ffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 323.077202] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 323.148578] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:43 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 323.198311] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:43 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:43 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:44 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:44 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 323.326415] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:44 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:44 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:44 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x14) setsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000080)=0x6, 0x4) [ 323.524037] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:44 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 323.590280] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:44 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 323.636739] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:44 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:44 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:44 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000001c0)={0x100, 0x49433553, 0x9, 0x3, 0x2, @stepwise={{0x5, 0x8}, {0xfff, 0x100}, {0x20c, 0x5}}}) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) pause() syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000000c0)={0x81, 0xe7, 0x0, 'queue1\x00', 0x10001}) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x100, 0x0) 03:24:44 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:44 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:44 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:44 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:44 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:44 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:44 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:44 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:44 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:44 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:44 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 324.153186] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 324.284671] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 324.332045] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:45 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:45 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:45 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:45 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:45 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:45 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f0000000600)='L\xa82o\xe8\xf4 \x9f\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\xeb\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x06\xfa\xcc\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00G\fl\xfa\x05\xdd`.SU\xe8&\x87?\xf4\xad`\f\xfb\xceY\r\xc1\xc5lI:y$\xcb\xc0\xd5\x90\xb0\xe62jc\xa2\xad-\xfc5g@\xbe\x8e\xc99\xa6\x8a!\xb3\xee\xd8%S\xfb\x86\xcb\x16q|\xd3\x8eub\x19S9\x10\xb0<[\xa5s\b\x92\x80}\x85X\x1d\xfb\xb2\xa0\x89\nA\xffh\xb7\xa9)\xeb_\xb8d\xb4\\K\xbb\xee\xe4\xa1\xf0\x1fd\x91\xca\xe7O\r\xff\xba\x91\x14\x7f\x13\x98\a\xe0A-\xc8\x1e\x00_q\xdb\"}\xbd\xd6\xe2\xcf\x1e\xe1\x16i\x84\xafp\xde\x13o\xec\v\x95d\xba`\xd58\xd4\xf9F\xd5\xd5V\xdb=.\x0e\x86\xf5~\x00\xe1\xff\x00'/244, 0x5) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client0\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) accept(r3, 0x0, &(0x7f0000000000)) 03:24:45 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 324.781272] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 324.809610] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:45 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:45 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 324.832796] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:45 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:45 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 324.936726] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:45 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e8ee047}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4a4443, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000080)) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 324.989357] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:45 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:45 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 325.044618] sel_write_load: 25 callbacks suppressed [ 325.044635] SELinux: failed to load policy 03:24:45 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:45 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 325.118771] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 325.174220] SELinux: failed to load policy 03:24:45 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 325.198804] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 325.232855] SELinux: failed to load policy 03:24:45 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 325.276121] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 325.311993] SELinux: failed to load policy 03:24:46 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x6, 0x538, 0x1}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) 03:24:46 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 325.338800] SELinux: failed to load policy 03:24:46 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:46 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 325.434321] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 325.469997] SELinux: failed to load policy [ 325.488793] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 325.501676] SELinux: failed to load policy 03:24:46 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:46 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 325.538897] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 325.557902] SELinux: failed to load policy [ 325.567324] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:46 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 325.585299] SELinux: failed to load policy [ 325.598589] SELinux: failed to load policy 03:24:46 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:46 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 325.721245] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:46 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:46 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 325.795071] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:46 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 325.864640] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 325.893719] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:46 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000000)={0x9, 0x2, 0x4}, 0x10) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:46 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 325.982094] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:46 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 326.031483] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:46 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:46 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:46 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 326.085214] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 326.134444] audit: type=1400 audit(1579577086.795:57): avc: denied { setopt } for pid=11855 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 03:24:46 executing program 2: pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:46 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 326.241634] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:46 executing program 3: r0 = getpid() tkill(r0, 0x9) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7ce908000000536b1a966a2325c9734820562bb545204c6b6e75781200000000c46f000500000007000900c5cbcd91dc8fc785066329ef4a0c6e4c23013150616a1921be453c32e8be697597f2dd055d945e0a2092f9d5fb5139d691cd8bca5cab1a117596708d81c7a86366c54d261d91ac693bc1ba8b2f0c89ad5bd8dfa9cd6b2d94afef2bfda041a745a13f7a8f47815b3922f763595178bca5cfd97d952c3ae4205b128b8cd06716f2f931b67a03865e970afd18f2fe257cc8d1b6a1cb8f4f12d7db41f2849c93fcf2d741cb61711c49d0ab6a39e611799c83502a74d731b9bebba7ed8270d7d2aef9a3403c687bf9467154ea7f45"], 0x20) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000000, 0x4010, r2, 0xbb87f000) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:47 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:47 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:47 executing program 3: ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = getuid() mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x241400, &(0x7f0000000140)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x2}}, {@sq={'sq', 0x3d, 0x10001}}, {@sq={'sq', 0x3d, 0xf3}}, {@rq={'rq', 0x3d, 0x7f}}, {@common=@version_u='version=9p2000.u'}, {@sq={'sq', 0x3d, 0x5}}], [{@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/ptmx\x00'}}, {@obj_user={'obj_user', 0x3d, '!vboxnet0trustedbdev\xddlowlan0)}:trusted)^cpuset'}}, {@fsname={'fsname'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@euid_gt={'euid>', r3}}]}}) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) [ 326.345284] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 326.401489] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 2: pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:47 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 326.490785] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x2) [ 326.539197] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:47 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 326.579950] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:47 executing program 2: pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:47 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 326.727765] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 326.755307] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000380)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80, 0x0) sendmsg$NFT_MSG_GETSET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0xa, 0xa, 0x5, 0x0, 0x0, {0x5}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x400}]}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xf}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x14}, @NFTA_SET_POLICY={0x8}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x3b}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r2 = getpid() tkill(r2, 0x9) ptrace$setregs(0xd, r2, 0x2, &(0x7f00000001c0)="b27d242a0e0e57e11c8c4d64cd2e1e54a7029fde537ab9b90fe7923cd70b00550d078416638d95059a4579ec94b1450ae26aa69f69ccb5c954e9ca538a1cd2bcc41510f3b0d5f17f0ceb5ed926e2475b731c80ed6069856c66d9b4149ce05f31b2b17bf1433d3cd31ac86a73b94c89d2d5c02681041e3a6f5cecdec21565ca4e254d7dcd0ab6d04e7cf4464938f4629bf2b87736ed114a6e6553cd475c8a91c1792250672e02c3399aedaba854b9f5cf8f8f731375f1471ef369dd3debfa9d63c7a1407129ab61061ce416297af931235c63669b33c57f61bc7f3d9d8e3a005090de318f30c36c0e2e1f629b128380e345053390") memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000002c0)={0x0, r0, 0x0, 0x7, 0x1}) 03:24:47 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 326.777276] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:47 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 326.968264] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 327.010373] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 327.050950] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:47 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x492082, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/fscreate\x00', 0x2, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:47 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 327.162888] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 327.209080] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:47 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 327.269585] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 327.341621] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 327.368919] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:48 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:48 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:48 executing program 2: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:48 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x4, {0x7, 0x1f, 0x6, 0x4, 0x200, 0xfffb, 0x101, 0xb7f3}}, 0x50) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000080)=0x1) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 327.531317] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:48 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:48 executing program 4: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 327.601568] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 327.627701] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:48 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:48 executing program 2: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:48 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:48 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0xd) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f0000000080)={0xffffffffffffff80, 0x40}) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$SNDCTL_DSP_GETISPACE(r3, 0x8010500d, &(0x7f00000001c0)) 03:24:48 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 327.793580] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 327.813789] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:48 executing program 4: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:48 executing program 2: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 327.855187] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:48 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:48 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:48 executing program 4: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 327.943210] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 327.973921] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:48 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:48 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:48 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 328.068566] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 328.106365] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:48 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:48 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000080)={0xb, 0xfffffffd, 0x0, 'queue1\x00', 0xffffffff}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:48 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 328.202163] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 328.236896] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:48 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 328.298538] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:49 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:49 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:49 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:49 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 328.458621] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 328.514501] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 328.535094] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:49 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:49 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:49 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:49 executing program 1: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:49 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 328.725798] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 328.797240] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 328.809451] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:49 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:49 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:49 executing program 1: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:49 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:49 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 328.949549] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:49 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000000002041c2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x20202, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) write$binfmt_script(r4, &(0x7f0000000300)={'#! ', './file0', [{}, {0x20, '\\bdev'}, {}, {0x20, '\\}*'}, {0x20, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}, {0x20, 