 22:28:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2191.757059] protocol 88fb is buggy, dev hsr_slave_0 [ 2191.760046] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2191.762618] protocol 88fb is buggy, dev hsr_slave_1 [ 2191.769845] protocol 88fb is buggy, dev hsr_slave_0 [ 2191.779942] protocol 88fb is buggy, dev hsr_slave_1 [ 2191.785086] protocol 88fb is buggy, dev hsr_slave_0 [ 2191.790212] protocol 88fb is buggy, dev hsr_slave_1 [ 2191.844090] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2192.053404] device nr0 entered promiscuous mode [ 2192.349995] device nr0 entered promiscuous mode [ 2192.418275] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2192.939841] nla_parse: 5 callbacks suppressed [ 2192.939852] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2193.191887] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2193.455014] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:57 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x397, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:57 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696ee568120000ed670006600000070000000000"], 0x20) 22:28:57 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:57 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00080e000000000000000000", 0x2e}], 0x1}, 0x0) [ 2193.766111] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2193.783110] SELinux: security policydb version 18 (MLS) not backwards compatible 22:28:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast1, @in6=@initdev}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) openat$cgroup_subtree(r1, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) setgid(r2) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2193.829596] SELinux: policydb string SE Linåh does not match my string SE Linux [ 2193.920142] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2193.935984] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@ng={0x4, 0xd, "ccd709815c0aeaf2142e9d85b17b"}, 0x10, 0x1) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2194.031701] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2194.063127] SELinux: policydb table sizes (24582,7) do not match mine (6,7) 22:28:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf945204c696e7578126f650000d067008660000007000000"], 0x20) [ 2194.083011] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2194.168508] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2194.190909] SELinux: policydb string length 1766596677 does not match expected length 8 [ 2194.488486] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2194.771111] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2195.024060] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2195.291502] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2195.542089] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:28:59 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:28:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005347204c696e75781200000000f067000660df0007000000bf8aad45d57b162b1bcca3469b8e4160a20e00633fc04f74d23ea4c3a97e6d11c7c76eedc024fde730ea5059a7a7991259e7958fc390426bddb9e3dd11e79aab94b3e6543c2443740a230cba1c17e5ac"], 0x20) 22:28:59 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf001, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:28:59 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x398, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2195.802632] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2195.868994] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2195.885071] sel_write_load: 12 callbacks suppressed [ 2195.885078] SELinux: failed to load policy [ 2195.905024] SELinux: policydb string SG Linux does not match my string SE Linux [ 2195.926908] SELinux: failed to load policy 22:29:00 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00001f000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d06700060000000700007f"}, 0x20) 22:29:00 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/160, 0xa0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e006a9) shutdown(r2, 0x0) readv(r1, &(0x7f0000000940)=[{&(0x7f0000000100)=""/115, 0x73}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) shutdown(r3, 0x0) 22:29:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2196.282144] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2196.292397] SELinux: failed to load policy [ 2196.411883] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2196.440183] SELinux: failed to load policy 22:29:00 executing program 0: setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0x66, &(0x7f0000000100), 0xc) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd26, 0x0, 0x0, 0x800e00707) r1 = fcntl$dupfd(r0, 0x0, r0) ppoll(&(0x7f00000004c0)=[{r1}], 0x38, &(0x7f0000000000)={0x3}, 0x0, 0xfffffffffffffcf2) shutdown(r0, 0x0) 22:29:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2196.628061] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2196.643631] SELinux: failed to load policy 22:29:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2196.788038] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2196.802509] SELinux: failed to load policy 22:29:00 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2196.882954] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2196.892537] SELinux: failed to load policy [ 2196.988311] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2197.016745] SELinux: failed to load policy 22:29:01 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x399, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:01 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf100, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:01 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/143, 0x8f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e006a9) shutdown(r2, 0x0) readv(r1, &(0x7f0000000940)=[{&(0x7f0000000100)=""/115, 0x73}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) shutdown(r3, 0x0) [ 2198.114533] nla_parse: 5 callbacks suppressed [ 2198.114546] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2198.177523] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2198.200229] SELinux: failed to load policy 22:29:02 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:02 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000020000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:02 executing program 0: setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0x66, &(0x7f0000000100), 0xc) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd26, 0x0, 0x0, 0x800e00707) r1 = fcntl$dupfd(r0, 0x0, r0) ppoll(&(0x7f0000000080)=[{r0, 0x27}, {r0, 0x2}], 0x2, 0x0, 0x0, 0x0) ppoll(&(0x7f00000004c0)=[{r1}], 0x38, &(0x7f0000000000)={0x3}, 0x0, 0xfffffffffffffcf2) shutdown(r0, 0x0) [ 2198.520440] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:29:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2198.607732] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2198.632105] SELinux: failed to load policy 22:29:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2198.757148] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2198.921423] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:02 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2199.019226] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2199.123928] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2199.343393] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2199.673781] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2199.940875] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2200.197421] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:04 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x39a, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:04 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf101, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) 22:29:04 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2200.475663] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2200.558690] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:04 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00003f000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2200.949505] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2201.014588] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:04 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2201.059502] sel_write_load: 5 callbacks suppressed [ 2201.059509] SELinux: failed to load policy 22:29:05 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2201.143405] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2201.166939] SELinux: failed to load policy [ 2201.273732] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2201.296363] SELinux: failed to load policy 22:29:05 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) r1 = dup3(r0, r0, 0x80000) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0x7) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, {0x306, @local}, 0x40, {0x2, 0x4e21, @broadcast}, 'team_slave_0\x00'}) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000180)="c61420b5cfe38d929933bc00983cbcc753f4e874ef819506e3579b5c5b2b0acc4d7937f995f9f8e3f87349f095f352fd3174d5de075a300f999a03fd4d7f48b3127a9bf1fd1d6b62f7ee48fdecc8642cd79ec6b4", 0x54, 0x9}, {&(0x7f0000000200)="88b9252da1f3aed988612e7ae4efe33868dfdef8b7c622917d0b38aeeee4587738171f3d8f67cdc3d0d6f1bef1432d10db00e6a2970a01ac4ae8b08b5959c08beffcb3ccac7f89a420574e8d315899bf1c4e292f585cde5e20506183755a", 0x5e, 0x81}], 0x40, &(0x7f00000002c0)={[{@fsync_mode_strict='fsync_mode=strict'}, {@adaptive_mode='mode=adaptive'}], [{@permit_directio='permit_directio'}]}) [ 2201.417231] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2201.425486] SELinux: failed to load policy [ 2201.489843] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2201.515493] SELinux: failed to load policy [ 2201.535066] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2201.542578] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2201.558021] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 2201.567301] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2201.577080] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 2201.593320] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2201.602718] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 2201.620873] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2201.628772] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 2201.917500] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:06 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x39b, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:06 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2202.237030] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2202.264206] SELinux: failed to load policy 22:29:06 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf200, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:06 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) getsockname(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2202.954422] erofs: read_super, device -> /dev/loop0 [ 2202.975159] erofs: options -> [ 2202.978608] erofs: cannot find valid erofs superblock [ 2203.006847] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2203.027811] SELinux: failed to load policy 22:29:07 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:07 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x2) 22:29:07 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000040000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:07 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) getsockname(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2203.173757] nla_parse: 3 callbacks suppressed [ 2203.173778] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2203.230151] SELinux: failed to load policy 22:29:07 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x3) [ 2203.346429] SELinux: failed to load policy 22:29:07 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x4) [ 2203.396800] erofs: read_super, device -> /dev/loop0 [ 2203.420360] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2203.420907] erofs: options -> [ 2203.451029] erofs: cannot find valid erofs superblock [ 2203.461332] SELinux: failed to load policy 22:29:07 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x5) 22:29:07 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x6) 22:29:07 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x39c, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:07 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) getsockname(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2203.842551] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2204.044316] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2204.045631] erofs: read_super, device -> /dev/loop0 [ 2204.071392] erofs: options -> [ 2204.075726] erofs: cannot find valid erofs superblock [ 2204.282593] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2204.544417] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2204.801721] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:29:08 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf201, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:08 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x7) [ 2205.052328] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2205.362755] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2205.642529] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:29:09 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:09 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) getsockname(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:29:09 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x8) 22:29:09 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x39d, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:09 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac008740000000000000000000", 0x2e}], 0x1}, 0x0) [ 2205.911480] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2206.002373] SELinux: truncated policydb string identifier 22:29:09 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x9) [ 2206.100880] erofs: read_super, device -> /dev/loop0 [ 2206.117369] erofs: options -> [ 2206.135811] erofs: cannot find valid erofs superblock [ 2206.142582] SELinux: truncated policydb string identifier 22:29:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0xa) [ 2206.160350] sel_write_load: 6 callbacks suppressed [ 2206.160356] SELinux: failed to load policy [ 2206.187275] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2206.201901] SELinux: failed to load policy 22:29:10 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) getsockname(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) 22:29:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0xb) [ 2206.282755] SELinux: truncated policydb string identifier [ 2206.295376] SELinux: failed to load policy [ 2206.450249] SELinux: truncated policydb string identifier [ 2206.467830] SELinux: failed to load policy 22:29:10 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0xc) [ 2206.525652] erofs: read_super, device -> /dev/loop0 [ 2206.535700] erofs: options -> [ 2206.549824] erofs: cannot find valid erofs superblock [ 2206.561874] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2206.574948] SELinux: failed to load policy [ 2206.629659] SELinux: truncated policydb string identifier [ 2206.651358] SELinux: failed to load policy 22:29:10 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf300, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:10 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) getsockname(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000000d067000660000007000000"}, 0x20) [ 2206.774248] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2206.928026] erofs: read_super, device -> /dev/loop0 [ 2206.933194] erofs: options -> [ 2206.940532] erofs: cannot find valid erofs superblock [ 2206.955761] SELinux: policydb table sizes (24582,7) do not match mine (6,7) [ 2206.963688] SELinux: failed to load policy 22:29:12 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0xd) 22:29:12 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) getsockname(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) 22:29:12 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000048000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:12 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x39e, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2208.189323] nla_parse: 4 callbacks suppressed [ 2208.189332] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2208.279168] SELinux: truncated policydb string identifier [ 2208.285140] SELinux: failed to load policy 22:29:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0xe) [ 2208.377292] erofs: read_super, device -> /dev/loop0 [ 2208.400589] erofs: options -> [ 2208.414126] erofs: cannot find valid erofs superblock [ 2208.453940] SELinux: truncated policydb string identifier [ 2208.460071] SELinux: failed to load policy 22:29:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0xf) 22:29:12 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) getsockname(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0) [ 2208.560920] SELinux: truncated policydb string identifier [ 2208.567271] SELinux: failed to load policy 22:29:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x10) 22:29:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x11) [ 2208.741813] erofs: read_super, device -> /dev/loop0 [ 2208.754465] erofs: options -> [ 2208.774013] erofs: cannot find valid erofs superblock 22:29:12 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf301, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:12 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x12) [ 2208.943957] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2209.311910] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2209.564069] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:29:13 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x9}) 22:29:13 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:13 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x13) [ 2209.815024] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2210.010422] erofs: read_super, device -> /dev/loop0 [ 2210.053171] erofs: options -> [ 2210.073000] erofs: cannot find valid erofs superblock [ 2210.471948] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2210.742493] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:14 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00004c000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:14 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x14) 22:29:14 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) 22:29:14 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x39f, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:14 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf400, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2211.010811] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:29:14 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x15) [ 2211.170799] erofs: read_super, device -> /dev/loop0 22:29:15 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x16) [ 2211.200789] sel_write_load: 5 callbacks suppressed [ 2211.200796] SELinux: failed to load policy [ 2211.211482] erofs: options -> [ 2211.226528] erofs: cannot find valid erofs superblock 22:29:15 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) [ 2211.332143] SELinux: failed to load policy 22:29:15 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x17) [ 2211.490457] SELinux: failed to load policy 22:29:15 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x18) [ 2211.532056] erofs: read_super, device -> /dev/loop0 [ 2211.556175] erofs: options -> [ 2211.583427] erofs: cannot find valid erofs superblock [ 2211.604315] SELinux: failed to load policy [ 2211.742090] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:15 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:15 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x19) [ 2211.853994] SELinux: failed to load policy [ 2212.157388] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:29:17 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00025a000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:17 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, 0x0) 22:29:17 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x1a) 22:29:17 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf401, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:17 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:17 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2213.509210] nla_parse: 4 callbacks suppressed [ 2213.509257] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2213.525127] SELinux: failed to load policy 22:29:17 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x1b) [ 2213.631659] erofs: read_super, device -> /dev/loop0 [ 2213.654104] erofs: options -> [ 2213.665648] erofs: cannot find valid erofs superblock 22:29:17 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x1c) [ 2213.711709] SELinux: failed to load policy 22:29:17 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x1d) 22:29:17 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) dup2(0xffffffffffffffff, r0) [ 2213.773635] SELinux: failed to load policy [ 2213.837048] SELinux: failed to load policy 22:29:17 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x1e) [ 2214.001121] SELinux: failed to load policy 22:29:17 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x25) [ 2214.027647] erofs: read_super, device -> /dev/loop0 [ 2214.041763] erofs: options -> [ 2214.054840] erofs: cannot find valid erofs superblock [ 2214.115509] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2214.515837] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2214.789455] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2215.061360] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:19 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000060000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:19 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x54) 22:29:19 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) syz_mount_image$erofs(&(0x7f00000004c0)='erofs\x00', &(0x7f0000000500)='./file0\x00', 0x1000, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="07e2caba408dfd203af8fe1bd7133c0edb2c7e32a2dc18bc313fb0d1dbc2420cc1bf9ef49d31d83a822cc005c841efabfcb079d0cc086e2aba64a5336874f36d7b9408e3cc399169f6c7aca7c08f1a8df898bcad20431626045b12877a4d2adae68d179e62053c32225913e7", 0x6c}], 0x10080, 0x0) 22:29:19 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf500, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:19 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2215.321493] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2215.401758] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2215.547089] erofs: read_super, device -> /dev/loop0 [ 2215.557846] erofs: options -> [ 2215.561988] erofs: cannot find valid erofs superblock 22:29:19 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a1, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:19 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x60) 22:29:19 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) [ 2215.820476] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2215.903692] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:19 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x3b9) 22:29:19 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) [ 2216.044720] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:19 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x4000000) 22:29:20 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) [ 2216.740950] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2217.017476] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2217.297024] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2217.540876] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:21 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000068000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:21 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 22:29:21 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x200003a0) 22:29:21 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf501, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:21 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:21 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a2, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:21 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:21 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2218.001231] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2218.014423] sel_write_load: 4 callbacks suppressed [ 2218.014429] SELinux: failed to load policy 22:29:21 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:22 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:29:22 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff0400000000000000204c696e757803000000000000000600180007000000"], 0xfffffe66) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7fff, 0x2000) accept4$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x2711}, 0x10, 0x80000) [ 2218.202988] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2218.213467] SELinux: failed to load policy 22:29:22 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000004c0)=ANY=[], 0x0) [ 2218.681935] nla_parse: 1 callbacks suppressed [ 2218.681944] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2218.951440] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2219.207118] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:23 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00006c000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:23 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8c7f7cf90800000053d06700060000000700000042d5910000000000000000"], 0x20) r1 = dup2(r0, r0) write$P9_ROPEN(r1, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0xc8, 0x4, 0x4}, 0x3448a337}}, 0x18) 22:29:23 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) [ 2219.463149] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2219.542994] SELinux: policydb magic number 0xf97c7f8c does not match expected magic number 0xf97cff8c [ 2219.567774] SELinux: failed to load policy [ 2219.573760] SELinux: policydb magic number 0x18 does not match expected magic number 0xf97cff8c [ 2219.585840] SELinux: failed to load policy [ 2219.594205] SELinux: policydb magic number 0xf97c7f8c does not match expected magic number 0xf97cff8c [ 2219.604987] SELinux: failed to load policy [ 2219.854605] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:29:24 