'erspan0\x00'}, {0x20, '&{cgroup'}, {0x20, '%#\'posix_acl_accesstrusted(}GPL\xb5'}], 0xa, "272cb53900ae4b27560a8c5ea0587ed0900fc12450735c2addec6eab27d45226294d823159b88e59a2"}, 0xb2) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r5 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r7 = dup2(r6, r5) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r7, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000000100)={0x8, 0x6, 0x9, 0x9d2, '\x00', 0x1}) r8 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r10 = dup2(r9, r8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r10, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$SIOCX25SSUBSCRIP(r10, 0x89e1, &(0x7f0000000740)={'erspan0\x00', 0xffffffff, 0x9}) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) prctl$PR_SET_ENDIAN(0x14, 0x2) 03:24:49 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:49 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 329.007508] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 329.029037] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:49 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:49 executing program 1: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:49 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 329.146517] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 329.198553] SELinux: policydb magic number 0x2e202123 does not match expected magic number 0xf97cff8c 03:24:49 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 329.277034] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 329.297270] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:50 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 329.327495] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 329.346063] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:50 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:50 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 329.373322] SELinux: policydb magic number 0x2e202123 does not match expected magic number 0xf97cff8c 03:24:50 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:50 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:50 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:50 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$BLKDISCARD(r3, 0x1277, 0xfffffffffffffffe) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) bind$netlink(r3, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x100000}, 0xc) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) syncfs(r4) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={r7, 0x78, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0xb62, @loopback, 0xe2}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x5, @mcast1, 0xbd8}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0)={r8, 0x81}, 0x8) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 329.659973] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 329.681590] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:50 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:50 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 329.739551] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 329.752485] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:50 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:50 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:50 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 329.912595] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:50 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) [ 329.955792] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 329.979373] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:50 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:50 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:50 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 330.026817] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:50 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x2000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 330.096104] sel_write_load: 79 callbacks suppressed [ 330.096109] SELinux: failed to load policy 03:24:50 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:50 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:50 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 330.221119] SELinux: failed to load policy 03:24:50 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:50 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) [ 330.311370] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:51 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 330.371202] SELinux: failed to load policy 03:24:51 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x41bd, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:51 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:51 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:51 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 330.489488] SELinux: failed to load policy 03:24:51 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) 03:24:51 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:51 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:51 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x400800, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={r5, 0x6}, &(0x7f0000000240)=0x8) r6 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r7 = socket$bt_rfcomm(0x1f, 0x3, 0x3) dup(r7) r8 = dup2(r6, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r8, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) sendmsg$IPSET_CMD_SAVE(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x8, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000080}, 0x20004880) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:51 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:51 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 330.702376] SELinux: failed to load policy 03:24:51 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:51 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000), 0x8) 03:24:51 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 330.865845] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 330.898080] SELinux: failed to load policy 03:24:51 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 330.914022] SELinux: failed to load policy 03:24:51 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:51 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) 03:24:51 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 331.031833] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:24:51 executing program 3: perf_event_open(&(0x7f0000001340)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:51 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 331.075681] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 331.084874] CPU: 1 PID: 12300 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 331.092820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.102205] Call Trace: [ 331.104815] dump_stack+0x142/0x197 [ 331.108475] warn_alloc.cold+0x96/0x1af [ 331.112469] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 331.117335] ? lock_downgrade+0x740/0x740 [ 331.121506] ? avc_has_perm+0x2df/0x4b0 [ 331.125506] __vmalloc_node_range+0x3c3/0x6a0 [ 331.130023] ? trace_hardirqs_on+0x10/0x10 [ 331.134277] vmalloc+0x46/0x50 [ 331.137488] ? sel_write_load+0x1a0/0x1050 [ 331.141745] sel_write_load+0x1a0/0x1050 [ 331.145827] ? save_trace+0x290/0x290 [ 331.149646] ? sel_read_bool+0x240/0x240 [ 331.153720] ? trace_hardirqs_on+0x10/0x10 [ 331.157969] ? debug_smp_processor_id+0x1c/0x20 [ 331.162649] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 331.167612] __vfs_write+0x105/0x6b0 [ 331.171337] ? sel_read_bool+0x240/0x240 [ 331.175413] ? kernel_read+0x120/0x120 [ 331.179309] ? __lock_is_held+0xb6/0x140 [ 331.183387] ? check_preemption_disabled+0x3c/0x250 [ 331.188548] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 331.194017] ? rcu_read_lock_sched_held+0x110/0x130 [ 331.199050] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 331.203817] ? __sb_start_write+0x153/0x2f0 [ 331.208153] vfs_write+0x198/0x500 [ 331.211706] SyS_write+0xfd/0x230 [ 331.215168] ? SyS_read+0x230/0x230 [ 331.218799] ? do_syscall_64+0x53/0x640 [ 331.222786] ? SyS_read+0x230/0x230 [ 331.226557] do_syscall_64+0x1e8/0x640 [ 331.230459] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.235443] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 331.240666] RIP: 0033:0x45b349 [ 331.243858] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 331.251574] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 331.260036] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 331.268187] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:24:51 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2002, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc0c4f512b67d752a}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0xf, 0x6, 0x801, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40004) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000400)="2a7ee1d061b8dfe8c43ff5713b9ee258fed4a69135b143496e7d74dae24fd25dfadd172ac42c0c2450c66c805d29538bd4b0b7c35f1c99e9af6db3bb084ecadbff618d49df715fbd38381e7805e5b6e07c854d18623ae1649c0d7f52de31651c14ad6ee8f96e44022995abc44fd281ca116f6fb27e27d32de9e1b8ab066c65f51b65614fb14db1c3903624da20e15945fa8eba33", 0x94) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) write(r2, &(0x7f0000000280)="07936cfcb37b3057c45ec9cf12cfb91ace9acee841c7a0955f57a60bed6edb8dd3a7ae1f06cc8580df93950b000000000000000000001e000000", 0x3a) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000740)={"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"}) 03:24:51 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 331.275573] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 331.282924] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 331.301925] warn_alloc_show_mem: 1 callbacks suppressed [ 331.301930] Mem-Info: [ 331.322557] active_anon:215991 inactive_anon:198 isolated_anon:0 [ 331.322557] active_file:8216 inactive_file:11824 isolated_file:0 [ 331.322557] unevictable:0 dirty:222 writeback:0 unstable:0 [ 331.322557] slab_reclaimable:13050 slab_unreclaimable:114373 [ 331.322557] mapped:60477 shmem:250 pagetables:1443 bounce:0 [ 331.322557] free:1167477 free_pcp:147 free_cma:0 [ 331.369363] Node 0 active_anon:868116kB inactive_anon:792kB active_file:32724kB inactive_file:47296kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242008kB dirty:884kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 247808kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 331.399138] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:24:52 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 331.426012] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 331.460938] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 331.466145] Node 0 DMA32 free:870268kB min:36380kB low:45472kB high:54564kB active_anon:866036kB inactive_anon:788kB active_file:32724kB inactive_file:47296kB unevictable:0kB writepending:884kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7968kB pagetables:5692kB bounce:0kB free_pcp:1204kB local_pcp:620kB free_cma:0kB [ 331.507109] lowmem_reserve[]: 0 0 0 0 0 [ 331.511271] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 331.537015] lowmem_reserve[]: 0 0 0 0 0 [ 331.541733] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 331.570217] lowmem_reserve[]: 0 0 0 0 0 03:24:52 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 331.574327] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 331.590286] Node 0 DMA32: 1095*4kB (UME) 269*8kB (UME) 145*16kB (UME) 225*32kB (UME) 143*64kB (UME) 14*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 1*2048kB (M) 203*4096kB (M) = 869492kB [ 331.613347] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB 03:24:52 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 331.624724] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 331.649036] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 331.667032] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 03:24:52 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 331.708779] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 331.726431] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 331.736146] 20292 total pagecache pages [ 331.741542] 0 pages in swap cache [ 331.745368] Swap cache stats: add 0, delete 0, find 0/0 [ 331.759363] Free swap = 0kB [ 331.763053] Total swap = 0kB [ 331.766390] 1965979 pages RAM [ 331.774276] 0 pages HighMem/MovableOnly [ 331.779520] 335869 pages reserved [ 331.784608] 0 pages cma reserved [ 331.799215] SELinux: failed to load policy 03:24:52 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:24:52 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) 03:24:52 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:52 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 331.805284] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 331.827231] SELinux: failed to load policy [ 331.838739] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 331.906151] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 331.937930] CPU: 1 PID: 12310 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 331.945875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:24:52 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 331.955263] Call Trace: [ 331.957876] dump_stack+0x142/0x197 [ 331.961533] warn_alloc.cold+0x96/0x1af [ 331.965535] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 331.970403] ? lock_downgrade+0x740/0x740 [ 331.974607] ? avc_has_perm+0x2df/0x4b0 [ 331.978624] __vmalloc_node_range+0x3c3/0x6a0 [ 331.983158] ? trace_hardirqs_on_caller+0x400/0x590 [ 331.988192] vmalloc+0x46/0x50 [ 331.991420] ? sel_write_load+0x1a0/0x1050 [ 331.995665] sel_write_load+0x1a0/0x1050 [ 331.999731] ? save_trace+0x290/0x290 [ 332.003574] ? sel_read_bool+0x240/0x240 [ 332.007651] ? mark_held_locks+0xb1/0x100 [ 332.011823] ? retint_kernel+0x2d/0x2d [ 332.015736] __vfs_write+0x105/0x6b0 [ 332.019464] ? sel_read_bool+0x240/0x240 [ 332.023542] ? kernel_read+0x120/0x120 [ 332.027454] ? __lock_is_held+0xb6/0x140 [ 332.031527] ? check_preemption_disabled+0x3c/0x250 [ 332.037084] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 332.042554] ? rcu_read_lock_sched_held+0x110/0x130 [ 332.047587] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 332.052353] ? __sb_start_write+0x153/0x2f0 [ 332.056691] vfs_write+0x198/0x500 [ 332.060251] SyS_write+0xfd/0x230 [ 332.063765] ? SyS_read+0x230/0x230 [ 332.067434] ? do_syscall_64+0x53/0x640 [ 332.071420] ? SyS_read+0x230/0x230 [ 332.075069] do_syscall_64+0x1e8/0x640 [ 332.078972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.083838] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 332.089032] RIP: 0033:0x45b349 [ 332.092225] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 332.099939] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 332.107333] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 332.114613] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 332.122023] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 332.129342] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:24:52 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 332.175185] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 332.186178] SELinux: failed to load policy [ 332.192666] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 332.218199] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 332.225254] CPU: 0 PID: 12340 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 332.233166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.242724] Call Trace: [ 332.245311] dump_stack+0x142/0x197 [ 332.249003] warn_alloc.cold+0x96/0x1af [ 332.252991] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 332.257840] ? check_preemption_disabled+0x3c/0x250 [ 332.262867] ? retint_kernel+0x2d/0x2d [ 332.266830] __vmalloc_node_range+0x3c3/0x6a0 [ 332.271334] vmalloc+0x46/0x50 [ 332.274521] ? sel_write_load+0x1a0/0x1050 [ 332.278765] sel_write_load+0x1a0/0x1050 [ 332.282833] ? mark_held_locks+0xb1/0x100 [ 332.286980] ? mark_held_locks+0xb1/0x100 [ 332.291121] ? sel_read_bool+0x240/0x240 [ 332.295212] ? retint_kernel+0x2d/0x2d [ 332.299100] ? trace_hardirqs_on_caller+0x400/0x590 [ 332.304119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 332.308884] __vfs_write+0x105/0x6b0 [ 332.312591] ? retint_kernel+0x2d/0x2d [ 332.316587] ? sel_read_bool+0x240/0x240 [ 332.320699] ? kernel_read+0x120/0x120 [ 332.324594] ? __lock_is_held+0xb6/0x140 [ 332.328727] ? check_preemption_disabled+0x3c/0x250 [ 332.333794] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 332.339250] ? rcu_read_lock_sched_held+0x110/0x130 [ 332.344380] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 332.349273] ? __sb_start_write+0x153/0x2f0 [ 332.353589] vfs_write+0x198/0x500 [ 332.357271] SyS_write+0xfd/0x230 [ 332.360769] ? SyS_read+0x230/0x230 [ 332.364399] ? do_syscall_64+0x53/0x640 [ 332.368454] ? SyS_read+0x230/0x230 [ 332.372083] do_syscall_64+0x1e8/0x640 [ 332.376112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.380953] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 332.386130] RIP: 0033:0x45b349 [ 332.389309] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 332.397067] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 332.404426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 332.411710] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 332.418987] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 332.426384] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 332.436264] warn_alloc_show_mem: 1 callbacks suppressed [ 332.436289] Mem-Info: [ 332.444669] active_anon:216486 inactive_anon:199 isolated_anon:0 [ 332.444669] active_file:8216 inactive_file:11830 isolated_file:0 [ 332.444669] unevictable:0 dirty:233 writeback:0 unstable:0 [ 332.444669] slab_reclaimable:13050 slab_unreclaimable:114624 [ 332.444669] mapped:60487 shmem:250 pagetables:1419 bounce:0 [ 332.444669] free:1166866 free_pcp:219 free_cma:0 [ 332.479378] Node 0 active_anon:865944kB inactive_anon:796kB active_file:32724kB inactive_file:47320kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241948kB dirty:928kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 251904kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 332.509971] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 332.537014] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 332.565727] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 332.571495] Node 0 DMA32 free:869088kB min:36380kB low:45472kB high:54564kB active_anon:865944kB inactive_anon:796kB active_file:32724kB inactive_file:47320kB unevictable:0kB writepending:936kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7936kB pagetables:5676kB bounce:0kB free_pcp:1032kB local_pcp:488kB free_cma:0kB [ 332.601786] lowmem_reserve[]: 0 0 0 0 0 [ 332.605858] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 332.632104] lowmem_reserve[]: 0 0 0 0 0 [ 332.636487] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 332.664585] lowmem_reserve[]: 0 0 0 0 0 [ 332.669273] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 332.683493] Node 0 DMA32: 1184*4kB (UME) 256*8kB (UME) 135*16kB (UME) 210*32kB (UME) 143*64kB (UME) 14*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 1*2048kB (M) 203*4096kB (M) = 869104kB [ 332.702607] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 332.713715] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 332.731558] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 332.740793] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 332.749406] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 332.758546] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 332.767193] 20301 total pagecache pages [ 332.771265] 0 pages in swap cache [ 332.774856] Swap cache stats: add 0, delete 0, find 0/0 [ 332.780328] Free swap = 0kB [ 332.783486] Total swap = 0kB [ 332.786509] 1965979 pages RAM [ 332.789611] 0 pages HighMem/MovableOnly [ 332.793665] 335869 pages reserved [ 332.797120] 0 pages cma reserved [ 332.805589] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 332.834633] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 332.844996] SELinux: policydb magic number 0xfc6c9307 does not match expected magic number 0xf97cff8c [ 332.858129] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 332.875516] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 332.888373] CPU: 1 PID: 12358 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 332.896285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.905647] Call Trace: [ 332.908245] dump_stack+0x142/0x197 [ 332.911872] warn_alloc.cold+0x96/0x1af [ 332.915853] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 332.920759] __vmalloc_node_range+0x3c3/0x6a0 [ 332.925248] ? retint_kernel+0x2d/0x2d [ 332.929143] vmalloc+0x46/0x50 [ 332.932362] ? sel_write_load+0x1a0/0x1050 [ 332.936684] sel_write_load+0x1a0/0x1050 [ 332.940744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 332.945600] ? sel_read_bool+0x240/0x240 [ 332.949690] ? __vfs_write+0x92/0x6b0 [ 332.953493] __vfs_write+0x105/0x6b0 [ 332.957199] ? sel_read_bool+0x240/0x240 [ 332.961250] ? kernel_read+0x120/0x120 [ 332.965144] ? __lock_is_held+0xb6/0x140 [ 332.969250] ? check_preemption_disabled+0x3c/0x250 [ 332.974319] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 332.979785] ? rcu_read_lock_sched_held+0x110/0x130 [ 332.984898] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 332.989648] ? __sb_start_write+0x153/0x2f0 [ 332.994056] vfs_write+0x198/0x500 [ 332.997612] SyS_write+0xfd/0x230 [ 333.001066] ? SyS_read+0x230/0x230 [ 333.004724] ? do_syscall_64+0x53/0x640 [ 333.008854] ? SyS_read+0x230/0x230 [ 333.012493] do_syscall_64+0x1e8/0x640 [ 333.016410] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.021258] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 333.026593] RIP: 0033:0x45b349 [ 333.029786] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 333.037495] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 333.044774] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 333.052169] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 333.059457] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 333.066747] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:24:53 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000000000)=""/17) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 333.080575] SELinux: policydb magic number 0xfc6c9307 does not match expected magic number 0xf97cff8c 03:24:53 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:53 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:53 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:24:53 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:53 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 333.159644] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 333.183313] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 333.217065] CPU: 1 PID: 12372 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 333.225001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.234365] Call Trace: [ 333.236970] dump_stack+0x142/0x197 [ 333.240625] warn_alloc.cold+0x96/0x1af [ 333.244624] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 333.249658] ? lock_downgrade+0x740/0x740 [ 333.253829] ? avc_has_perm+0x2df/0x4b0 [ 333.257825] __vmalloc_node_range+0x3c3/0x6a0 [ 333.262363] ? trace_hardirqs_on+0x10/0x10 [ 333.266708] vmalloc+0x46/0x50 [ 333.269934] ? sel_write_load+0x1a0/0x1050 [ 333.274180] sel_write_load+0x1a0/0x1050 [ 333.278406] ? save_trace+0x290/0x290 [ 333.282231] ? sel_read_bool+0x240/0x240 [ 333.286307] ? mark_held_locks+0xb1/0x100 [ 333.290463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 333.295224] ? retint_kernel+0x2d/0x2d [ 333.299129] __vfs_write+0x105/0x6b0 [ 333.302867] ? sel_read_bool+0x240/0x240 [ 333.306945] ? kernel_read+0x120/0x120 [ 333.310847] ? __lock_is_held+0xb6/0x140 [ 333.314913] ? check_preemption_disabled+0x3c/0x250 [ 333.319951] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 333.325542] ? rcu_read_lock_sched_held+0x110/0x130 [ 333.330579] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 333.335358] ? __sb_start_write+0x153/0x2f0 [ 333.339688] vfs_write+0x198/0x500 [ 333.343246] SyS_write+0xfd/0x230 [ 333.346721] ? SyS_read+0x230/0x230 [ 333.350357] ? SyS_read+0x230/0x230 [ 333.353998] do_syscall_64+0x1e8/0x640 [ 333.357896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.362759] entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:24:54 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000001c0)={0x0, 0xffffff0e, 0xffff, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x990a2d, 0xec, [], @string=&(0x7f0000000000)=0x6}}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80c0}, 0x4040004) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000080)="6d2e9e7aaea3a04c0d15529ce0de4987070ea7d0226be861e206d7c6ab81c57c8a1591874d303fd776a11bd2c0a113b382a7181e2075001d946752212105460cc0cee9fda8c7c8f30c7f79d391f7f88e399d5184a483c656f2c13a6683db2ad010a0e0b44f463c170d3b4813823272b8cf142cd9ecd44da4818353d89a93dac0ea1a5e29ad9b131ab2c33ca9bfd597bb88f0a03064b38b9c3ebc03913a45510446854efa9e4faa5f191d8c98284097a4e5ce286129aa5d979b14e19b66bb70e64f90e40ef4", 0xc5) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:54 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 333.367953] RIP: 0033:0x45b349 [ 333.371509] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 333.379231] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 333.386528] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 333.394952] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 333.403014] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 333.410317] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:24:54 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) [ 333.519418] warn_alloc_show_mem: 1 callbacks suppressed [ 333.519435] Mem-Info: [ 333.540301] active_anon:217047 inactive_anon:197 isolated_anon:0 [ 333.540301] active_file:8216 inactive_file:11842 isolated_file:0 [ 333.540301] unevictable:0 dirty:242 writeback:0 unstable:0 [ 333.540301] slab_reclaimable:13049 slab_unreclaimable:114466 [ 333.540301] mapped:60484 shmem:250 pagetables:1478 bounce:0 03:24:54 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$TIOCSBRK(r2, 0x5427) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={[], 0x11}, 0x4}, 0xe) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x41bd, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r6, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:54 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 333.540301] free:1166436 free_pcp:214 free_cma:0 [ 333.580691] Node 0 active_anon:868188kB inactive_anon:788kB active_file:32724kB inactive_file:47368kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241936kB dirty:964kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:24:54 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) [ 333.666250] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 333.739921] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 333.775354] lowmem_reserve[]: 0 2569 2569 2569 2569 03:24:54 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) 03:24:54 executing program 3: r0 = getpid() tkill(r0, 0x9) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x5, @perf_config_ext={0x9, 0x400}, 0x1b2e0, 0x5}, r0, 0xffffffffffffffff, r1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$VIDIOC_G_STD(r5, 0x80085617, &(0x7f0000000000)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) [ 333.782108] Node 0 DMA32 free:867600kB min:36380kB low:45472kB high:54564kB active_anon:867988kB inactive_anon:788kB active_file:32724kB inactive_file:47368kB unevictable:0kB writepending:964kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7968kB pagetables:5764kB bounce:0kB free_pcp:848kB local_pcp:168kB free_cma:0kB 03:24:54 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000000000)=""/17) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 333.871585] lowmem_reserve[]: 0 0 0 0 0 [ 333.892040] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 333.930195] lowmem_reserve[]: 0 0 0 0 0 [ 333.934463] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 333.969693] lowmem_reserve[]: 0 0 0 0 0 [ 333.978688] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 334.007530] Node 0 DMA32: 1176*4kB (UME) 380*8kB (UME) 177*16kB (UME) 193*32kB (UME) 143*64kB (UME) 15*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 1*2048kB (M) 204*4096kB (M) = 874416kB [ 334.025655] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 334.036908] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 334.055261] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 334.064582] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 334.073690] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 334.083292] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 334.092958] 20313 total pagecache pages [ 334.096943] 0 pages in swap cache [ 334.100916] Swap cache stats: add 0, delete 0, find 0/0 [ 334.106993] Free swap = 0kB [ 334.110522] Total swap = 0kB [ 334.113558] 1965979 pages RAM [ 334.116643] 0 pages HighMem/MovableOnly [ 334.121026] 335869 pages reserved [ 334.124564] 0 pages cma reserved 03:24:54 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) [ 334.128223] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 334.138722] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 334.144209] CPU: 1 PID: 12374 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 334.152117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.161514] Call Trace: [ 334.164127] dump_stack+0x142/0x197 [ 334.167776] warn_alloc.cold+0x96/0x1af [ 334.171777] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 334.176634] ? lock_downgrade+0x740/0x740 [ 334.180805] ? avc_has_perm+0x2df/0x4b0 [ 334.184799] __vmalloc_node_range+0x3c3/0x6a0 [ 334.189306] vmalloc+0x46/0x50 [ 334.192499] ? sel_write_load+0x1a0/0x1050 [ 334.196723] sel_write_load+0x1a0/0x1050 [ 334.200784] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 334.205542] ? sel_read_bool+0x240/0x240 [ 334.209705] ? __vfs_write+0x92/0x6b0 [ 334.213512] __vfs_write+0x105/0x6b0 [ 334.217334] ? sel_read_bool+0x240/0x240 [ 334.221389] ? kernel_read+0x120/0x120 [ 334.225286] ? retint_kernel+0x2d/0x2d [ 334.229186] ? __sb_start_write+0x21a/0x2f0 [ 334.233514] ? __sb_start_write+0x153/0x2f0 [ 334.238023] vfs_write+0x198/0x500 [ 334.241684] SyS_write+0xfd/0x230 [ 334.245141] ? SyS_read+0x230/0x230 [ 334.249017] ? do_syscall_64+0x53/0x640 [ 334.252987] ? SyS_read+0x230/0x230 [ 334.256619] do_syscall_64+0x1e8/0x640 [ 334.260502] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.265348] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 334.270527] RIP: 0033:0x45b349 [ 334.273709] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 03:24:55 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 334.281415] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 334.288679] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 334.295949] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 334.303469] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 334.310738] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 334.319610] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:55 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:55 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000), 0x8) 03:24:55 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000080)="a4a6a3297a8bac115758039b48439875118236d1f48dec1864e0ed86eace8cb2c4f669f2c817fc019db35f2fe501e2f93c3f59827ddff6d3a9b221d14b914b491e47e767673a2d8466359298a5a0d68c89fab8db2b5aa8048cc29d1908102bb168052bb7a9ce03a2b098f8df28e614", 0x6f) 03:24:55 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:55 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) [ 334.381021] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:55 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 334.488789] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 334.513538] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 334.553235] CPU: 0 PID: 12434 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 334.561172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.570600] Call Trace: [ 334.573219] dump_stack+0x142/0x197 [ 334.576874] warn_alloc.cold+0x96/0x1af [ 334.580871] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 334.585734] ? lock_downgrade+0x740/0x740 [ 334.589902] ? avc_has_perm+0x2df/0x4b0 [ 334.593898] __vmalloc_node_range+0x3c3/0x6a0 [ 334.598428] vmalloc+0x46/0x50 [ 334.601653] ? sel_write_load+0x1a0/0x1050 [ 334.605903] sel_write_load+0x1a0/0x1050 [ 334.609983] ? save_trace+0x290/0x290 [ 334.613798] ? sel_read_bool+0x240/0x240 [ 334.617872] ? trace_hardirqs_on_caller+0x400/0x590 [ 334.622904] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 334.627712] __vfs_write+0x105/0x6b0 [ 334.631440] ? sel_read_bool+0x240/0x240 [ 334.635512] ? kernel_read+0x120/0x120 [ 334.639403] ? __lock_is_held+0xb6/0x140 [ 334.643468] ? check_preemption_disabled+0x3c/0x250 03:24:55 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:55 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x8108, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xfa6}, 0x10008, 0x0, 0x0, 0x0, 0x0, 0xa25}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x11000, 0x3, &(0x7f0000fef000/0x11000)=nil) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:55 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000), 0x8) 03:24:55 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 334.648593] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 334.654183] ? rcu_read_lock_sched_held+0x110/0x130 [ 334.659209] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 334.663974] ? __sb_start_write+0x153/0x2f0 [ 334.668317] vfs_write+0x198/0x500 [ 334.671870] SyS_write+0xfd/0x230 [ 334.675498] ? SyS_read+0x230/0x230 [ 334.679140] ? do_syscall_64+0x53/0x640 [ 334.683304] ? SyS_read+0x230/0x230 [ 334.686948] do_syscall_64+0x1e8/0x640 [ 334.690877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.695739] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 334.700939] RIP: 0033:0x45b349 [ 334.704235] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 334.711956] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 334.719841] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 334.727115] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 334.734402] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 334.742293] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:24:55 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:55 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000), 0x8) [ 334.874327] warn_alloc_show_mem: 1 callbacks suppressed [ 334.874345] Mem-Info: [ 334.884472] active_anon:216526 inactive_anon:201 isolated_anon:475 [ 334.884472] active_file:8216 inactive_file:11854 isolated_file:0 [ 334.884472] unevictable:0 dirty:163 writeback:0 unstable:0 [ 334.884472] slab_reclaimable:13047 slab_unreclaimable:115044 [ 334.884472] mapped:60519 shmem:250 pagetables:1479 bounce:0 [ 334.884472] free:1165319 free_pcp:321 free_cma:0 [ 334.941690] Node 0 active_anon:861864kB inactive_anon:804kB active_file:32724kB inactive_file:47416kB unevictable:0kB isolated(anon):1604kB isolated(file):0kB mapped:241976kB dirty:644kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 247808kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 334.984002] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:8kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 335.024369] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 335.054228] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 335.092911] Node 0 DMA32 free:870108kB min:36380kB low:45472kB high:54564kB active_anon:863860kB inactive_anon:800kB active_file:32724kB inactive_file:47424kB unevictable:0kB writepending:708kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7872kB pagetables:5760kB bounce:0kB free_pcp:1396kB local_pcp:732kB free_cma:0kB [ 335.128378] lowmem_reserve[]: 0 0 0 0 0 [ 335.135148] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 335.161158] lowmem_reserve[]: 0 0 0 0 0 [ 335.165245] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 335.194619] lowmem_reserve[]: 0 0 0 0 0 [ 335.199198] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 335.215541] Node 0 DMA32: 1660*4kB (UME) 471*8kB (UME) 273*16kB (UME) 257*32kB (UME) 271*64kB (UME) 19*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 1*2048kB (M) 200*4096kB (M) = 872984kB [ 335.235065] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 335.247372] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 335.266720] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 335.275801] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 335.284495] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 335.293474] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 335.302135] 20322 total pagecache pages [ 335.306136] 0 pages in swap cache [ 335.309588] Swap cache stats: add 0, delete 0, find 0/0 [ 335.315103] Free swap = 0kB [ 335.318843] Total swap = 0kB [ 335.321955] 1965979 pages RAM [ 335.325136] 0 pages HighMem/MovableOnly [ 335.329101] 335869 pages reserved [ 335.332629] 0 pages cma reserved [ 335.336491] sel_write_load: 9 callbacks suppressed [ 335.336493] SELinux: failed to load policy 03:24:56 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:56 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x100000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:56 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:56 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) 03:24:56 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 335.346226] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 335.381554] SELinux: failed to load policy 03:24:56 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 335.452984] SELinux: failed to load policy [ 335.489387] SELinux: failed to load policy 03:24:56 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) [ 335.519450] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:24:56 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:56 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x7) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:56 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 335.582561] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 335.597255] CPU: 0 PID: 12487 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 335.605221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.614590] Call Trace: [ 335.617205] dump_stack+0x142/0x197 [ 335.620859] warn_alloc.cold+0x96/0x1af [ 335.624854] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 335.629978] ? retint_kernel+0x2d/0x2d [ 335.633890] ? trace_hardirqs_on_caller+0x400/0x590 [ 335.638992] ? check_preemption_disabled+0x3c/0x250 [ 335.644036] __vmalloc_node_range+0x3c3/0x6a0 [ 335.648649] vmalloc+0x46/0x50 [ 335.652007] ? sel_write_load+0x1a0/0x1050 [ 335.656278] sel_write_load+0x1a0/0x1050 [ 335.660359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 335.665860] ? check_preemption_disabled+0x3c/0x250 [ 335.670897] ? retint_kernel+0x2d/0x2d [ 335.674806] ? sel_read_bool+0x240/0x240 [ 335.678892] ? sel_read_bool+0x240/0x240 [ 335.682975] __vfs_write+0x105/0x6b0 [ 335.686715] ? sel_read_bool+0x240/0x240 [ 335.690827] ? kernel_read+0x120/0x120 [ 335.694735] ? __lock_is_held+0xb6/0x140 [ 335.699076] ? check_preemption_disabled+0x3c/0x250 [ 335.704125] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 335.709605] ? rcu_read_lock_sched_held+0x110/0x130 [ 335.714639] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 335.719410] ? __sb_start_write+0x153/0x2f0 [ 335.723751] vfs_write+0x198/0x500 [ 335.727311] SyS_write+0xfd/0x230 03:24:56 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) [ 335.730784] ? SyS_read+0x230/0x230 [ 335.734425] ? do_syscall_64+0x53/0x640 [ 335.738519] ? SyS_read+0x230/0x230 [ 335.742174] do_syscall_64+0x1e8/0x640 [ 335.746073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.751020] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 335.756224] RIP: 0033:0x45b349 [ 335.759421] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 335.767923] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 335.775208] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 335.782561] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 335.789940] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 335.797226] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 335.818723] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 335.836832] SELinux: failed to load policy 03:24:56 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 335.862067] SELinux: failed to load policy [ 335.873746] SELinux: failed to load policy [ 335.882637] SELinux: failed to load policy 03:24:56 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:56 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:56 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x800) 03:24:56 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:56 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r1 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="1b470d19dff83f7411b079ab7e6cdfd40dee46a1b14bdae91fc65cc8be99f0d0e783b8379376742c9faa3e442b2e17481444c6a4690c59b8a3ab51aee5996c2ed3d8ff8ed9581ffe886a258f629ddda048073d2a7a9dcaf4308db3dc46d4cd411fbc4b46a7eed1573e45a89fd9f83da32c63fc5e3ed5cbb1b7f12203f886a53a2e564b9556e34b4f302b171fa35aecdd1ce449e1ec922e23687097b7daa1adf7f122a634a27db3086eac4546285f7a9e3c84f08690c518b51f3a5a63572efcd1451c69f8437600e5afea5159eb", 0xcd, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, r1) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0xce402, 0x0) fcntl$setpipe(r2, 0x407, 0x10000000) [ 336.036305] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 336.086606] SELinux: failed to load policy 03:24:56 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 336.126584] SELinux: failed to load policy 03:24:56 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x0) [ 336.161935] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:56 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:56 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000000002041c2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x20202, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) write$binfmt_script(r4, &(0x7f0000000300)={'#! ', './file0', [{}, {0x20, '\\bdev'}, {}, {0x20, '\\}*'}, {0x20, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}, {0x20, 'erspan0\x00'}, {0x20, '&{cgroup'}, {0x20, '%#\'posix_acl_accesstrusted(}GPL\xb5'}], 0xa, "272cb53900ae4b27560a8c5ea0587ed0900fc12450735c2addec6eab27d45226294d823159b88e59a2"}, 0xb2) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r5 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r7 = dup2(r6, r5) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r7, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000000100)={0x8, 0x6, 0x9, 0x9d2, '\x00', 0x1}) r8 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r10 = dup2(r9, r8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r10, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$SIOCX25SSUBSCRIP(r10, 0x89e1, &(0x7f0000000740)={'erspan0\x00', 0xffffffff, 0x9}) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) prctl$PR_SET_ENDIAN(0x14, 0x2) 03:24:56 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 336.292990] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:57 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:57 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$SNDCTL_DSP_SETFMT(r4, 0xc0045005, &(0x7f00000000c0)=0x8) ioctl$SOUND_MIXER_READ_VOLUME(r1, 0x80044d00, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:57 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r1 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="1b470d19dff83f7411b079ab7e6cdfd40dee46a1b14bdae91fc65cc8be99f0d0e783b8379376742c9faa3e442b2e17481444c6a4690c59b8a3ab51aee5996c2ed3d8ff8ed9581ffe886a258f629ddda048073d2a7a9dcaf4308db3dc46d4cd411fbc4b46a7eed1573e45a89fd9f83da32c63fc5e3ed5cbb1b7f12203f886a53a2e564b9556e34b4f302b171fa35aecdd1ce449e1ec922e23687097b7daa1adf7f122a634a27db3086eac4546285f7a9e3c84f08690c518b51f3a5a63572efcd1451c69f8437600e5afea5159eb", 0xcd, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, r1) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0xce402, 0x0) fcntl$setpipe(r2, 0x407, 0x10000000) [ 336.490394] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 336.585295] SELinux: policydb magic number 0x7dbfcc00 does not match expected magic number 0xf97cff8c [ 336.587321] SELinux: policydb magic number 0x2e202123 does not match expected magic number 0xf97cff8c 03:24:57 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r1 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="1b470d19dff83f7411b079ab7e6cdfd40dee46a1b14bdae91fc65cc8be99f0d0e783b8379376742c9faa3e442b2e17481444c6a4690c59b8a3ab51aee5996c2ed3d8ff8ed9581ffe886a258f629ddda048073d2a7a9dcaf4308db3dc46d4cd411fbc4b46a7eed1573e45a89fd9f83da32c63fc5e3ed5cbb1b7f12203f886a53a2e564b9556e34b4f302b171fa35aecdd1ce449e1ec922e23687097b7daa1adf7f122a634a27db3086eac4546285f7a9e3c84f08690c518b51f3a5a63572efcd1451c69f8437600e5afea5159eb", 0xcd, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, r1) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0xce402, 0x0) fcntl$setpipe(r2, 0x407, 0x10000000) 03:24:57 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 336.739355] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:57 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x0) 03:24:57 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 336.840713] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:57 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000000002041c2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x20202, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) write$binfmt_script(r4, &(0x7f0000000300)={'#! ', './file0', [{}, {0x20, '\\bdev'}, {}, {0x20, '\\}*'}, {0x20, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}, {0x20, 'erspan0\x00'}, {0x20, '&{cgroup'}, {0x20, '%#\'posix_acl_accesstrusted(}GPL\xb5'}], 0xa, "272cb53900ae4b27560a8c5ea0587ed0900fc12450735c2addec6eab27d45226294d823159b88e59a2"}, 0xb2) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r3, 0x2}}, 0x18) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r5 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r7 = dup2(r6, r5) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r7, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000000100)={0x8, 0x6, 0x9, 0x9d2, '\x00', 0x1}) r8 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r10 = dup2(r9, r8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r10, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$SIOCX25SSUBSCRIP(r10, 0x89e1, &(0x7f0000000740)={'erspan0\x00', 0xffffffff, 0x9}) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) prctl$PR_SET_ENDIAN(0x14, 0x2) 03:24:57 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xfffffffffffff7ff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0x5, 0x3, 0x4, 0x800, 0x4e, {r4, r5/1000+30000}, {0x2, 0x2, 0x6, 0x7f, 0xb9, 0x80, "23936d94"}, 0xffff8000, 0x3, @userptr=0x400, 0x401, 0x0, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f0000000280)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x401, 0x20, 0x5, 0x4a}, {0x0, 0x2, 0x0, 0x9}, {0x4, 0x0, 0x9, 0xf80f}, {0x9, 0x40, 0x2, 0xc563}]}, 0x10) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:57 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:57 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:57 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 336.989897] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:57 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 337.087837] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 337.163557] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 337.168432] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:57 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:57 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:58 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 337.266411] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 337.303281] SELinux: policydb magic number 0x2e202123 does not match expected magic number 0xf97cff8c 03:24:58 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 337.375852] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:58 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffd, r2, 0x0) clock_getres(0x7, &(0x7f00000001c0)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800000000004cc42, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000200)="ac02075df37f3687142f62c5de18f828915ad371a40dcca05464b19556de6a3c4e2359105caca2a2a6c52a1a0dc5b381ecbea2197a46b8173d4904e4c10ee69284a369e65c7a4b77ed7a8d2e0f00009338bf2e44a1f1d11b9c1565836f", 0x5d) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000100)={0x1, 0xd8, 0x215a, 0x3}, 0x8) getsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:58 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:58 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:58 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 337.463778] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:58 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 337.522484] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:58 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:58 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:58 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 337.644456] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:58 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x4c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x1d) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000080)={0x16, 0x5, 0xca}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40400, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:24:58 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:58 