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf600, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2220.154045] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 22:29:24 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="0f000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:24 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 22:29:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) set_thread_area(&(0x7f0000000000)={0x40, 0x20000000, 0x0, 0x1ff, 0xfff, 0x1, 0x200, 0x40, 0x4, 0x100000000}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x121100, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000780)={0x9a, 0x5, 0x7fffffff, 0xffffffff}) r4 = getgid() r5 = getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) getresgid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)=0x0) r12 = getuid() lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000800)={0x0, 0x0}) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000740)={0x1d92, 0x0, 0x0, 0xad4, 0x4, {0x8, 0x7}, 0x1}) sendmsg$netlink(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)={0x10, 0x34, 0x8, 0x70bd25, 0x25dfdbff}, 0x10}], 0x1, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0]}}, @rights={{0x2c, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}], 0x150, 0x890}, 0x80) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:24 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a3, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2220.445304] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:24 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) [ 2220.508061] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2220.542497] SELinux: failed to load policy 22:29:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "fea6e94154b273320fb8b8222be5a411aaf5459d9d8dc16552cd8d5d5a4942c8ada774c54eec9d46431f599d34b27d5832144a7d63ffe33f739420d018c22437f9a8ddbfab18c6c4cb04d2e4a7c022f6c369476ed61cf2e4cc97af1f245b7b5e667ee6f83ebfed08804de5e5e7177bc7924ceb6e994d149e9620538488230b96c782ee"}, 0x93) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:24 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000001a00)={0x0, @raw_data="30489d4dbde048679f99c3751a39f6e01a9d389498d32385c6cea6e3590a28e409ed7fd6237a494bd87281810100d784f845832b742a1ddc832a2c54abc2a11e5593f320a67b11cc68fce86b3834c647e772844e77e3adae6abbe420ae1f5f5b270490e3a323e79626a78697a06fec70c40aa770dca472812dfdfee44d10411ed77c2e4862ab3082a0009e1da16da73f71d1ecd70cfc49ebda0743b0ecaa30700794a77980146232754a440aa78078203aae5efafac242107a36c2bbdef0a71457c7c28bf816cc05"}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 22:29:24 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="14000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2220.680722] SELinux: policydb version 1105831678 does not match my version range 15-31 [ 2220.718999] SELinux: failed to load policy [ 2220.746446] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2220.773941] SELinux: failed to load policy [ 2220.802889] SELinux: policydb version 1105831678 does not match my version range 15-31 [ 2220.822521] SELinux: failed to load policy [ 2220.827943] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2220.843432] SELinux: failed to load policy 22:29:24 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000074000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:24 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 22:29:24 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff09000000000053a045200900006bd7c64000781200000700000000060000"], 0x20) [ 2221.043965] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2221.105844] SELinux: policydb magic number 0x9ff8c does not match expected magic number 0xf97cff8c 22:29:25 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf601, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:25 executing program 1: r0 = dup(0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000080)={0x7b, @dev={0xac, 0x14, 0x14, 0x25}, 0x4e20, 0x3, 'lblc\x00', 0x4, 0x8001, 0x20}, 0x2c) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xcf82, 0x88800) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x5, {0x1f, 0x81, 0xfffffffffffffff7, 0x4}}) connect$rose(r1, &(0x7f00000000c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, 0x1, @null}, 0x1c) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1f, 0x40000) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000001d06700060000000700000014259341d7d85530b989412d08e9d00928b88500bddf2ed8c9cf68adb48d66134c73a294879ff989d0d4bcdc0690c5fa6063f5cda272adc4b2a1318702b9f8bc06343056905b19b9de51358a6df19e0ce80630f105d8f8970cbd6d19a720a7aa1fffd0e0512418157abe483cb23f265e45dc4598092f41726259dfc7da64c9bdfcddcfd4b995a5d1b740639504a2766194b97dbc900ca39c6c8c194d2bcb77cbedae6521428132cfc0a9780201994f5ce82414d12b4a489e667070cf14ba7634e9c81613d6ee862888faf3aac695725283cecdf6efd5f574"], 0x20) 22:29:25 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) [ 2221.425096] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2221.484804] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:25 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 22:29:25 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a4, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:25 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x20000, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) fstat(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x200000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@mmap='mmap'}, {@nodevmap='nodevmap'}, {@version_9p2000='version=9p2000'}, {@loose='loose'}, {@cache_none='cache=none'}, {@debug={'debug', 0x3d, 0x4b}}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@fscache='fscache'}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, 'SE Linux'}}], [{@fowner_lt={'fowner<', r3}}, {@appraise_type='appraise_type=imasig'}, {@fowner_lt={'fowner<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@fsname={'fsname', 0x3d, ')posix_acl_access/#vboxnet0posix_acl_access'}}, {@subj_type={'subj_type', 0x3d, '/mime_type'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) r6 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r6, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "1200041010d0670006000000070000000149f59a567a46b40ae70dff00b526d11a94c54ec65613c22232fc662629b1ef7d3a0d8712c2ad32cde219e36d086e5a5ec3d944dec6f4b1e2e542e583baf3ac39b3a099c5df481d54261e8cc2f96b6da677075457dc4ce4eaa48f462ce2c89405862591173e8fcd59a565fa5fa660b779d2a6d499c4ce76e7c29960c37249b47593ada7c661c6e6e202d3712c4babc5732722e63607d8892e"}, 0xffffff9e) 22:29:25 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 22:29:25 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) [ 2222.257525] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:26 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="25000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:26 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYRES32=r0], 0x4) 22:29:26 executing program 0: mkdir(&(0x7f0000000480)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 22:29:26 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00007a000000000000000000", 0x2e}], 0x1}, 0x0) [ 2223.090129] sel_write_load: 2 callbacks suppressed [ 2223.090137] SELinux: failed to load policy 22:29:27 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf700, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:27 executing program 0: mkdir(0x0, 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 22:29:27 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000101000, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000180)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)=ANY=[], 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x100) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f0000000140)={0x3, 0x7}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x305100, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000240)) 22:29:27 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a5, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2223.708740] nla_parse: 3 callbacks suppressed [ 2223.708804] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2223.776744] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2223.800154] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 2223.805867] CPU: 0 PID: 1648 Comm: syz-executor.1 Not tainted 4.19.53+ #25 [ 2223.812920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2223.822299] Call Trace: [ 2223.824916] dump_stack+0x172/0x1f0 [ 2223.828569] warn_alloc.cold+0x7b/0x173 [ 2223.832563] ? zone_watermark_ok_safe+0x260/0x260 [ 2223.837600] ? lock_downgrade+0x810/0x810 [ 2223.841782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2223.847339] ? avc_has_perm+0x404/0x610 [ 2223.851332] __vmalloc_node_range+0x484/0x790 [ 2223.855863] ? sel_write_load+0x1de/0x470 [ 2223.860033] vmalloc+0x6b/0x90 [ 2223.863246] ? sel_write_load+0x1de/0x470 [ 2223.867416] sel_write_load+0x1de/0x470 [ 2223.871897] __vfs_write+0x114/0x810 [ 2223.875636] ? sel_make_policy_nodes+0x1520/0x1520 [ 2223.880593] ? kernel_read+0x120/0x120 [ 2223.884506] ? __lock_is_held+0xb6/0x140 [ 2223.888598] ? rcu_read_lock_sched_held+0x110/0x130 [ 2223.893647] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2223.898427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2223.903988] ? __sb_start_write+0x1ac/0x360 [ 2223.908339] vfs_write+0x20c/0x560 [ 2223.911912] ksys_write+0x14f/0x2d0 [ 2223.915567] ? __ia32_sys_read+0xb0/0xb0 [ 2223.919650] ? do_syscall_64+0x26/0x620 [ 2223.923643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2223.929031] ? do_syscall_64+0x26/0x620 [ 2223.933033] __x64_sys_write+0x73/0xb0 [ 2223.936936] do_syscall_64+0xfd/0x620 [ 2223.940754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2223.945953] RIP: 0033:0x4592c9 [ 2223.949159] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2223.968079] RSP: 002b:00007f05a3026c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 22:29:27 executing program 0: mkdir(0x0, 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 22:29:27 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf701, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2223.975816] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 2223.983096] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 2223.990381] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2223.997664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05a30276d4 [ 2224.004946] R13: 00000000004c9279 R14: 00000000004e0280 R15: 00000000ffffffff 22:29:27 executing program 0: mkdir(0x0, 0x44) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) [ 2224.071821] warn_alloc_show_mem: 1 callbacks suppressed [ 2224.071827] Mem-Info: 22:29:28 executing program 0: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) [ 2224.268598] active_anon:90890 inactive_anon:209 isolated_anon:0 [ 2224.268598] active_file:17737 inactive_file:62468 isolated_file:0 [ 2224.268598] unevictable:0 dirty:143 writeback:0 unstable:0 [ 2224.268598] slab_reclaimable:185611 slab_unreclaimable:411309 [ 2224.268598] mapped:58986 shmem:262 pagetables:1118 bounce:0 [ 2224.268598] free:761089 free_pcp:876 free_cma:0 [ 2224.312075] Node 0 active_anon:360128kB inactive_anon:804kB active_file:70684kB inactive_file:189912kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235944kB dirty:380kB writeback:0kB shmem:1016kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 92160kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2224.349115] Node 1 active_anon:3432kB inactive_anon:32kB active_file:264kB inactive_file:59960kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:192kB writeback:0kB shmem:32kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2224.391647] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2224.394684] Node 0 DMA free:10448kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:308kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2224.427746] lowmem_reserve[]: 0 2555 2557 2557 [ 2224.432662] Node 0 DMA32 free:33896kB min:36248kB low:45308kB high:54368kB active_anon:360128kB inactive_anon:804kB active_file:70684kB inactive_file:189604kB unevictable:0kB writepending:380kB present:3129332kB managed:2619960kB mlocked:0kB kernel_stack:6912kB pagetables:3860kB bounce:0kB free_pcp:1968kB local_pcp:732kB free_cma:0kB [ 2224.468938] lowmem_reserve[]: 0 0 2 2 [ 2224.472902] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2224.500711] lowmem_reserve[]: 0 0 0 0 [ 2224.504653] Node 1 Normal free:3000208kB min:53608kB low:67008kB high:80408kB active_anon:3332kB inactive_anon:32kB active_file:264kB inactive_file:59960kB unevictable:0kB writepending:192kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:544kB pagetables:464kB bounce:0kB free_pcp:1416kB local_pcp:588kB free_cma:0kB [ 2224.534446] lowmem_reserve[]: 0 0 0 0 [ 2224.538852] Node 0 DMA: 4*4kB (UM) 30*8kB (U) 27*16kB (UME) 9*32kB (UME) 8*64kB (UM) 2*128kB (UE) 2*256kB (UE) 2*512kB (UM) 1*1024kB (M) 1*2048kB (E) 1*4096kB (M) = 10448kB [ 2224.560246] Node 0 DMA32: 1378*4kB (UME) 1243*8kB (UMEH) 838*16kB (UME) 80*32kB (UMEH) 9*64kB (UMH) 5*128kB (UH) 1*256kB (U) 0*512kB 1*1024kB (E) 0*2048kB 0*4096kB = 33920kB [ 2224.581250] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2224.593382] Node 1 Normal: 18*4kB (ME) 149*8kB (UME) 14*16kB (UE) 4*32kB (U) 2*64kB (UM) 1*128kB (M) 16*256kB (UE) 16*512kB (UM) 11*1024kB (UE) 5*2048kB (UE) 724*4096kB (UM) = 3001168kB [ 2224.611638] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2224.620944] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2224.630654] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2224.639783] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2224.649053] 80480 total pagecache pages [ 2224.653227] 0 pages in swap cache [ 2224.657288] Swap cache stats: add 0, delete 0, find 0/0 [ 2224.662772] Free swap = 0kB [ 2224.665876] Total swap = 0kB [ 2224.669375] 1965979 pages RAM [ 2224.672555] 0 pages HighMem/MovableOnly [ 2224.676823] 338859 pages reserved [ 2224.680365] 0 pages cma reserved [ 2224.683929] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2224.695306] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 2224.701157] CPU: 1 PID: 1671 Comm: syz-executor.1 Not tainted 4.19.53+ #25 [ 2224.708505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2224.717886] Call Trace: [ 2224.720510] dump_stack+0x172/0x1f0 [ 2224.724198] warn_alloc.cold+0x7b/0x173 [ 2224.728190] ? zone_watermark_ok_safe+0x260/0x260 [ 2224.733090] ? lock_downgrade+0x810/0x810 [ 2224.737439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2224.743018] ? avc_has_perm+0x404/0x610 [ 2224.747024] __vmalloc_node_range+0x484/0x790 [ 2224.751548] ? sel_write_load+0x1de/0x470 [ 2224.755739] vmalloc+0x6b/0x90 [ 2224.758978] ? sel_write_load+0x1de/0x470 [ 2224.763138] sel_write_load+0x1de/0x470 [ 2224.767254] __vfs_write+0x114/0x810 [ 2224.770986] ? sel_make_policy_nodes+0x1520/0x1520 [ 2224.776014] ? kernel_read+0x120/0x120 [ 2224.779922] ? __lock_is_held+0xb6/0x140 [ 2224.784011] ? rcu_read_lock_sched_held+0x110/0x130 [ 2224.789046] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2224.793812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2224.799364] ? __sb_start_write+0x1ac/0x360 [ 2224.803699] vfs_write+0x20c/0x560 [ 2224.807254] ksys_write+0x14f/0x2d0 [ 2224.810896] ? __ia32_sys_read+0xb0/0xb0 [ 2224.814991] ? do_syscall_64+0x26/0x620 [ 2224.818974] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2224.824345] ? do_syscall_64+0x26/0x620 [ 2224.828332] __x64_sys_write+0x73/0xb0 [ 2224.832234] do_syscall_64+0xfd/0x620 [ 2224.836051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2224.841247] RIP: 0033:0x4592c9 [ 2224.844448] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2224.863366] RSP: 002b:00007f05a3005c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2224.871126] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 2224.878411] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 2224.885692] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2224.892989] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05a30066d4 [ 2224.900271] R13: 00000000004c9279 R14: 00000000004e0280 R15: 00000000ffffffff [ 2224.988182] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2225.240152] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2225.493481] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. 22:29:29 executing program 0: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 22:29:29 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[], 0xffffffffffffff3c) r1 = fcntl$dupfd(r0, 0x406, r0) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{0x20, ':vboxnet1l'}, {0x20, '+'}, {0x20, '/selinux/load\x00'}], 0xa, "8532429221eff528b2ca0e644d4333cf23437686b1010681448e4d86c1284355ef4ad38d630b0cf516344f611dae0d412f5f13707c779d6be493939884867669972a"}, 0x69) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0x1, 0x9, 0x2, 0x9, 0x8, 0x3ff}) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0x5}, 0x2) 22:29:29 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="c0000000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:29 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac0000f0000000000000000000", 0x2e}], 0x1}, 0x0) [ 2225.765149] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:29:29 executing program 0: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) [ 2225.840561] SELinux: policydb magic number 0x2e202123 does not match expected magic number 0xf97cff8c [ 2225.876051] SELinux: failed to load policy [ 2225.891958] SELinux: failed to load policy [ 2225.923596] SELinux: policydb magic number 0x2e202123 does not match expected magic number 0xf97cff8c [ 2225.948664] SELinux: failed to load policy 22:29:29 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'caif0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:29 executing program 0: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) [ 2226.070760] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2226.099911] SELinux: failed to load policy [ 2226.329472] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:30 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a6, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:30 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="23020000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:30 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x240, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r2 = getpgid(0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() fcntl$getownex(r1, 0x10, &(0x7f00000004c0)={0x0, 0x0}) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)=0x0) mount$9p_virtio(&(0x7f0000000940)='SE Linux', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='9p\x00', 0x23000, &(0x7f0000000a00)={'trans=virtio,', {[{@mmap='mmap'}, {@dfltgid={'dfltgid', 0x3d, r8}}, {@version_9p2000='version=9p2000'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@seclabel='seclabel'}, {@uid_gt={'uid>', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/vfio/vfio\x00'}}, {@seclabel='seclabel'}]}}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000680)=0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f00000007c0)=0xe8) getgroups(0x2, &(0x7f0000000800)=[0xffffffffffffffff, 0x0]) sendmmsg$unix(r0, &(0x7f00000008c0)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000180)="e85f0a3e504eed52929396e8f32ef82009cc763536ff1f40e4bdce4278a64624669bc21db8f42a15093632f4ff1646abdd8a03f9c654458135d2036c7989213b75386d1227da89ca3c170fba5dc734482704873dfed534d2637daacde523115082ae52598b93c90d5c92934d987b20a884a8ed1d586531a4d5f51ed56160bca53e915aafcfc828faee67604fa4f42de4d337d4eeacaf0c4981fad2179f7c97d8943be5de45992addee0d6346edb6df01eacdf43bbde0308fc9df1affa22c3322362898bbce8b438790732060f305f2f809e2839e25352e97ba826e21a721a2adadaa2afc46551d981f89d242", 0xec}], 0x1, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x24, 0x1, 0x1, [r0, r1, r1, r0, r1]}}, @rights={{0x2c, 0x1, 0x1, [r0, r0, r0, r0, r1, r0, r1]}}], 0x78, 0x8000}, {&(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000440)="69bad84e2b4b4560ee86702e8533381a5a93467f4a9dcdf572f1ee1ad2ddfd6b7e3d5a4529ede7ca6395e1e9291b8e4701181dfceed4ab0f45a5b23779238af372d1d4ca03b07e400c9bea64e767160dcb8a1386b4a2df9ee29eec6b70751861552638bb325af9fc31019e561c0e5dde239593", 0x73}], 0x1, &(0x7f0000000840)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}], 0x58, 0x20000081}], 0x2, 0x1) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:30 executing program 0: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 22:29:30 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf800, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2226.602448] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2226.665839] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:30 executing program 0: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 2226.716356] SELinux: failed to load policy [ 2226.735302] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2226.763186] SELinux: failed to load policy 22:29:30 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf908f8000053452001d0670006ffe6000700"/32], 0x20) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x71d, 0x40000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000040)) 22:29:30 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="c00e0000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2226.914177] SELinux: policydb string length 63496 does not match expected length 8 [ 2226.946406] SELinux: failed to load policy [ 2227.223814] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2227.494620] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:29:31 executing program 0: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 22:29:31 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000fff000000000000000000", 0x2e}], 0x1}, 0x0) 22:29:31 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="e03f0300220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000200)={{0x1, @broadcast, 0x0, 0x0, 'fo\x00', 0x4}, {@dev, 0x4e24, 0x0, 0x0, 0x40}}, 0x44) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fchmod(r1, 0x28) [ 2227.726462] SELinux: policydb string length 63496 does not match expected length 8 [ 2227.734631] SELinux: failed to load policy [ 2227.774789] IPVS: set_ctl: invalid protocol: 1 255.255.255.255:0 [ 2227.940274] IPVS: set_ctl: invalid protocol: 1 255.255.255.255:0 22:29:32 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a7, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:32 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="6e050020220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:32 executing program 0: sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_transmute(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 22:29:32 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf801, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:32 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="00f0ff7f220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:32 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e0000000f0005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2228.887139] nla_parse: 2 callbacks suppressed [ 2228.887185] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:29:32 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="86b9061ed2d420001e049d6b3f57f474a66f7af8e16ab0e3ab5ec79f1e3a6e815a371b40a4de8ba8f4039dd0a393ad17cdd299893bb3d6aff36296b51e94aaac692bca68ea28928dce2a52fc89ce9dc1640e9ead3544a401ff0c6678b7cb49f407f27e432a5e4fd065f45784285a9ef6bddffe766299f4b1", 0x78, 0xfffffffffffffff9) keyctl$update(0x2, r0, &(0x7f0000000180)="e6d9ba27c391cae4c862fdb0aa90f80fea8b56e1771a995302b7f652db57fd05399f7e2199d35dfa416f9bb43121bf4bc1208144e307a7fd9a6698cb0480a1546f052f24de6c0f258d1627f967863b0580ebaeb483cf984ea784fa8eb44ffd1d620edd5b1f30d4eb25899589d9ec0e49a7781ff32bcf03cf9ac2ad46cb46b3b566c896e925d9232d16130d29f9bae4e991e80f2c578e067afa1b369f0a957303d285920f8bad92a63c3f4a4e68a92bcd0b351b74db17740ffb6fb5c448fe2fa3137f6863d6e0ce516b36890f3b2fba130e94d0bab5b373a87e8a5d60", 0xdc) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff5d18b155677c00005345000069d3040007000000"], 0x16) 22:29:32 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e020000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2228.993501] SELinux: policydb magic number 0x185dff8c does not match expected magic number 0xf97cff8c [ 2229.014172] SELinux: failed to load policy 22:29:32 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xa) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f00000000c0)={0xffffffffffffffe0, 0x9, 0x9, 0x4800000000}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f0000000040)={0x6, "512a7c468bac1d05c17b757ac0c6def774883633146e8486b2257e9b4c5460a3", 0x2, 0x1}) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2229.124910] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2229.144286] SELinux: failed to load policy [ 2229.485657] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2229.767397] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:33 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00d2a9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:33 executing program 1: write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf92103000000000000006675781200000001d067000600000007000000"], 0x20) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10000, 0x10000) sendmsg$TIPC_CMD_SHOW_STATS(r0, 0xfffffffffffffffe, 0x90) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000080)) 22:29:33 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e030000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2230.020605] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:34 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a8, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) 22:29:34 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf900, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:34 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[], 0xfffffffffffffeae) 22:29:34 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e040000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2230.404888] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:34 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xe0000000000000, 0x40) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)=ANY=[@ANYBLOB="0700000007a300"], &(0x7f0000000180)=0x12) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@int=0x6, 0x4) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0xfffffffffffffe54, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x3, 0x10b443) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f00000001c0)=0x40000) 22:29:34 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e050000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2230.578135] SELinux: policydb string length -428 does not match expected length 8 [ 2230.601599] SELinux: failed to load policy 22:29:34 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e060000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:34 executing program 1: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) [ 2231.133411] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2231.513588] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2231.790392] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:35 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00d3a9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:35 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:35 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e070000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:35 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r1, 0x0, 0xe8, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xfffffffdfffffffc) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x7) set_tid_address(&(0x7f0000000080)) 22:29:35 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf901, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:35 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3a9, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2232.126504] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2232.145718] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2232.189200] SELinux: failed to load policy 22:29:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) [ 2232.353338] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:36 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e0a0000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2232.409454] SELinux: failed to load policy 22:29:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2232.604248] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2232.623905] SELinux: failed to load policy 22:29:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)={0xf97cff8c, 0xffffffffffffff04, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x8000) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000180)=0xfffffffffffff095, 0x4) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x9, 0x0, 0x10003}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000100)={0x5, r2, 0x10001, 0x9}) 22:29:36 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e0e0000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2232.770547] SELinux: policydb string length -252 does not match expected length 8 [ 2232.792857] SELinux: failed to load policy [ 2232.819035] SELinux: policydb string length -252 does not match expected length 8 [ 2232.865116] SELinux: failed to load policy 22:29:36 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040)={0x2, "9d35"}, 0x3) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000080)=""/42) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2233.027647] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2233.054306] SELinux: failed to load policy [ 2233.065641] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2233.083882] SELinux: failed to load policy [ 2233.273100] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:37 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00d4a9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:37 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e480000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:37 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x105240, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)={0x20000000}) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) 22:29:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x38, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='maps\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) write$eventfd(r0, 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000040)=""/91) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 22:29:37 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfa00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:37 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3aa, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:38 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2234.160644] nla_parse: 2 callbacks suppressed [ 2234.160690] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:38 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e4c0000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2234.276410] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2234.304924] SELinux: failed to load policy 22:29:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x13) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x501800, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) r4 = gettid() sendmsg$nl_generic(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20008}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x11f0, 0x26, 0x4, 0x70bd26, 0x25dfdbfe, {0x800000000000000}, [@nested={0x14, 0x18, [@typed={0x10, 0x71, @binary="d611f057ce83ccf8de18eefe"}]}, @nested={0x1130, 0x57, [@typed={0x4, 0x81}, @typed={0x8, 0x80, @ipv4=@rand_addr=0x80000000}, @generic="c0e79ea3c7664e0a585dca63ad", @generic="eb855f08532e3c52ebd32fbca78ad751a41482d02f7ab72f5bdfd2bc5f489b11fca0c0d9db01e7ca42e213e3b7f2b4618a1c121150a96ed1f454566ddc54464a848fc54f7ac93953957962da018285901b7bffcfdf12c9759b71203d6da13667ae02d1fbb7e2905dcf9fc79bb77070fb014809959aa273735f8d3b2c49e5500cb82f59a4fbb26a48af431a9df409f6a389454439325f8ed0c77c532baca8c40dba8582046ea083eeeaf538a49ec22f9828fb50a923e01f464bca5c11379cb40025398a0b5d683f98b894f5c0b1766a6f4855177f5e85", @generic="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", @typed={0xc, 0x50, @u64=0x7}, @typed={0x1c, 0x85, @str='procsystem/%*security\'&\x00'}, @typed={0x8, 0x56, @fd=r1}, @typed={0xc, 0x88, @u64=0x13aa}]}, @typed={0x8, 0x9, @u32=0x8}, @typed={0x8, 0x79, @fd=r2}, @nested={0xc, 0x19, [@typed={0x8, 0x92, @uid=r3}]}, @nested={0x7c, 0x4e, [@typed={0x4, 0x35}, @typed={0x8, 0x2c, @pid=r4}, @generic="c4df4a00a1cd904d206c21f63fd7237e22b230413135cad047bc7e4cf3b2c4b43fc4195178d0ccd502f44484ed1a9cdd9acdf8db8a3e21c89a25a1b98cb65e6e88cd14501ca859b220fbcbdd1aabb7802aac2275777a4c37d31991fe3c77719f1048684d9a39fe0de6"]}]}, 0x11f0}, 0x1, 0x0, 0x0, 0x4000}, 0x1) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) write$FUSE_DIRENT(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="1000070069d9e8a4ab75084e00de00f5"], 0x10) write$selinux_load(r5, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2234.488085] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2234.507557] SELinux: failed to load policy 22:29:38 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000080)={0x3, 0x4}) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) 22:29:38 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e600000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2234.618190] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2234.640986] SELinux: failed to load policy [ 2234.648140] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:38 executing program 1: r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000240)=0x2, 0x80000) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000280)={0x18, "01f840eb937f403064993f332dc53a48189b83f85fd77cfe17359ff95a929b136bae98908c238b80170aa503b3453a53937ea451e271cc1aedf0220a95e18e5dca3d447229ed54c8459bdb3af3eebc3bb90087fda930dbd46c62486c59cef54b2d75ee9be3104259f88026ed640da108ccbc3e3793126ba39173a592f6b9baf5"}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x3) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000600)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f00000004c0)=0x70) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000500)={r3, @in6={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800}}, 0x2, 0x1, 0x20000000000, 0x80000000, 0x19}, &(0x7f00000005c0)=0x98) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000000c0)=0x8) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000400)={0x0, 0x81, 0x2, [], &(0x7f00000003c0)={0x990a61, 0x5, [], @p_u16=&(0x7f0000000100)=0xfffffffffffffffc}}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r3, 0x80000001, 0x6}, &(0x7f0000000480)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000180)={r5, @in6={{0xa, 0x4e24, 0xde, @mcast1, 0x5}}, 0x100000000, 0x0, 0x1000, 0x5, 0x20}, 0x98) [ 2234.666425] SELinux: failed to load policy [ 2234.760427] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2234.783156] SELinux: failed to load policy [ 2234.832357] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2234.841333] SELinux: failed to load policy [ 2235.261654] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2235.812071] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2236.182782] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:40 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00d5a9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:40 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e680000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:40 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000080)=0x6) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0xfffffffffffffd7b, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) 22:29:40 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2236.573354] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2236.655616] SELinux: policydb string length -645 does not match expected length 8 [ 2236.681977] SELinux: failed to load policy 22:29:41 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfa01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:41 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3ab, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:41 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000003580)={0x0, 0x12, "f73a3332059f0ab490eccf887cd4f6c47c83"}, &(0x7f00000035c0)=0x1a) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000003600)={r2, 0x7fff}, &(0x7f0000003640)=0x8) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0xf412, 0x4) write$selinux_load(r0, &(0x7f00000024c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000001d067000600000007000000533234e571d262ddb32f603156a5b789e3745f0ead340bce740382c551a33c4c493f9f324259944b52f595dd04d222badc7bbde6f92921f49c4c2d58553186323c00e27c"], 0xffffffffffffffc2) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000100)={0x6, &(0x7f0000000000)=""/208, &(0x7f00000023c0)=[{0x7fffffff, 0x6d, 0x800, &(0x7f0000000180)=""/109}, {0x101, 0x1000, 0x1000, &(0x7f00000003c0)=""/4096}, {0xd4, 0x1000, 0x1, &(0x7f00000013c0)=""/4096}, {0x7, 0x4f, 0xffffffffffff0000, &(0x7f0000000200)=""/79}, {0x1, 0x61, 0x1ff, &(0x7f0000000280)=""/97}, {0x8, 0x69, 0x8, &(0x7f0000000300)=""/105}]}) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000380)={0x0, 0x6}, &(0x7f0000002480)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000002540)={r3, 0x0, 0x1000, "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"}, 0x1008) 22:29:41 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e6c0000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2237.450047] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:41 executing program 1: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) [ 2237.630093] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2237.650467] SELinux: failed to load policy [ 2237.663134] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:41 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e740000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2237.693224] SELinux: failed to load policy 22:29:41 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) getgid() r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100000001, 0x20000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x8, 0x4) 22:29:41 executing program 1: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000080)='/selinux/load\x00', &(0x7f00000000c0)=')cpusetvmnet0vboxnet0!\x00', &(0x7f0000000100)='^.