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:58 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 337.835494] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 337.893900] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 337.943315] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 337.982340] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:58 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:58 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:58 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) 03:24:58 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:58 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 338.116949] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:58 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x3, 0xfffb, 0x4, 0x9, 0x140000, 0x1c5, 0x0, 0x43600e0a, r6}, &(0x7f0000000080)=0x20) [ 338.175405] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:58 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 338.242360] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 338.257217] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:58 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) 03:24:59 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:59 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:59 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 338.365985] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:59 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 338.466753] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:59 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) [ 338.525979] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 338.555295] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:59 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000080)=""/9, 0x9) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r4 = accept4$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x1c, 0x80000) getsockopt$IP_SET_OP_GET_BYNAME(r4, 0x1, 0x53, &(0x7f0000000140)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000180)=0x28) r5 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r7 = dup2(r6, r5) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r7, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000200), r8}}, 0x18) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x200, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x18841, 0x0) 03:24:59 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:59 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:59 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000000)=0x5, 0x2) 03:24:59 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000000)=0x5, 0x2) [ 338.816408] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:59 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 338.859042] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:24:59 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:59 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:24:59 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000000)=0x5, 0x2) [ 339.033986] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 339.082424] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 339.107245] CPU: 1 PID: 12753 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 339.115255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.124627] Call Trace: [ 339.127232] dump_stack+0x142/0x197 03:24:59 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) r1 = socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r3 = dup2(r2, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)) getsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000080)=0x4) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 339.130885] warn_alloc.cold+0x96/0x1af [ 339.134877] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 339.139774] __vmalloc_node_range+0x3c3/0x6a0 [ 339.144391] vmalloc+0x46/0x50 [ 339.147597] ? sel_write_load+0x1a0/0x1050 [ 339.151992] sel_write_load+0x1a0/0x1050 [ 339.156136] ? save_trace+0x290/0x290 [ 339.159993] ? sel_read_bool+0x240/0x240 [ 339.164075] ? mark_held_locks+0xb1/0x100 [ 339.168238] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 339.173009] ? retint_kernel+0x2d/0x2d [ 339.176914] __vfs_write+0x105/0x6b0 03:24:59 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000000)=0x5, 0x2) [ 339.180637] ? sel_read_bool+0x240/0x240 [ 339.184713] ? kernel_read+0x120/0x120 [ 339.188620] ? retint_kernel+0x2d/0x2d [ 339.192640] ? __sb_start_write+0x21a/0x2f0 [ 339.196983] ? __sb_start_write+0x153/0x2f0 [ 339.201314] vfs_write+0x198/0x500 [ 339.205000] SyS_write+0xfd/0x230 [ 339.208468] ? SyS_read+0x230/0x230 [ 339.212121] ? do_syscall_64+0x53/0x640 [ 339.216125] ? SyS_read+0x230/0x230 [ 339.219771] do_syscall_64+0x1e8/0x640 [ 339.223678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.228541] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 339.233775] RIP: 0033:0x45b349 [ 339.236976] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 339.244702] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 339.251996] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 339.259289] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 339.266575] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 339.273862] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 339.304792] warn_alloc_show_mem: 1 callbacks suppressed [ 339.304810] Mem-Info: [ 339.319212] active_anon:217074 inactive_anon:198 isolated_anon:0 [ 339.319212] active_file:8222 inactive_file:11860 isolated_file:0 [ 339.319212] unevictable:0 dirty:227 writeback:0 unstable:0 [ 339.319212] slab_reclaimable:13059 slab_unreclaimable:114668 [ 339.319212] mapped:60502 shmem:250 pagetables:1466 bounce:0 [ 339.319212] free:1166127 free_pcp:273 free_cma:0 [ 339.477290] Node 0 active_anon:868296kB inactive_anon:792kB active_file:32748kB inactive_file:47440kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242008kB dirty:504kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 339.506570] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 339.533089] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 339.560788] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 339.566507] Node 0 DMA32 free:865316kB min:36380kB low:45472kB high:54564kB active_anon:868360kB inactive_anon:792kB active_file:32748kB inactive_file:47452kB unevictable:0kB writepending:452kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:8128kB pagetables:5888kB bounce:0kB free_pcp:1324kB local_pcp:664kB free_cma:0kB [ 339.596699] lowmem_reserve[]: 0 0 0 0 0 [ 339.601343] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 339.626932] lowmem_reserve[]: 0 0 0 0 0 [ 339.631051] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 339.659430] lowmem_reserve[]: 0 0 0 0 0 [ 339.663612] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 339.679145] Node 0 DMA32: 1225*4kB (UM) 392*8kB (UME) 207*16kB (ME) 235*32kB (UME) 306*64kB (UME) 22*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 0*2048kB 199*4096kB (M) = 865332kB [ 339.697248] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 339.708656] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 339.727282] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 339.736571] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 339.745408] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 339.754377] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 339.763245] 20335 total pagecache pages [ 339.767688] 0 pages in swap cache [ 339.771306] Swap cache stats: add 0, delete 0, find 0/0 [ 339.776721] Free swap = 0kB [ 339.779979] Total swap = 0kB [ 339.783640] 1965979 pages RAM [ 339.786846] 0 pages HighMem/MovableOnly [ 339.790941] 335869 pages reserved [ 339.794459] 0 pages cma reserved [ 339.798025] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 339.816218] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 339.822862] CPU: 0 PID: 12754 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 339.830787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.840157] Call Trace: [ 339.842772] dump_stack+0x142/0x197 [ 339.846421] warn_alloc.cold+0x96/0x1af [ 339.850400] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 339.855255] ? lock_downgrade+0x740/0x740 [ 339.859414] ? avc_has_perm+0x2df/0x4b0 [ 339.863392] __vmalloc_node_range+0x3c3/0x6a0 [ 339.867911] vmalloc+0x46/0x50 [ 339.871120] ? sel_write_load+0x1a0/0x1050 [ 339.875368] sel_write_load+0x1a0/0x1050 [ 339.879447] ? sel_read_bool+0x240/0x240 [ 339.883519] ? mark_held_locks+0xb1/0x100 [ 339.887689] ? retint_kernel+0x2d/0x2d [ 339.891582] __vfs_write+0x105/0x6b0 [ 339.895310] ? sel_read_bool+0x240/0x240 [ 339.899364] ? kernel_read+0x120/0x120 [ 339.903258] ? __lock_is_held+0xb6/0x140 [ 339.907334] ? check_preemption_disabled+0x3c/0x250 [ 339.912385] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 339.917949] ? rcu_read_lock_sched_held+0x110/0x130 [ 339.922973] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 339.927743] ? __sb_start_write+0x153/0x2f0 [ 339.932911] vfs_write+0x198/0x500 [ 339.936463] SyS_write+0xfd/0x230 [ 339.939923] ? SyS_read+0x230/0x230 [ 339.943561] ? do_syscall_64+0x81/0x640 [ 339.947596] ? SyS_read+0x230/0x230 [ 339.951233] do_syscall_64+0x1e8/0x640 [ 339.955129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.959998] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 339.965195] RIP: 0033:0x45b349 [ 339.968386] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 339.976097] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 339.983369] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 339.990647] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 339.997922] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 340.005207] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:00 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:00 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:00 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 340.024846] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 340.048268] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:00 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000000)=0x5, 0x2) 03:25:00 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000080)={0x5, 0x8, 0x0, [{0x6, 0x900, 0x1f, 0x80, 0x20, 0xa, 0x81}, {0x7, 0xfffffffffffffffa, 0xfff, 0x7, 0x40, 0xb, 0x3f}, {0x7ff, 0xed71, 0x8000, 0x7, 0x40, 0xb8, 0x1}, {0xffffffff, 0x100, 0x3, 0x1, 0x7f, 0x3e, 0x4}, {0xff, 0x8, 0x6, 0x8, 0x3, 0x1f, 0x1}, {0x100000001, 0x4, 0x81, 0x81, 0x7, 0x40, 0x20}, {0x6dc, 0xffffffff, 0x9, 0xfb, 0x1, 0x0, 0x5}, {0x3, 0xffff, 0x179b, 0x0, 0xff, 0x0, 0x40}]}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 340.100191] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 340.132481] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 340.169422] CPU: 1 PID: 12775 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 340.177361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.186839] Call Trace: [ 340.189447] dump_stack+0x142/0x197 [ 340.193162] warn_alloc.cold+0x96/0x1af [ 340.197290] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 340.202156] ? lock_downgrade+0x740/0x740 [ 340.206326] ? avc_has_perm+0x2df/0x4b0 [ 340.210320] __vmalloc_node_range+0x3c3/0x6a0 [ 340.214840] vmalloc+0x46/0x50 [ 340.218043] ? sel_write_load+0x1a0/0x1050 [ 340.222292] sel_write_load+0x1a0/0x1050 [ 340.226365] ? mark_held_locks+0xb1/0x100 [ 340.230535] ? retint_kernel+0x2d/0x2d [ 340.234437] ? trace_hardirqs_on_caller+0x400/0x590 [ 340.239599] ? sel_read_bool+0x240/0x240 [ 340.243686] ? mark_held_locks+0xb1/0x100 [ 340.247849] ? retint_kernel+0x2d/0x2d [ 340.251753] __vfs_write+0x105/0x6b0 [ 340.255484] ? sel_read_bool+0x240/0x240 [ 340.259561] ? kernel_read+0x120/0x120 [ 340.263471] ? __lock_is_held+0xb6/0x140 [ 340.267547] ? check_preemption_disabled+0x3c/0x250 [ 340.272583] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 340.278053] ? rcu_read_lock_sched_held+0x110/0x130 [ 340.283086] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 340.287858] ? __sb_start_write+0x153/0x2f0 [ 340.292295] vfs_write+0x198/0x500 [ 340.295854] SyS_write+0xfd/0x230 [ 340.299325] ? SyS_read+0x230/0x230 [ 340.303063] ? do_syscall_64+0x53/0x640 [ 340.307169] ? SyS_read+0x230/0x230 [ 340.310813] do_syscall_64+0x1e8/0x640 [ 340.314713] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.319580] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 340.324783] RIP: 0033:0x45b349 [ 340.327981] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 340.335706] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 340.343074] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 340.350357] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 340.357765] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 340.365051] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:01 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000080)={0x5, 0x8, 0x0, [{0x6, 0x900, 0x1f, 0x80, 0x20, 0xa, 0x81}, {0x7, 0xfffffffffffffffa, 0xfff, 0x7, 0x40, 0xb, 0x3f}, {0x7ff, 0xed71, 0x8000, 0x7, 0x40, 0xb8, 0x1}, {0xffffffff, 0x100, 0x3, 0x1, 0x7f, 0x3e, 0x4}, {0xff, 0x8, 0x6, 0x8, 0x3, 0x1f, 0x1}, {0x100000001, 0x4, 0x81, 0x81, 0x7, 0x40, 0x20}, {0x6dc, 0xffffffff, 0x9, 0xfb, 0x1, 0x0, 0x5}, {0x3, 0xffff, 0x179b, 0x0, 0xff, 0x0, 0x40}]}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 340.418716] warn_alloc_show_mem: 1 callbacks suppressed [ 340.418734] Mem-Info: [ 340.427433] active_anon:216573 inactive_anon:197 isolated_anon:0 [ 340.427433] active_file:8222 inactive_file:11869 isolated_file:0 [ 340.427433] unevictable:0 dirty:131 writeback:0 unstable:0 [ 340.427433] slab_reclaimable:13066 slab_unreclaimable:114569 [ 340.427433] mapped:60504 shmem:250 pagetables:1454 bounce:0 [ 340.427433] free:1166771 free_pcp:334 free_cma:0 [ 340.469348] Node 0 active_anon:866268kB inactive_anon:800kB active_file:32748kB inactive_file:47476kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241948kB dirty:552kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 340.508099] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 340.543551] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 03:25:01 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000080)={0x5, 0x8, 0x0, [{0x6, 0x900, 0x1f, 0x80, 0x20, 0xa, 0x81}, {0x7, 0xfffffffffffffffa, 0xfff, 0x7, 0x40, 0xb, 0x3f}, {0x7ff, 0xed71, 0x8000, 0x7, 0x40, 0xb8, 0x1}, {0xffffffff, 0x100, 0x3, 0x1, 0x7f, 0x3e, 0x4}, {0xff, 0x8, 0x6, 0x8, 0x3, 0x1f, 0x1}, {0x100000001, 0x4, 0x81, 0x81, 0x7, 0x40, 0x20}, {0x6dc, 0xffffffff, 0x9, 0xfb, 0x1, 0x0, 0x5}, {0x3, 0xffff, 0x179b, 0x0, 0xff, 0x0, 0x40}]}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 340.583053] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 340.588761] Node 0 DMA32 free:867688kB min:36380kB low:45472kB high:54564kB active_anon:866212kB inactive_anon:792kB active_file:32748kB inactive_file:47476kB unevictable:0kB writepending:552kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:8032kB pagetables:5804kB bounce:0kB free_pcp:908kB local_pcp:516kB free_cma:0kB [ 340.621895] lowmem_reserve[]: 0 0 0 0 0 [ 340.626801] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 340.653301] lowmem_reserve[]: 0 0 0 0 0 03:25:01 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 340.658138] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 340.687727] lowmem_reserve[]: 0 0 0 0 0 [ 340.692948] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 340.708879] Node 0 DMA32: 1238*4kB (UM) 524*8kB (UME) 210*16kB (UME) 236*32kB (UME) 299*64kB (UME) 22*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 1*2048kB (M) 199*4096kB (M) = 868120kB [ 340.737047] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 340.749776] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 340.768842] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 340.778165] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 340.787967] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 340.797296] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 340.806214] 20346 total pagecache pages [ 340.811886] 0 pages in swap cache [ 340.815495] Swap cache stats: add 0, delete 0, find 0/0 [ 340.821149] Free swap = 0kB [ 340.824298] Total swap = 0kB [ 340.827503] 1965979 pages RAM [ 340.830889] 0 pages HighMem/MovableOnly [ 340.835264] 335869 pages reserved [ 340.838807] 0 pages cma reserved [ 340.843809] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 340.851033] sel_write_load: 46 callbacks suppressed [ 340.851038] SELinux: failed to load policy [ 340.860419] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:25:01 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:01 