\x00', &(0x7f0000000180)='bdevcpuset\x00', &(0x7f00000001c0)='^wlan0userppp0\\\x00', &(0x7f0000000200)='/selinux/load\x00'], &(0x7f0000000540)=[&(0x7f0000000280)='/selinux/load\x00', &(0x7f00000002c0)='%]ppp1\x00', &(0x7f0000000300)='SE Linux', &(0x7f0000000340)='vboxnet1\x00', &(0x7f00000003c0)='+\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='/selinux/load\x00', &(0x7f00000004c0)='/selinux/load\x00', &(0x7f0000000500)='SE Linux']) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000005c0)={'nlmon0\x00', {0x2, 0x40, @dev={0xac, 0x14, 0x14, 0x18}}}) [ 2237.807087] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2237.815632] SELinux: failed to load policy [ 2237.823366] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2237.907577] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2237.919310] SELinux: security policydb version 18 (MLS) not backwards compatible 22:29:42 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00d6a9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:42 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e7a0000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:42 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0xfffffffffffffd50) [ 2238.183978] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2238.384021] audit: type=1400 audit(1560983382.185:89): avc: denied { map } for pid=1990 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14956 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 2238.750360] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2238.763646] IPVS: ftp: loaded support on port[0] = 21 [ 2239.153723] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2239.785318] chnl_net:caif_netlink_parms(): no params data found [ 2239.824482] bridge0: port 1(bridge_slave_0) entered blocking state [ 2239.831036] bridge0: port 1(bridge_slave_0) entered disabled state [ 2239.839327] device bridge_slave_0 entered promiscuous mode [ 2239.846912] bridge0: port 2(bridge_slave_1) entered blocking state [ 2239.853798] bridge0: port 2(bridge_slave_1) entered disabled state [ 2239.862512] device bridge_slave_1 entered promiscuous mode [ 2239.944344] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2239.959532] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2239.981303] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2239.990686] team0: Port device team_slave_0 added [ 2240.041237] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2240.051980] team0: Port device team_slave_1 added [ 2240.058243] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2240.066468] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2240.139467] device hsr_slave_0 entered promiscuous mode [ 2240.177322] device hsr_slave_1 entered promiscuous mode [ 2240.218543] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2240.278919] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2240.303304] bridge0: port 2(bridge_slave_1) entered blocking state [ 2240.310241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2240.317393] bridge0: port 1(bridge_slave_0) entered blocking state [ 2240.323768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2240.460855] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2240.467016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2240.478975] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2240.534866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2240.554353] bridge0: port 1(bridge_slave_0) entered disabled state [ 2240.574715] bridge0: port 2(bridge_slave_1) entered disabled state [ 2240.583508] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2240.599696] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2240.605803] 8021q: adding VLAN 0 to HW filter on device team0 [ 2240.650523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2240.663993] bridge0: port 1(bridge_slave_0) entered blocking state [ 2240.670494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2240.687612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2240.696875] bridge0: port 2(bridge_slave_1) entered blocking state [ 2240.703221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2240.781845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2240.788992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2240.799607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2240.809449] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2240.823133] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2240.868017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2240.883209] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2240.895112] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2240.902717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2240.911743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2240.924377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2240.979454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2240.989028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2241.001925] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2241.008506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2241.078288] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2241.094424] 8021q: adding VLAN 0 to HW filter on device batadv0 22:29:45 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) 22:29:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9000001d0670006000000b4d5c20200"/32], 0x20) 22:29:45 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2ef00000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:45 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3ac, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:45 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfb00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:45 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00d7a9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x9) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10001, 0x200) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xfffffffffffffbff) chroot(&(0x7f0000000180)='./file0\x00') ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000040)=""/221) [ 2241.476913] SELinux: policydb string length -805240832 does not match expected length 8 [ 2241.484418] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2241.511509] sel_write_load: 3 callbacks suppressed [ 2241.511515] SELinux: failed to load policy 22:29:45 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000300220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2241.636596] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2241.664076] SELinux: failed to load policy [ 2241.684587] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2241.705535] SELinux: failed to load policy 22:29:45 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000340)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000003c0)={@mcast1, 0x5, r3}) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x98, r2, 0x600, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="d0301c694994fdf949eaa06585a3a645"}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x66e}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x10001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000090}, 0x8084) 22:29:45 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000500220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:45 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2241.883222] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2241.932439] SELinux: failed to load policy 22:29:45 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000600220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:45 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000700220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:46 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) 22:29:46 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000a00220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2242.622814] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2242.653410] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2242.669376] SELinux: failed to load policy [ 2242.925877] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2243.225185] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:47 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3ad, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:47 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000e00220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:47 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) 22:29:47 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00d8a9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:47 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfb01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0xfffffd5a, 'SE Linux', "1200000001d067000600000007000000e1ddbf8ea95e6c88022cea0988db2b9a1fc57c2da68798e4a7b9060401522c190e854fd70d999475e8e1b06e109a81e2c3687a6441bb8b2fe30000000000af3ae7d67e0000860ac5"}, 0x20) r1 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9ae, 0x501000) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) clone(0x22000, &(0x7f0000000140)="cfc113e86bdd015ffdf6825882fe2141882ff8286e644ef66aa903653c60fa87bb735ee8de5fcea3da605663a6ac6f9a2597be22bf370eb2df8e4d5e21d57ffd67e765cfe40dddd5acb66c3ca485c2242499300335daba59941de3efa78c4d412be03c3e8ae20d1a86c583026f2563ffae4fc59937e9f217e1bccdb39fa362e28779444ebb0de85970c2a5ae23d4dce4622232f2e809edc268a98806d74b6d355417169ca41a77faa11c1d6ae964de3639d27178c97199f38d06bd5c8a2dea63f1563113be00f44142b37c79bb56b4bc5edd927fdb7afa8124c60b5636893f012115ae028ee9b11305458fb99241e6d34b9eaef6", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000240)="e74b6fb15c150dc05569b1e5dd074593a8076ef2d4804446ca228fdc935f1fb5") r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x200000, 0xa0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000300)={0x7, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}]}) [ 2243.631651] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:29:47 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2243.774698] SELinux: policydb string length -678 does not match expected length 8 22:29:47 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2243.824682] SELinux: failed to load policy 22:29:47 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e922c00220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2243.891455] SELinux: policydb string length -678 does not match expected length 8 [ 2243.974953] SELinux: failed to load policy 22:29:47 executing program 0: connect$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(0xffffffffffffffff, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) 22:29:47 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000180)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000e55a10b2d0e2099ed34807fe1128f82ca508bf44ebe9aabe85ce7529865909eb2f2b7a7f1b81426f0872f82c5230e02afc23568b1bb582b8305a7c9ddf96b07821fac72664d56769208160f27841fb0418c4e0615bcf166119cf8005001ff7cc41c6ece20218d3228295c21d20687cbe5b67402e34969fffe4e5e0e8ac00000000798bc5ddad250a0ce738c86ab7f358b5faea0ce9f52f6d9a47bef6aa83a9361a1ff67789283d1182d33497ea51749d360fda431076e5493226da6590d6f4f4cce5238fdb681592082b726847f0332267ef36685932f4581202c741ad5535f1e09f91e368bacba75c08a7632e43cc60"}, 0x110) 22:29:48 executing program 0: connect$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(0xffffffffffffffff, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2244.306155] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2244.352115] SELinux: failed to load policy [ 2244.693164] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2244.987287] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2245.334341] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2245.604557] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:49 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3ae, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:49 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e003f00220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:49 executing program 0: connect$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(0xffffffffffffffff, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) 22:29:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7c5686781241aa53dd4e174a4ee6f71ee682120fc10108008615f120d98ac7f13df6f76a7060439a6fa765540396de1ea6d7ca8ff470c56f0251000000000000040000000000000000000000000000000000000000000000008e9c2d983151"], 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, 0x0, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0xffffffffffffffff}, 0x30) sched_setaffinity(r2, 0x8, &(0x7f0000000400)=0x1d5a) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0xffffffffffffffff, 0x0) ioctl$TCXONC(r4, 0x540a, 0x100001) listen(0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r7 = getpgrp(0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r4, &(0x7f0000000740)) lstat(&(0x7f0000000680)='./file0/file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000003100)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000003200)=0xe8) r10 = getgid() getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000003240)={0x0, 0x0}, &(0x7f0000003280)=0xc) sendmmsg$unix(r6, &(0x7f00000034c0)=[{&(0x7f0000000900)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002e80)=[{&(0x7f0000002dc0)}, {0x0}], 0x2, 0x0, 0x0, 0x80}, {&(0x7f0000002f40)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="000000000000000000000000010000000100000076c2fedca46376e918af32c710bd5fc7d5c6e17ad42f231b4db6d66346b7554f25cb7f039a671cb233d09f54f7dba38524960d0f077302869a91428e4e307951978b42425af247f0855a2735a7e868757583ac23fa5c23d03df5ab3903af34ae146dc08a4debb85b428b37385be0d61c81ce8a28debbfcd93eda13080efd45bd259571ddcf97ac09894b6c29d6e477161c652548d516d83514deec902fad183f43eac39488aa7e311be393e5b3299b35ebf3da4fc866fe9460d43c", @ANYRES32=r3, @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r8, @ANYRES32=r5, @ANYBLOB="1c000000000000000100000002000000f9e5a9cbfa1d8d118863404b3d7e841344b911014ce19f578300477a7da2a0071544582e2780d0b3d3cbe069ec9da9af2c129445cd5a1dcc95baf2b0abe576ada93b829ade2cae7b8fcbf9d95fcffe4e345d83195b5056439d7ec7221a0300000000000000e39144d03b489f3cffb14c7487bc739bcf38", @ANYRES32=0x0, @ANYRES32=r11, @ANYRES32=0x0, @ANYBLOB="6ce80700000000f3ffffff000100000001000000", @ANYRES32=r3, @ANYRES32=r1, @ANYRES32, @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r1, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r5, @ANYRES32], 0xa8, 0x8010}], 0x2, 0x4) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) setpriority(0x0, r7, 0x10000) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{}, {0x2}]}, 0x14, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0/file0\x00', 0x0, &(0x7f0000000b00)='TRUE', 0x2b5, 0xd) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) recvfrom(r4, &(0x7f0000000140)=""/98, 0xfffffffffffffef6, 0x40000022, 0x0, 0x1dd) getdents64(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f00000003c0)='security.capability\x00', 0xfffffffffffffffd) 22:29:49 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfc00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:49 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00d9a9020000000000000000", 0x2e}], 0x1}, 0x0) [ 2245.966286] SELinux: policydb magic number 0x567cff8c does not match expected magic number 0xf97cff8c [ 2245.988414] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2246.013285] SELinux: failed to load policy 22:29:49 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) 22:29:49 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e004800220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:50 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2246.163419] SELinux: policydb magic number 0x567cff8c does not match expected magic number 0xf97cff8c 22:29:50 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75782931f54f1200000001d000"/36], 0x20) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x2c, r2, 0x408, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4810}, 0x20000000) [ 2246.206909] SELinux: failed to load policy 22:29:50 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2246.317938] SELinux: policydb version 1341468969 does not match my version range 15-31 22:29:50 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e004c00220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2246.782359] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2247.074271] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2247.117354] SELinux: policydb version 1341468969 does not match my version range 15-31 [ 2247.133496] sel_write_load: 1 callbacks suppressed [ 2247.133502] SELinux: failed to load policy 22:29:51 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3af, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:51 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) 22:29:51 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e006000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:51 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfc01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2247.407103] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:51 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2247.934592] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:29:51 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00daa9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:51 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) sendto$netrom(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) 22:29:51 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e006800220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:51 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d0417aa60a000007000000"}, 0x20) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) 22:29:51 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(0xffffffffffffffff, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2248.170079] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2248.201223] SELinux: failed to load policy 22:29:52 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e006c00220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2248.235075] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2248.262643] SELinux: failed to load policy 22:29:52 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) r2 = getgid() fchown(r0, r1, r2) [ 2248.448882] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2248.459481] SELinux: failed to load policy [ 2248.478155] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2248.493118] SELinux: failed to load policy [ 2248.724448] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:52 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3b0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:52 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e007400220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:52 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(0xffffffffffffffff, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) 22:29:52 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080045e35345004c696e75781200000001d067000600000007000000"], 0x20) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 22:29:52 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfd00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2249.034847] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2249.094541] SELinux: policydb string length -482017272 does not match expected length 8 [ 2249.136364] SELinux: failed to load policy [ 2249.182283] SELinux: policydb string length -482017272 does not match expected length 8 [ 2249.203015] SELinux: failed to load policy 22:29:53 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00dba9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:53 executing program 1: openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7c0000005345204c696e75781204000001d0670006000000070000000000"], 0x20) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x1, "572fe8c53b5a259c"}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r1, 0x3f}, &(0x7f0000000100)=0x8) 22:29:53 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e007a00220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:53 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(0xffffffffffffffff, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000100)={{0x6, @rose}, [@bcast, @default, @netrom, @remote, @remote, @remote, @null, @netrom]}, 0x48) [ 2249.566031] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2249.626463] SELinux: policydb magic number 0x7cff8c does not match expected magic number 0xf97cff8c [ 2249.643452] SELinux: failed to load policy 22:29:53 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8cfff04ddec15b3bb64c5223e3b2437cf9080000005345204c696e7578120000"], 0x20) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0xffff, 0x4) [ 2249.703345] SELinux: policydb magic number 0x7cff8c does not match expected magic number 0xf97cff8c [ 2249.721104] SELinux: failed to load policy 22:29:53 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2249.855752] SELinux: policydb magic number 0x4df0ff8c does not match expected magic number 0xf97cff8c 22:29:53 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e2c9200220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2249.932632] SELinux: failed to load policy [ 2249.961551] SELinux: policydb magic number 0x4df0ff8c does not match expected magic number 0xf97cff8c [ 2250.380014] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2250.704703] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2251.037046] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:55 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3b1, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:55 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8ceef94c696e75781240000001d067000600000007e3ffffffffffffff000000000000000000"], 0x20) 22:29:55 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e00f000220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:55 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:29:55 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfd01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2251.370622] SELinux: policydb magic number 0x4cf9ee8c does not match expected magic number 0xf97cff8c 22:29:55 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00dca9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:55 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x2200, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x100, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5a}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x58}, 0x1, 0x0, 0x0, 0x200080c5}, 0x4014) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000040)) write$selinux_load(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf90800006e75781200000001d067000600000007000000"], 0x135) 22:29:55 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e0000003f0005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:55 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@netrom, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:29:55 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000200220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2251.887659] SELinux: policydb string length 1845493768 does not match expected length 8 22:29:55 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000300220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:55 executing program 0: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='stat\x00') clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) nanosleep(&(0x7f0000000240)={0x0, r1+30000000}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) prctl$PR_SET_DUMPABLE(0x4, 0x0) sendfile(r2, r0, 0x0, 0x800000000003) [ 2252.547448] nla_parse: 2 callbacks suppressed [ 2252.547457] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2252.640516] SELinux: policydb string length 1845493768 does not match expected length 8 [ 2252.649786] sel_write_load: 3 callbacks suppressed [ 2252.649790] SELinux: failed to load policy [ 2252.915992] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2253.225189] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2253.514132] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:29:57 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3b2, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:57 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000400220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000040)=0x14) read(r1, &(0x7f0000000080)=""/230, 0x163) 22:29:57 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfe00, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="04"], 0x20) [ 2253.649383] SELinux: policydb magic number 0x4 does not match expected magic number 0xf97cff8c [ 2253.670241] SELinux: failed to load policy 22:29:57 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00dda9020000000000000000", 0x2e}], 0x1}, 0x0) 22:29:57 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000380)={0xf97cff8c, 0x8, 'SE Linux', "1200000001d067000600000007000000"}, 0x20) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000180)=0xb) 22:29:57 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000500220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:57 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@get={0x1, &(0x7f0000000000)=""/38, 0x1}) [ 2254.033758] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2254.090802] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2254.136624] SELinux: failed to load policy [ 2254.187743] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2254.203847] SELinux: failed to load policy 22:29:58 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x303, 0x101000) ioctl$TIOCEXCL(r1, 0x540c) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005349204c696e75781200000001d0b1a079e93db0384b000020f54bb4453c4917811696281295ba000000000000"], 0x20) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x16040a, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid={'afid', 0x3d, 0x8}}, {@afid={'afid', 0x3d, 0x7}}, {@cache_none='cache=none'}, {@version_9p2000='version=9p2000'}, {@access_uid={'access', 0x3d, r2}}, {@cache_fscache='cache=fscache'}, {@msize={'msize', 0x3d, 0x1}}, {@access_user='access=user'}], [{@audit='audit'}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor'}}]}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x20) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000200)="5a79cde8dceafd4146e1efd1b4a4c6e2f6fde1ac4244c3e9ca6eb7f9f72979577ce978c71771a8814fdba31443de81ca9690bdeb1d71fa1fc53239f06c8f72737ac3414662374e8c3a98c116bd0a4efc5c17be8010b35bf489452b365c1cc0b66f9975885930e3ca4a3b3c724ae9d33eba7f949f6df72f5e7002675906e94c42dce0bfa063416c607d129abf9e", 0x8d) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 22:29:58 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000600220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2254.368644] SELinux: policydb string SI Linux does not match my string SE Linux [ 2254.413551] SELinux: failed to load policy 22:29:58 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000700220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2254.559605] SELinux: policydb string SI Linux does not match my string SE Linux [ 2254.574730] SELinux: failed to load policy [ 2254.835959] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2255.198908] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2255.465758] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 22:29:59 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3b3, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:59 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000a00220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:29:59 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000000)={0x7, 0x6, 0x9b9, 0x7ff, 'syz1\x00', 