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0xc741b996ee6e60b7, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x20c0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0xd) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r4 = dup2(r3, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) r5 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r6, r5) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, &(0x7f0000000340)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0xa) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000280)={0x74, 0x0, [0x3ff, 0x6, 0xfffffffffffffffb, 0x10000]}) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 340.887055] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 340.892765] CPU: 0 PID: 12791 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 340.900662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.910035] Call Trace: [ 340.912652] dump_stack+0x142/0x197 [ 340.916428] warn_alloc.cold+0x96/0x1af [ 340.920429] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 340.925323] ? lock_downgrade+0x740/0x740 [ 340.929579] ? avc_has_perm+0x2df/0x4b0 [ 340.933578] __vmalloc_node_range+0x3c3/0x6a0 [ 340.938100] vmalloc+0x46/0x50 [ 340.941310] ? sel_write_load+0x1a0/0x1050 [ 340.945558] sel_write_load+0x1a0/0x1050 [ 340.949635] ? save_trace+0x290/0x290 [ 340.953471] ? sel_read_bool+0x240/0x240 [ 340.957685] ? trace_hardirqs_on+0x10/0x10 [ 340.961931] ? debug_smp_processor_id+0x1c/0x20 [ 340.966597] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 340.971532] __vfs_write+0x105/0x6b0 [ 340.975249] ? sel_read_bool+0x240/0x240 [ 340.979326] ? kernel_read+0x120/0x120 [ 340.983229] ? __lock_is_held+0xb6/0x140 [ 340.987302] ? check_preemption_disabled+0x3c/0x250 [ 340.992340] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 340.997803] ? rcu_read_lock_sched_held+0x110/0x130 [ 341.002831] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 341.007603] ? __sb_start_write+0x153/0x2f0 [ 341.011938] vfs_write+0x198/0x500 [ 341.015492] SyS_write+0xfd/0x230 [ 341.018981] ? SyS_read+0x230/0x230 [ 341.022627] ? do_syscall_64+0x53/0x640 [ 341.026615] ? SyS_read+0x230/0x230 [ 341.030238] do_syscall_64+0x1e8/0x640 [ 341.034235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.039097] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 341.044302] RIP: 0033:0x45b349 [ 341.050354] RSP: 002b:00007f2886840c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 341.058071] RAX: ffffffffffffffda RBX: 00007f28868416d4 RCX: 000000000045b349 [ 341.065374] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 341.072701] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 341.079978] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 341.087255] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bfd4 03:25:01 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x8, 0x7, 0x4, 0x20000, 0x1, {0x77359400}, {0x3, 0xc, 0x11, 0x60, 0x7, 0x0, "0200"}, 0x4, 0x2, @offset=0x1, 0x6, 0x0, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000180)={0xfae8e50e, @link_local}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x406880, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000080)={0x2, 0x1f}, 0x2) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 341.135760] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 341.152241] SELinux: failed to load policy 03:25:01 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:01 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 341.189681] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 341.214170] SELinux: failed to load policy [ 341.226632] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:25:01 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:01 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 341.256702] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 341.316998] CPU: 1 PID: 12813 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 341.325070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.334438] Call Trace: [ 341.337048] dump_stack+0x142/0x197 [ 341.340700] warn_alloc.cold+0x96/0x1af [ 341.344729] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 341.349596] ? mark_held_locks+0xb1/0x100 [ 341.353764] ? retint_kernel+0x2d/0x2d [ 341.357779] ? trace_hardirqs_on_caller+0x400/0x590 03:25:02 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 341.362814] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 341.367610] __vmalloc_node_range+0x3c3/0x6a0 [ 341.372129] vmalloc+0x46/0x50 [ 341.375339] ? sel_write_load+0x1a0/0x1050 [ 341.379590] sel_write_load+0x1a0/0x1050 [ 341.383676] ? save_trace+0x290/0x290 [ 341.387498] ? sel_read_bool+0x240/0x240 [ 341.391572] ? trace_hardirqs_on+0x10/0x10 [ 341.395825] ? debug_smp_processor_id+0x1c/0x20 [ 341.400515] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 341.405466] __vfs_write+0x105/0x6b0 [ 341.409194] ? sel_read_bool+0x240/0x240 [ 341.413379] ? kernel_read+0x120/0x120 [ 341.417284] ? __lock_is_held+0xb6/0x140 [ 341.421362] ? check_preemption_disabled+0x3c/0x250 [ 341.426404] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 341.431912] ? rcu_read_lock_sched_held+0x110/0x130 [ 341.436952] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 341.441825] ? __sb_start_write+0x153/0x2f0 [ 341.446165] vfs_write+0x198/0x500 [ 341.449717] SyS_write+0xfd/0x230 [ 341.453185] ? SyS_read+0x230/0x230 [ 341.456825] ? do_syscall_64+0x53/0x640 [ 341.460813] ? SyS_read+0x230/0x230 [ 341.464464] do_syscall_64+0x1e8/0x640 [ 341.468366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.473240] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 341.478440] RIP: 0033:0x45b349 [ 341.481739] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 341.489468] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 341.497000] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 341.504287] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 341.511572] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 341.518964] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 341.541155] warn_alloc_show_mem: 1 callbacks suppressed [ 341.541211] Mem-Info: [ 341.551734] active_anon:216534 inactive_anon:203 isolated_anon:0 [ 341.551734] active_file:8222 inactive_file:11878 isolated_file:0 [ 341.551734] unevictable:0 dirty:152 writeback:0 unstable:0 [ 341.551734] slab_reclaimable:13066 slab_unreclaimable:114565 [ 341.551734] mapped:60471 shmem:250 pagetables:1415 bounce:0 [ 341.551734] free:1166910 free_pcp:232 free_cma:0 [ 341.586420] Node 0 active_anon:866136kB inactive_anon:812kB active_file:32748kB inactive_file:47512kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241884kB dirty:604kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 341.615957] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 341.642807] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 341.670425] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 341.676319] Node 0 DMA32 free:870188kB min:36380kB low:45472kB high:54564kB active_anon:866136kB inactive_anon:812kB active_file:32748kB inactive_file:47512kB unevictable:0kB writepending:604kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:8000kB pagetables:5660kB bounce:0kB free_pcp:908kB local_pcp:216kB free_cma:0kB [ 341.707541] lowmem_reserve[]: 0 0 0 0 0 03:25:02 executing program 3: r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0xffffffff80000001, "0d4033c000008fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r5}) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x4000, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, r10, 0x1, 0x0, 0x0, {0x3, 0x6c00000000000000}}, 0x14}}, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r13, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r14, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x24, &(0x7f0000000380)={@initdev, @multicast1, 0x0}, &(0x7f0000000400)=0xc) r16 = socket(0x11, 0x800000003, 0x0) bind(r16, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r16, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r17, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r18 = socket(0x11, 0x800000003, 0x0) bind(r18, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r19, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r20 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r21 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r22 = dup2(r21, r20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r22, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) accept$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) r24 = socket(0x11, 0x800000003, 0x0) bind(r24, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r24, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r25, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r26 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r27 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r28 = dup2(r27, r26) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r28, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r28, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) r30 = socket(0x11, 0x800000003, 0x0) bind(r30, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r30, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r31, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r32 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r33 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r34 = dup2(r33, r32) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r34, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r34, 0x0, 0x24, &(0x7f0000000740)={@empty, @dev, 0x0}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) r37 = socket(0x11, 0x800000003, 0x0) bind(r37, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r37, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r38, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000880)={'team0\x00', r38}) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r40, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r41, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000008c0)={'vcan0\x00'}) r42 = socket(0x11, 0x800000003, 0x0) bind(r42, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r42, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r43, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000009c0)}, 0x7}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000a00)=""/207, 0xcf}, {&(0x7f0000000b00)=""/2, 0x2}, {&(0x7f0000000b40)=""/127, 0x7f}, {&(0x7f0000000bc0)=""/100, 0x64}, {&(0x7f0000000c40)=""/122, 0x7a}, {&(0x7f0000000cc0)=""/103, 0x67}, {&(0x7f0000000d40)=""/80, 0x50}, {&(0x7f0000000dc0)=""/80, 0x50}, {&(0x7f0000000e40)=""/69, 0x45}, {&(0x7f0000000ec0)=""/33, 0x21}], 0xa, &(0x7f0000000fc0)=""/133, 0x85}, 0x9}, {{&(0x7f0000001080)=@caif=@dgm, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/64, 0x40}, {&(0x7f0000001140)=""/3, 0x3}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x3, &(0x7f00000011c0)=""/139, 0x8b}, 0x401}], 0x3, 0x40000022, &(0x7f00000023c0)) r46 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r47 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r48 = dup2(r47, r46) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r48, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$PNPIPE_IFINDEX(r48, 0x113, 0x2, &(0x7f0000003540)=0x0, &(0x7f0000003580)=0x4) r50 = socket(0x11, 0x800000003, 0x0) bind(r50, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r50, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r51, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r52 = socket(0x11, 0x800000003, 0x0) bind(r52, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r52, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r53, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) accept4$packet(r5, &(0x7f0000003680)={0x11, 0x0, 0x0}, &(0x7f00000036c0)=0x14, 0x80800) r55 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r56 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r57 = dup2(r56, r55) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r57, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r58 = socket(0x11, 0x800000003, 0x0) bind(r58, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r58, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r59, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r57, 0x8933, &(0x7f0000003840)={'team0\x00', r59}) r61 = socket(0x11, 0x800000003, 0x0) bind(r61, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r61, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r62, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r63 = socket(0x11, 0x800000003, 0x0) bind(r63, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r63, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r64, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000003940)={@mcast2, 0x0}, &(0x7f0000003980)=0x14) r66 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r67 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r68 = dup2(r67, r66) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r68, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r68, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000003ac0)=0xe8) r70 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r71 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r72 = dup2(r71, r70) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r72, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r72, 0x0, 0x20, &(0x7f0000003bc0)={@broadcast, @loopback, 0x0}, &(0x7f0000003c00)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f00000046c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000004680)={&(0x7f0000003c40)={0xa04, r10, 0x2, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x1ac, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5851}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x58b0}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r31}, {0x1dc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x4b}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r39}, {0xf8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r41}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x4, 0x1, 0x6, 0x2}, {0x0, 0x4, 0x3, 0x6e5}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8000}}}]}}, {{0x8, 0x1, r43}, {0x268, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xcd}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r44}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r45}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r49}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r51}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r54}}}]}}, {{0x8, 0x1, r60}, {0x1ac, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r62}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r64}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r65}}}]}}, {{0x8, 0x1, r69}, {0xe4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r73}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x42bb, 0x7f, 0x3, 0x4}, {0x100, 0x9, 0x4f, 0x4}, {0x5d, 0xe, 0xd9, 0x38}, {0x3, 0x20, 0x1, 0x8000}, {0x8, 0x3, 0x80, 0x1000}, {0xfc00, 0x3f, 0xf9, 0x7}, {0x6, 0x9, 0x0, 0x5}]}}}]}}]}, 0xa04}, 0x1, 0x0, 0x0, 0x8041}, 0x20000000) r74 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r75 = dup2(r74, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r75, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r75}) r77 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)=0x6) r78 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r79 = dup2(r78, r77) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r79, 0xc0105303, &(0x7f0000000100)={0x0, 0x2, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f00000000c0)={r76, 0x80000, r79}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) [ 341.712498] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 341.745189] lowmem_reserve[]: 0 0 0 0 0 [ 341.749976] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 341.786090] lowmem_reserve[]: 0 0 0 0 0 [ 341.792095] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 341.814722] Node 0 DMA32: 1381*4kB (UM) 434*8kB (UME) 253*16kB (UME) 271*32kB (UME) 305*64kB (UME) 22*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 0*2048kB 199*4096kB (M) = 868116kB [ 341.842109] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 341.859432] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 341.889109] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 341.898829] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 341.914202] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 341.930456] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 341.939146] 20349 total pagecache pages [ 341.948120] 0 pages in swap cache [ 341.951805] Swap cache stats: add 0, delete 0, find 0/0 [ 341.957177] Free swap = 0kB [ 341.960283] Total swap = 0kB [ 