0x5}) write$selinux_load(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf90800000053e05b0645204cf185038c696eee9c070a6e26c845d6757812000800000067000007000000fb423f010b50e99248a60b1702fbbf77c78995203a04b56c373fd4a64a5e2323039ce83ca332a8467f02918215f5e47b8b169b9156bc500c1e84cabdc29682bf943c09722ed18032b6f982a1651199dafd52acbabef8017487b9a7d9adb7b281c3cb94f2aaa22489867f3c68c7ec97af4f268135a88c0f3bce1f6cbd68cbfce7775093ffcd124493fd27fee3b628d3a10949f86715f2270c295e09ed9585032a036593e7c73278780a074cc123deb1f42797be2b5c57c764ee3e1900000000000000"], 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@local, 0xfffffffffffffffd, 0x0, 0xff, 0x1, 0xffffffffffff8001, 0x40000000000000}, &(0x7f00000001c0)=0x20) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8000000008000004) 22:29:59 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfe01, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2255.735142] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2255.787676] SELinux: policydb string Sà[E Lñ does not match my string SE Linux [ 2255.807607] SELinux: failed to load policy [ 2255.846379] SELinux: policydb string Sà[E Lñ does not match my string SE Linux [ 2255.872842] SELinux: failed to load policy 22:29:59 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000e00220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 22:30:00 executing program 3: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00dea9020000000000000000", 0x2e}], 0x1}, 0x0) 22:30:00 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000180)={{0x0, 0x1, 0x0, 0x10000, 'syz1\x00'}, 0x3, 0x30000410, 0x1, r1, 0x3, 0x0, 'syz1\x00', &(0x7f0000000080)=['/selinux/load\x00', ')\x00', '/selinux/load\x00'], 0x1e, [], [0x0, 0x1, 0x7, 0x1f]}) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f00000000c0)) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000001d067000600000007000000ee1b8dc3cdcb9ea5ff63"], 0x20) 22:30:00 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e004800220005000000c187185095cf0400b0eba0b4d65cdea9020051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 2256.264152] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2256.357080] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2256.379505] SELinux: failed to load policy [ 2257.754655] nla_parse: 3 callbacks suppressed [ 2257.754667] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2411.596500] INFO: task syz-executor.0:2353 blocked for more than 140 seconds. [ 2411.603820] Not tainted 4.19.53+ #25 [ 2411.608728] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2411.608780] kobject: 'wlan708' (00000000ee4f9786): kobject_cleanup, parent (null) [ 2411.616758] syz-executor.0 D29496 2353 1994 0x00000004 [ 2411.616788] Call Trace: [ 2411.616820] __schedule+0x80d/0x1c70 [ 2411.616844] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2411.616860] ? rwsem_down_write_failed+0x764/0xc30 [ 2411.616876] ? _raw_spin_unlock_irq+0x28/0x90 [ 2411.616892] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2411.616906] schedule+0x92/0x1c0 [ 2411.616919] rwsem_down_write_failed+0x774/0xc30 [ 2411.616937] ? rwsem_down_read_failed+0x3c0/0x3c0 [ 2411.616952] ? kasan_check_write+0x14/0x20 [ 2411.616965] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2411.616976] ? mark_held_locks+0xb1/0x100 [ 2411.616992] ? check_preemption_disabled+0x48/0x290 [ 2411.631196] kobject: 'wlan708' (00000000ee4f9786): calling ktype release [ 2411.631677] call_rwsem_down_write_failed+0x17/0x30 [ 2411.634920] kobject: 'wlan708': free name [ 2411.637893] ? call_rwsem_down_write_failed+0x17/0x30 [ 2411.637914] down_write+0x53/0x90 [ 2411.637932] ? register_netdevice_notifier+0x7e/0x630 [ 2411.637947] register_netdevice_notifier+0x7e/0x630 [ 2411.637963] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 2411.637980] ? __lockdep_init_map+0x10c/0x5b0 [ 2411.637994] ? __dev_close_many+0x300/0x300 [ 2411.638091] raw_init+0x299/0x340 [ 2411.654997] kobject: 'rfkill2827' (0000000027178297): kobject_uevent_env [ 2411.657109] ? can_init_proc.cold+0x16/0x16 [ 2411.657123] can_create+0x288/0x4a0 [ 2411.657145] __sock_create+0x3d8/0x730 [ 2411.657164] __sys_socket+0x103/0x220 [ 2411.657180] ? move_addr_to_kernel+0x80/0x80 [ 2411.657245] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2411.666696] kobject: 'rfkill2827' (0000000027178297): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim2822/ieee80211/phy2822/rfkill2827' [ 2411.670201] ? do_syscall_64+0x26/0x620 [ 2411.796974] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.803018] ? do_syscall_64+0x26/0x620 [ 2411.807087] __x64_sys_socket+0x73/0xb0 [ 2411.811073] do_syscall_64+0xfd/0x620 [ 2411.814861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.820101] RIP: 0033:0x4592c9 [ 2411.823325] Code: Bad RIP value. [ 2411.826761] RSP: 002b:00007f2a6c6adc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2411.834479] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 2411.841923] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d [ 2411.849251] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2411.856628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a6c6ae6d4 [ 2411.863910] R13: 00000000004c7cfa R14: 00000000004de1f8 R15: 00000000ffffffff [ 2411.871646] INFO: task syz-executor.0:2358 blocked for more than 140 seconds. [ 2411.878967] Not tainted 4.19.53+ #25 [ 2411.883188] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2411.891223] syz-executor.0 D29496 2358 1994 0x00000004 [ 2411.896930] Call Trace: [ 2411.899545] __schedule+0x80d/0x1c70 [ 2411.903251] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2411.908341] ? rwsem_down_write_failed+0x764/0xc30 [ 2411.913296] ? _raw_spin_unlock_irq+0x28/0x90 [ 2411.917899] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2411.923100] schedule+0x92/0x1c0 [ 2411.926545] rwsem_down_write_failed+0x774/0xc30 [ 2411.931314] ? rwsem_down_read_failed+0x3c0/0x3c0 [ 2411.936355] ? kasan_check_write+0x14/0x20 [ 2411.940617] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2411.945466] ? mark_held_locks+0xb1/0x100 [ 2411.949681] ? check_preemption_disabled+0x48/0x290 [ 2411.954805] call_rwsem_down_write_failed+0x17/0x30 [ 2411.959946] ? call_rwsem_down_write_failed+0x17/0x30 [ 2411.965148] down_write+0x53/0x90 [ 2411.968662] ? register_netdevice_notifier+0x7e/0x630 [ 2411.973865] register_netdevice_notifier+0x7e/0x630 [ 2411.978933] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 2411.983709] ? __lockdep_init_map+0x10c/0x5b0 [ 2411.988277] ? __dev_close_many+0x300/0x300 [ 2411.992971] raw_init+0x299/0x340 [ 2411.996498] ? can_init_proc.cold+0x16/0x16 [ 2412.000923] can_create+0x288/0x4a0 [ 2412.004558] __sock_create+0x3d8/0x730 [ 2412.008524] __sys_socket+0x103/0x220 [ 2412.012341] ? move_addr_to_kernel+0x80/0x80 [ 2412.016814] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2412.021577] ? do_syscall_64+0x26/0x620 [ 2412.025545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2412.030984] ? do_syscall_64+0x26/0x620 [ 2412.034981] __x64_sys_socket+0x73/0xb0 [ 2412.039229] do_syscall_64+0xfd/0x620 [ 2412.043078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2412.048340] RIP: 0033:0x4592c9 [ 2412.051557] Code: Bad RIP value. [ 2412.055030] RSP: 002b:00007f2a6c68cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2412.062806] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 2412.070109] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d [ 2412.077439] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2412.084713] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a6c68d6d4 [ 2412.092045] R13: 00000000004c7cfa R14: 00000000004de1f8 R15: 00000000ffffffff [ 2412.099377] [ 2412.099377] Showing all locks held in the system: [ 2412.105853] 1 lock held by khungtaskd/1033: [ 2412.108270] kobject: 'phy2822' (00000000d1fd7990): kobject_uevent_env [ 2412.110277] #0: 00000000cae1052e (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 2412.123973] kobject: 'phy2822' (00000000d1fd7990): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim2822/ieee80211/phy2822' [ 2412.125782] 1 lock held by rsyslogd/7671: [ 2412.142305] #0: 0000000072581773 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 2412.146210] kobject: 'ieee80211' (000000007254eaf0): kobject_cleanup, parent (null) [ 2412.150297] 2 locks held by getty/7793: [ 2412.163370] #0: 000000005e230eaa (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2412.166150] kobject: 'ieee80211' (000000007254eaf0): calling ktype release [ 2412.171708] #1: 00000000fed57263 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2412.185572] kobject: 'ieee80211': free name [ 2412.187694] 2 locks held by getty/7794: [ 2412.187704] #0: [ 2412.192698] kobject: 'hwsim2822' (000000001ce00dc3): kobject_uevent_env [ 2412.196029] 0000000008345943 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2412.196070] #1: 0000000045520b27 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2412.196112] 2 locks held by getty/7795: [ 2412.196117] #0: 000000000971c69a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2412.196156] #1: 000000008e23b748 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2412.196191] 2 locks held by getty/7796: [ 2412.196195] #0: 0000000090a1c84a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2412.196220] #1: 00000000112d38e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2412.196248] 2 locks held by getty/7797: [ 2412.196252] #0: 00000000a3b297a7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2412.207414] kobject: 'hwsim2822' (000000001ce00dc3): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim2822' [ 2412.213180] #1: [ 2412.233380] kobject: 'hwsim2822' (000000001ce00dc3): kobject_uevent_env [ 2412.234252] 0000000082cc0533 [ 2412.249895] kobject: 'hwsim2822' (000000001ce00dc3): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim2822' [ 2412.255971] ( [ 2412.271141] kobject: 'hwsim2822' (000000001ce00dc3): kobject_cleanup, parent (null) [ 2412.277119] &ldata->atomic_read_lock [ 2412.295299] kobject: 'hwsim2822' (000000001ce00dc3): calling ktype release [ 2412.296996] ){+.+.} [ 2412.299883] kobject: 'hwsim2822': free name [ 2412.310933] , at: n_tty_read+0x232/0x1b30 [ 2412.319174] kobject: 'phy2822' (00000000d1fd7990): kobject_cleanup, parent (null) [ 2412.321625] 2 locks held by getty/7798: [ 2412.324972] kobject: 'phy2822' (00000000d1fd7990): calling ktype release [ 2412.332081] #0: 0000000072811efb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2412.332128] #1: 000000008aa9f8f3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2412.332175] 2 locks held by getty/7799: [ 2412.332180] #0: 00000000e3006aaa (&tty->ldisc_sem){++++} [ 2412.341139] kobject: 'rfkill2827' (0000000027178297): kobject_cleanup, parent (null) [ 2412.343297] , at: ldsem_down_read+0x33/0x40 [ 2412.355234] kobject: 'rfkill2827' (0000000027178297): calling ktype release [ 2412.355802] #1: [ 2412.365134] kobject: 'rfkill2827': free name [ 2412.370943] 000000002d573740 [ 2412.386215] kobject: 'phy2822': free name [ 2412.389528] (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2412.430329] 3 locks held by kworker/u4:5/20540: [ 2412.435043] #0: 000000002765b0d0 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x87e/0x1750 [ 2412.444662] #1: 00000000a8b10b57 (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 2412.453511] #2: 000000007411ddda (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 2412.461660] 1 lock held by syz-executor.0/2353: [ 2412.466371] #0: 000000007411ddda (pernet_ops_rwsem){++++}, at: register_netdevice_notifier+0x7e/0x630 [ 2412.475872] 1 lock held by syz-executor.0/2358: [ 2412.480704] #0: 000000007411ddda (pernet_ops_rwsem){++++}, at: register_netdevice_notifier+0x7e/0x630 [ 2412.490269] [ 2412.491968] ============================================= [ 2412.491968] [ 2412.499055] NMI backtrace for cpu 0 [ 2412.502688] CPU: 0 PID: 1033 Comm: khungtaskd Not tainted 4.19.53+ #25 [ 2412.509344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2412.518694] Call Trace: [ 2412.521278] dump_stack+0x172/0x1f0 [ 2412.524894] nmi_cpu_backtrace.cold+0x63/0xa4 [ 2412.529559] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 2412.534482] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 2412.539748] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2412.544935] watchdog+0x9df/0xee0 [ 2412.548493] kthread+0x354/0x420 [ 2412.551924] ? reset_hung_task_detector+0x30/0x30 [ 2412.557087] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2412.563220] ret_from_fork+0x24/0x30 [ 2412.567232] Sending NMI from CPU 0 to CPUs 1: [ 2412.572846] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0xe/0x10 [ 2412.573769] Kernel panic - not syncing: hung_task: blocked tasks [ 2412.587201] CPU: 0 PID: 1033 Comm: khungtaskd Not tainted 4.19.53+ #25 [ 2412.595363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2412.604731] Call Trace: [ 2412.607422] dump_stack+0x172/0x1f0 [ 2412.611610] panic+0x263/0x507 [ 2412.615449] ? __warn_printk+0xf3/0xf3 [ 2412.619540] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2412.625692] ? printk_safe_flush+0xf2/0x140 [ 2412.630410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2412.636131] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 2412.641372] ? nmi_trigger_cpumask_backtrace+0x16e/0x1f8 [ 2412.647561] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 2412.653592] watchdog+0x9f0/0xee0 [ 2412.657265] kthread+0x354/0x420 [ 2412.660749] ? reset_hung_task_detector+0x30/0x30 [ 2412.665682] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2412.671647] ret_from_fork+0x24/0x30 [ 2412.677137] Kernel Offset: disabled [ 2412.681002] Rebooting in 86400 seconds..