341.963376] 1965979 pages RAM 03:25:02 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) dup2(r1, r2) [ 341.966471] 0 pages HighMem/MovableOnly [ 341.970624] 335869 pages reserved [ 341.974090] 0 pages cma reserved [ 341.977612] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 342.006567] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 342.016781] CPU: 0 PID: 12825 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 342.024796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.034155] Call Trace: [ 342.036739] dump_stack+0x142/0x197 [ 342.040387] warn_alloc.cold+0x96/0x1af [ 342.044367] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 342.049260] ? lock_downgrade+0x740/0x740 [ 342.053464] ? avc_has_perm+0x2df/0x4b0 [ 342.057439] __vmalloc_node_range+0x3c3/0x6a0 [ 342.061951] ? trace_hardirqs_on_caller+0x400/0x590 [ 342.067107] vmalloc+0x46/0x50 [ 342.070298] ? sel_write_load+0x1a0/0x1050 [ 342.074554] sel_write_load+0x1a0/0x1050 [ 342.078677] ? sel_read_bool+0x240/0x240 [ 342.082740] ? trace_hardirqs_on_caller+0x400/0x590 [ 342.087745] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 342.092507] __vfs_write+0x105/0x6b0 [ 342.096292] ? sel_read_bool+0x240/0x240 [ 342.100360] ? kernel_read+0x120/0x120 [ 342.104317] ? __lock_is_held+0xb6/0x140 [ 342.108370] ? check_preemption_disabled+0x3c/0x250 [ 342.113437] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 342.118926] ? rcu_read_lock_sched_held+0x110/0x130 [ 342.123954] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 342.128724] ? __sb_start_write+0x153/0x2f0 [ 342.133048] vfs_write+0x198/0x500 [ 342.136598] SyS_write+0xfd/0x230 [ 342.140057] ? SyS_read+0x230/0x230 [ 342.143675] ? do_syscall_64+0x53/0x640 [ 342.147657] ? SyS_read+0x230/0x230 [ 342.151289] do_syscall_64+0x1e8/0x640 [ 342.155172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.160017] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 342.165272] RIP: 0033:0x45b349 [ 342.168487] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 342.176191] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 342.183468] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 342.190731] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 342.198022] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 342.205395] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:02 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) dup2(r1, r2) 03:25:02 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:02 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 342.218830] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 342.226290] SELinux: failed to load policy [ 342.231653] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 342.250745] SELinux: failed to load policy [ 342.255534] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 342.295690] SELinux: failed to load policy 03:25:03 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 342.319117] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 342.352790] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 342.404678] CPU: 1 PID: 12846 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 342.412622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.422107] Call Trace: [ 342.424720] dump_stack+0x142/0x197 [ 342.428502] warn_alloc.cold+0x96/0x1af [ 342.432520] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 342.437380] ? lock_downgrade+0x740/0x740 [ 342.441553] ? avc_has_perm+0x2df/0x4b0 [ 342.445547] __vmalloc_node_range+0x3c3/0x6a0 [ 342.450073] ? trace_hardirqs_on_caller+0x400/0x590 [ 342.455100] vmalloc+0x46/0x50 [ 342.458317] ? sel_write_load+0x1a0/0x1050 [ 342.462682] sel_write_load+0x1a0/0x1050 [ 342.466758] ? save_trace+0x290/0x290 [ 342.470661] ? sel_read_bool+0x240/0x240 [ 342.474730] ? trace_hardirqs_on_caller+0x400/0x590 [ 342.479911] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 342.484688] __vfs_write+0x105/0x6b0 [ 342.488603] ? sel_read_bool+0x240/0x240 [ 342.492684] ? kernel_read+0x120/0x120 [ 342.496605] ? __lock_is_held+0xb6/0x140 [ 342.500685] ? check_preemption_disabled+0x3c/0x250 [ 342.505831] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 342.511394] ? rcu_read_lock_sched_held+0x110/0x130 [ 342.516429] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 342.521194] ? __sb_start_write+0x153/0x2f0 [ 342.525527] vfs_write+0x198/0x500 [ 342.529077] SyS_write+0xfd/0x230 [ 342.532546] ? SyS_read+0x230/0x230 [ 342.536180] ? do_syscall_64+0x53/0x640 [ 342.540163] ? SyS_read+0x230/0x230 [ 342.543803] do_syscall_64+0x1e8/0x640 [ 342.547699] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.552560] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 342.557765] RIP: 0033:0x45b349 [ 342.560965] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 342.568682] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 342.575962] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 342.584198] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 342.591476] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 342.598875] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 342.611580] warn_alloc_show_mem: 1 callbacks suppressed [ 342.611605] Mem-Info: [ 342.619901] active_anon:217084 inactive_anon:200 isolated_anon:0 [ 342.619901] active_file:8222 inactive_file:11887 isolated_file:0 [ 342.619901] unevictable:0 dirty:183 writeback:0 unstable:0 [ 342.619901] slab_reclaimable:13065 slab_unreclaimable:114549 [ 342.619901] mapped:60512 shmem:250 pagetables:1460 bounce:0 [ 342.619901] free:1166300 free_pcp:217 free_cma:0 [ 342.654546] Node 0 active_anon:868336kB inactive_anon:800kB active_file:32748kB inactive_file:47548kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242048kB dirty:728kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 270336kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 342.683339] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 342.710384] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 342.737419] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 342.742898] Node 0 DMA32 free:867856kB min:36380kB low:45472kB high:54564kB active_anon:868384kB inactive_anon:800kB active_file:32748kB inactive_file:47556kB unevictable:0kB writepending:748kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:8096kB pagetables:5840kB bounce:0kB free_pcp:1032kB local_pcp:708kB free_cma:0kB [ 342.772952] lowmem_reserve[]: 0 0 0 0 0 [ 342.777767] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 342.804068] lowmem_reserve[]: 0 0 0 0 0 [ 342.808136] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 342.837422] lowmem_reserve[]: 0 0 0 0 0 [ 342.841741] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 342.855801] Node 0 DMA32: 1288*4kB (UM) 477*8kB (UME) 227*16kB (UME) 271*32kB (UME) 305*64kB (UME) 24*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 0*2048kB 199*4096kB (M) = 867928kB [ 342.873009] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 342.885910] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 342.903890] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 342.913080] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 342.922022] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 342.931181] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 342.940122] 20364 total pagecache pages [ 342.944382] 0 pages in swap cache [ 342.948221] Swap cache stats: add 0, delete 0, find 0/0 [ 342.953823] Free swap = 0kB 03:25:03 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) [ 342.956955] Total swap = 0kB [ 342.960095] 1965979 pages RAM [ 342.963271] 0 pages HighMem/MovableOnly [ 342.967273] 335869 pages reserved [ 342.970832] 0 pages cma reserved [ 342.974445] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 343.000712] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 343.007549] CPU: 0 PID: 12856 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 343.015534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.025038] Call Trace: [ 343.027627] dump_stack+0x142/0x197 [ 343.031302] warn_alloc.cold+0x96/0x1af [ 343.035299] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 343.040139] ? retint_kernel+0x2d/0x2d [ 343.044101] ? trace_hardirqs_on_caller+0x400/0x590 [ 343.049132] ? check_preemption_disabled+0x3c/0x250 [ 343.054142] __vmalloc_node_range+0x3c3/0x6a0 [ 343.058645] vmalloc+0x46/0x50 [ 343.061973] ? sel_write_load+0x1a0/0x1050 [ 343.066436] sel_write_load+0x1a0/0x1050 [ 343.070495] ? save_trace+0x290/0x290 [ 343.074339] ? sel_read_bool+0x240/0x240 [ 343.078500] ? mark_held_locks+0xb1/0x100 [ 343.082661] ? retint_kernel+0x2d/0x2d [ 343.086551] __vfs_write+0x105/0x6b0 [ 343.090268] ? sel_read_bool+0x240/0x240 [ 343.094375] ? kernel_read+0x120/0x120 [ 343.098262] ? retint_kernel+0x2d/0x2d [ 343.102146] ? __sb_start_write+0x21a/0x2f0 [ 343.106481] ? __sb_start_write+0x153/0x2f0 [ 343.110972] vfs_write+0x198/0x500 [ 343.114509] SyS_write+0xfd/0x230 [ 343.117958] ? SyS_read+0x230/0x230 [ 343.121576] ? do_syscall_64+0x53/0x640 [ 343.125548] ? SyS_read+0x230/0x230 [ 343.129191] do_syscall_64+0x1e8/0x640 [ 343.133077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.137926] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.143117] RIP: 0033:0x45b349 [ 343.146295] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 343.154279] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 343.161543] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 343.168931] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 343.176387] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 343.183765] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 343.200513] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:03 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) [ 343.200699] SELinux: failed to load policy [ 343.212738] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 343.231509] SELinux: failed to load policy [ 343.246048] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:03 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:03 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) dup2(r1, r2) 03:25:03 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 343.257341] SELinux: failed to load policy [ 343.278271] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 343.335898] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 343.366961] CPU: 1 PID: 12870 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 343.374909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.384278] Call Trace: [ 343.386898] dump_stack+0x142/0x197 [ 343.390695] warn_alloc.cold+0x96/0x1af [ 343.394683] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 343.399570] ? lock_downgrade+0x740/0x740 [ 343.403745] ? avc_has_perm+0x2df/0x4b0 [ 343.409047] __vmalloc_node_range+0x3c3/0x6a0 [ 343.413589] vmalloc+0x46/0x50 [ 343.416836] ? sel_write_load+0x1a0/0x1050 [ 343.421171] sel_write_load+0x1a0/0x1050 [ 343.425269] ? save_trace+0x290/0x290 [ 343.429089] ? sel_read_bool+0x240/0x240 [ 343.433176] ? mark_held_locks+0xb1/0x100 [ 343.437359] ? retint_kernel+0x2d/0x2d [ 343.441274] __vfs_write+0x105/0x6b0 [ 343.444998] ? sel_read_bool+0x240/0x240 [ 343.449216] ? kernel_read+0x120/0x120 [ 343.453113] ? __lock_is_held+0xb6/0x140 [ 343.457180] ? check_preemption_disabled+0x3c/0x250 [ 343.462208] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 343.467682] ? rcu_read_lock_sched_held+0x110/0x130 [ 343.472709] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 343.477473] ? __sb_start_write+0x153/0x2f0 [ 343.481796] vfs_write+0x198/0x500 [ 343.486028] SyS_write+0xfd/0x230 [ 343.489584] ? SyS_read+0x230/0x230 [ 343.493216] ? do_syscall_64+0x53/0x640 [ 343.497204] ? SyS_read+0x230/0x230 [ 343.500834] do_syscall_64+0x1e8/0x640 [ 343.504717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.509686] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.514987] RIP: 0033:0x45b349 [ 343.518174] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 343.525880] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 343.533144] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 343.540415] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 343.547913] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 343.555237] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 343.564598] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 343.578422] syz-executor.5 cpuset=syz5 mems_allowed=0-1 03:25:04 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) [ 343.586087] CPU: 0 PID: 12874 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 343.594160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.603527] Call Trace: [ 343.606139] dump_stack+0x142/0x197 [ 343.609799] warn_alloc.cold+0x96/0x1af [ 343.613793] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 343.618656] ? check_preemption_disabled+0x3c/0x250 [ 343.623689] ? retint_kernel+0x2d/0x2d [ 343.627611] __vmalloc_node_range+0x3c3/0x6a0 [ 343.632142] ? retint_kernel+0x2d/0x2d [ 343.636034] vmalloc+0x46/0x50 [ 343.639237] ? sel_write_load+0x1a0/0x1050 [ 343.643529] sel_write_load+0x1a0/0x1050 [ 343.647594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 343.652346] ? check_preemption_disabled+0x3c/0x250 [ 343.657368] ? retint_kernel+0x2d/0x2d [ 343.661264] ? sel_read_bool+0x240/0x240 [ 343.665333] ? sel_read_bool+0x240/0x240 [ 343.669400] __vfs_write+0x105/0x6b0 [ 343.673113] ? retint_kernel+0x2d/0x2d [ 343.677001] ? sel_read_bool+0x240/0x240 [ 343.681088] ? kernel_read+0x120/0x120 [ 343.685003] ? __lock_is_held+0xb6/0x140 [ 343.689096] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 343.694553] ? rcu_read_lock_sched_held+0x110/0x130 [ 343.699666] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 343.704445] ? __sb_start_write+0x153/0x2f0 [ 343.708777] vfs_write+0x198/0x500 [ 343.712317] SyS_write+0xfd/0x230 [ 343.715882] ? SyS_read+0x230/0x230 [ 343.719504] ? do_syscall_64+0x53/0x640 [ 343.723478] ? SyS_read+0x230/0x230 [ 343.727164] do_syscall_64+0x1e8/0x640 [ 343.731103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.735950] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.741141] RIP: 0033:0x45b349 [ 343.744332] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 343.752187] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 343.759458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 343.766733] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 343.774009] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 343.781283] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 343.792006] warn_alloc_show_mem: 2 callbacks suppressed [ 343.792022] Mem-Info: [ 343.800194] active_anon:217076 inactive_anon:200 isolated_anon:0 [ 343.800194] active_file:8222 inactive_file:11897 isolated_file:0 [ 343.800194] unevictable:0 dirty:195 writeback:0 unstable:0 [ 343.800194] slab_reclaimable:13065 slab_unreclaimable:114192 [ 343.800194] mapped:60512 shmem:250 pagetables:1457 bounce:0 [ 343.800194] free:1166647 free_pcp:193 free_cma:0 [ 343.800260] Node 0 active_anon:868304kB inactive_anon:800kB active_file:32748kB inactive_file:47588kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242048kB dirty:776kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 343.800308] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 343.890534] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 343.917237] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 343.923935] Node 0 DMA32 free:868212kB min:36380kB low:45472kB high:54564kB active_anon:868304kB inactive_anon:800kB active_file:32748kB inactive_file:47588kB unevictable:0kB writepending:796kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:8128kB pagetables:5828kB bounce:0kB free_pcp:1064kB local_pcp:544kB free_cma:0kB [ 343.954073] lowmem_reserve[]: 0 0 0 0 0 [ 343.958212] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 343.984157] lowmem_reserve[]: 0 0 0 0 0 [ 343.988421] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 344.016458] lowmem_reserve[]: 0 0 0 0 0 [ 344.020868] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 344.036588] Node 0 DMA32: 1251*4kB (UME) 519*8kB (UME) 233*16kB (UME) 272*32kB (UME) 305*64kB (UME) 24*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 0*2048kB 199*4096kB (M) = 868244kB [ 344.054817] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 344.065770] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 344.083798] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 344.092843] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 344.101733] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 344.110773] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 344.120142] 20376 total pagecache pages [ 344.132288] 0 pages in swap cache [ 344.135821] Swap cache stats: add 0, delete 0, find 0/0 [ 344.141309] Free swap = 0kB [ 344.144339] Total swap = 0kB [ 344.147359] 1965979 pages RAM [ 344.150566] 0 pages HighMem/MovableOnly [ 344.154545] 335869 pages reserved [ 344.158160] 0 pages cma reserved [ 344.162018] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 344.172875] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 344.178413] CPU: 0 PID: 12884 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 344.186309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.195680] Call Trace: [ 344.198293] dump_stack+0x142/0x197 [ 344.201950] warn_alloc.cold+0x96/0x1af [ 344.205944] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 344.210809] ? lock_downgrade+0x740/0x740 [ 344.215106] ? avc_has_perm+0x2df/0x4b0 [ 344.219094] __vmalloc_node_range+0x3c3/0x6a0 [ 344.223617] vmalloc+0x46/0x50 [ 344.226809] ? sel_write_load+0x1a0/0x1050 [ 344.231102] sel_write_load+0x1a0/0x1050 [ 344.235168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 344.239994] ? sel_read_bool+0x240/0x240 [ 344.244066] ? __vfs_write+0x92/0x6b0 [ 344.247868] __vfs_write+0x105/0x6b0 [ 344.251600] ? sel_read_bool+0x240/0x240 [ 344.255660] ? kernel_read+0x120/0x120 [ 344.259559] ? __lock_is_held+0xb6/0x140 [ 344.263630] ? check_preemption_disabled+0x3c/0x250 [ 344.268663] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 344.274124] ? rcu_read_lock_sched_held+0x110/0x130 [ 344.279154] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 344.283915] ? __sb_start_write+0x153/0x2f0 [ 344.288234] vfs_write+0x198/0x500 [ 344.291825] SyS_write+0xfd/0x230 [ 344.295335] ? SyS_read+0x230/0x230 [ 344.299056] ? do_syscall_64+0x53/0x640 [ 344.303039] ? SyS_read+0x230/0x230 [ 344.306671] do_syscall_64+0x1e8/0x640 [ 344.310562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.315419] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 344.320742] RIP: 0033:0x45b349 [ 344.324003] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 344.331713] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 344.338982] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 344.346345] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 344.353614] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 344.361009] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 344.369838] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 344.383704] SELinux: failed to load policy [ 344.389426] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 344.407380] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 344.421166] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 344.428985] CPU: 1 PID: 12891 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 344.436905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.446279] Call Trace: [ 344.448904] dump_stack+0x142/0x197 [ 344.452553] warn_alloc.cold+0x96/0x1af [ 344.456547] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 344.461483] ? mark_held_locks+0xb1/0x100 [ 344.465689] ? retint_kernel+0x2d/0x2d [ 344.469602] ? trace_hardirqs_on_caller+0x400/0x590 [ 344.474637] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 344.479460] __vmalloc_node_range+0x3c3/0x6a0 [ 344.484056] vmalloc+0x46/0x50 [ 344.487242] ? sel_write_load+0x1a0/0x1050 [ 344.491579] sel_write_load+0x1a0/0x1050 [ 344.495666] ? sel_read_bool+0x240/0x240 [ 344.499750] ? mark_held_locks+0xb1/0x100 [ 344.503958] ? retint_kernel+0x2d/0x2d [ 344.507851] __vfs_write+0x105/0x6b0 [ 344.511563] ? sel_read_bool+0x240/0x240 [ 344.515635] ? kernel_read+0x120/0x120 [ 344.519541] ? __lock_is_held+0xb6/0x140 [ 344.523610] ? check_preemption_disabled+0x3c/0x250 [ 344.528634] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 344.534087] ? rcu_read_lock_sched_held+0x110/0x130 [ 344.539113] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 344.543868] ? __sb_start_write+0x153/0x2f0 [ 344.548181] vfs_write+0x198/0x500 [ 344.551709] SyS_write+0xfd/0x230 [ 344.555197] ? SyS_read+0x230/0x230 [ 344.558810] ? do_syscall_64+0x81/0x640 [ 344.562784] ? SyS_read+0x230/0x230 [ 344.566423] do_syscall_64+0x1e8/0x640 [ 344.570371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.575210] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 344.580393] RIP: 0033:0x45b349 [ 344.583568] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 344.591274] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 344.598550] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 344.605811] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 344.613083] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 344.620354] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:05 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_delrule={0x64, 0x21, 0xe1da5ecd93f488dd, 0x70bd2a, 0x25dfdbfb, {0x2, 0x80, 0x20, 0x5, 0x4, 0x0, 0x0, 0x7, 0x10014}, [@FRA_FLOW={0x8, 0xb, 0x7}, @FRA_GENERIC_POLICY=@FRA_IIFNAME={0x14, 0x3, 'macvtap0\x00'}, @FRA_FLOW={0x8, 0xb, 0x7aba9599}, @FRA_DST={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8, 0xe, 0x6}, @FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'team_slave_0\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x45}, 0x48883) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:05 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:05 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) 03:25:05 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:05 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:05 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 344.777320] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 344.798354] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 344.842860] CPU: 0 PID: 12909 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 344.850808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.860188] Call Trace: [ 344.862807] dump_stack+0x142/0x197 [ 344.866496] warn_alloc.cold+0x96/0x1af [ 344.870485] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 344.875430] ? lock_downgrade+0x740/0x740 [ 344.879723] ? avc_has_perm+0x2df/0x4b0 [ 344.883862] __vmalloc_node_range+0x3c3/0x6a0 [ 344.888378] vmalloc+0x46/0x50 [ 344.891587] ? sel_write_load+0x1a0/0x1050 [ 344.896620] sel_write_load+0x1a0/0x1050 [ 344.900807] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 344.906634] ? check_preemption_disabled+0x3c/0x250 [ 344.911699] ? retint_kernel+0x2d/0x2d [ 344.915629] ? sel_read_bool+0x240/0x240 [ 344.919712] ? sel_read_bool+0x240/0x240 [ 344.923805] __vfs_write+0x105/0x6b0 [ 344.927532] ? sel_read_bool+0x240/0x240 [ 344.931606] ? kernel_read+0x120/0x120 [ 344.935647] ? __lock_is_held+0xb6/0x140 [ 344.939722] ? check_preemption_disabled+0x3c/0x250 [ 344.945036] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 344.950520] ? rcu_read_lock_sched_held+0x110/0x130 [ 344.955570] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 344.960489] ? __sb_start_write+0x153/0x2f0 [ 344.964985] vfs_write+0x198/0x500 [ 344.968544] SyS_write+0xfd/0x230 [ 344.972022] ? SyS_read+0x230/0x230 [ 344.975687] ? do_syscall_64+0x53/0x640 [ 344.979665] ? SyS_read+0x230/0x230 [ 344.983294] do_syscall_64+0x1e8/0x640 [ 344.987302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.992154] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 344.997347] RIP: 0033:0x45b349 [ 345.000534] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 345.008259] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 345.016530] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 345.023814] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 345.031098] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 345.038377] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 345.053930] warn_alloc_show_mem: 2 callbacks suppressed [ 345.053949] Mem-Info: [ 345.064164] active_anon:216536 inactive_anon:204 isolated_anon:0 [ 345.064164] active_file:8222 inactive_file:11901 isolated_file:0 [ 345.064164] unevictable:0 dirty:203 writeback:0 unstable:0 [ 345.064164] slab_reclaimable:13065 slab_unreclaimable:114349 [ 345.064164] mapped:60518 shmem:250 pagetables:1471 bounce:0 03:25:05 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r4 = accept(r3, 0x0, &(0x7f0000000000)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 345.064164] free:1167229 free_pcp:126 free_cma:0 [ 345.102693] Node 0 active_anon:866144kB inactive_anon:816kB active_file:32748kB inactive_file:47604kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242172kB dirty:808kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 345.133845] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 345.160930] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 345.189756] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 345.197540] Node 0 DMA32 free:868676kB min:36380kB low:45472kB high:54564kB active_anon:868292kB inactive_anon:800kB active_file:32748kB inactive_file:47660kB unevictable:0kB writepending:840kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:8032kB pagetables:5828kB bounce:0kB free_pcp:684kB local_pcp:304kB free_cma:0kB [ 345.239740] lowmem_reserve[]: 0 0 0 0 0 [ 345.244402] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 345.271205] lowmem_reserve[]: 0 0 0 0 0 03:25:05 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10800, 0x0) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, 0xd, 0x6, 0x801, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x6c}}, 0x40000) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r2 = memfd_create(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002580)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000400)=""/194, 0xc2}], 0x1, &(0x7f0000000340)=""/117, 0x75}, 0x10001}, {{&(0x7f0000000500)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/237, 0xed}, {&(0x7f0000000740)=""/152, 0x98}, {&(0x7f0000000800)=""/130, 0x82}, {&(0x7f0000000680)=""/75, 0x4b}, {&(0x7f00000002c0)=""/24, 0x18}, {&(0x7f00000008c0)=""/166, 0xa6}, {&(0x7f0000000980)=""/119, 0x77}, {&(0x7f0000000a00)=""/13, 0xd}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x9, &(0x7f0000000b00)=""/56, 0x38}, 0x7e}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000b40)=""/244, 0xf4}, {&(0x7f0000000c40)=""/120, 0x78}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, &(0x7f0000000d80)=""/135, 0x87}, 0x6}, {{0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000e40)=""/200, 0xc8}, {&(0x7f0000000f40)=""/51, 0x33}, {&(0x7f0000000f80)=""/33, 0x21}], 0x3, &(0x7f0000001000)=""/217, 0xd9}, 0x5}, {{&(0x7f0000001100)=@ax25={{0x3, @netrom}, [@rose, @bcast, @remote, @netrom, @default, @default, @netrom, @bcast]}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001180)=""/60, 0x3c}], 0x1, &(0x7f0000001200)=""/143, 0x8f}, 0x20}, {{&(0x7f00000012c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f00000024c0)=[{&(0x7f00000023c0)=""/228, 0xe4}], 0x1, &(0x7f0000002500)=""/111, 0x6f}, 0x86c}], 0x6, 0x40008000, &(0x7f0000002700)={0x0, 0x1c9c380}) sendmsg$nl_route_sched(r2, &(0x7f00000027c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002780)={&(0x7f0000002800)=ANY=[@ANYBLOB="240000002a0000012bbd7000fedbdf2500000000", @ANYRES32=r3, @ANYBLOB="0c001000f3ff60080000000a00"], 0x24}, 0x1, 0x0, 0x0, 0x4011}, 0x4000) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) [ 345.275720] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 345.309699] lowmem_reserve[]: 0 0 0 0 0 [ 345.318218] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 345.337055] Node 0 DMA32: 1347*4kB (UME) 513*8kB (UME) 206*16kB (UME) 278*32kB (UME) 306*64kB (UME) 24*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 1*2048kB (M) 199*4096kB (M) = 870452kB [ 345.366824] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB 03:25:06 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x847, 0x48403) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 345.386396] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 345.410867] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 345.421792] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 345.430806] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 345.439948] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 345.450846] 20387 total pagecache pages [ 345.455622] 0 pages in swap cache [ 345.459422] Swap cache stats: add 0, delete 0, find 0/0 [ 345.466242] Free swap = 0kB [ 345.469795] Total swap = 0kB [ 345.473849] 1965979 pages RAM [ 345.478271] 0 pages HighMem/MovableOnly [ 345.484770] 335869 pages reserved [ 345.489564] 0 pages cma reserved 03:25:06 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x14000, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0x7, 0xbf6d, [], &(0x7f0000000080)=0x1}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 345.495000] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 345.506439] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 345.525447] CPU: 1 PID: 12907 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 345.533396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.542772] Call Trace: [ 345.545377] dump_stack+0x142/0x197 [ 345.549233] warn_alloc.cold+0x96/0x1af [ 345.553240] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 345.558101] ? mark_held_locks+0xb1/0x100 [ 345.562273] ? retint_kernel+0x2d/0x2d [ 345.566168] ? trace_hardirqs_on_caller+0x400/0x590 [ 345.571205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 345.575975] __vmalloc_node_range+0x3c3/0x6a0 [ 345.580496] vmalloc+0x46/0x50 [ 345.583701] ? sel_write_load+0x1a0/0x1050 [ 345.588042] sel_write_load+0x1a0/0x1050 [ 345.592112] ? mark_held_locks+0xb1/0x100 [ 345.596261] ? retint_kernel+0x2d/0x2d [ 345.600142] ? trace_hardirqs_on_caller+0x400/0x590 [ 345.605157] ? sel_read_bool+0x240/0x240 [ 345.609251] ? mark_held_locks+0xb1/0x100 [ 345.613395] ? retint_kernel+0x2d/0x2d [ 345.617313] __vfs_write+0x105/0x6b0 [ 345.621023] ? sel_read_bool+0x240/0x240 [ 345.625073] ? kernel_read+0x120/0x120 [ 345.629075] ? __lock_is_held+0xb6/0x140 [ 345.633155] ? check_preemption_disabled+0x3c/0x250 [ 345.638195] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 345.643650] ? rcu_read_lock_sched_held+0x110/0x130 [ 345.649461] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 345.654244] ? __sb_start_write+0x153/0x2f0 [ 345.658560] vfs_write+0x198/0x500 [ 345.662111] SyS_write+0xfd/0x230 [ 345.665573] ? SyS_read+0x230/0x230 [ 345.669195] ? do_syscall_64+0x53/0x640 [ 345.673190] ? SyS_read+0x230/0x230 [ 345.676837] do_syscall_64+0x1e8/0x640 [ 345.680730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.685586] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.690771] RIP: 0033:0x45b349 [ 345.693961] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 345.701668] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 345.708947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 345.716229] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 345.723594] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 345.730898] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:06 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:06 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) [ 345.759909] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 345.798658] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:06 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 345.834073] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 345.901722] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 345.942953] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 345.956708] CPU: 1 PID: 12943 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 345.964929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.974297] Call Trace: [ 345.977032] dump_stack+0x142/0x197 [ 345.980945] warn_alloc.cold+0x96/0x1af [ 345.984939] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 345.989810] __vmalloc_node_range+0x3c3/0x6a0 [ 345.994422] ? retint_kernel+0x2d/0x2d [ 345.998351] ? trace_hardirqs_on_caller+0x400/0x590 [ 346.003746] vmalloc+0x46/0x50 [ 346.006963] ? sel_write_load+0x1a0/0x1050 [ 346.011208] sel_write_load+0x1a0/0x1050 [ 346.015453] ? mark_held_locks+0xb1/0x100 [ 346.019623] ? retint_kernel+0x2d/0x2d [ 346.023530] ? trace_hardirqs_on_caller+0x400/0x590 [ 346.028703] ? sel_read_bool+0x240/0x240 [ 346.032784] ? trace_hardirqs_on+0x10/0x10 [ 346.037046] ? debug_smp_processor_id+0x1c/0x20 [ 346.041741] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 346.046695] __vfs_write+0x105/0x6b0 [ 346.050561] ? sel_read_bool+0x240/0x240 [ 346.054645] ? kernel_read+0x120/0x120 [ 346.058551] ? __lock_is_held+0xb6/0x140 [ 346.062629] ? check_preemption_disabled+0x3c/0x250 [ 346.067673] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 346.073186] ? rcu_read_lock_sched_held+0x110/0x130 [ 346.078228] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 346.083005] ? __sb_start_write+0x153/0x2f0 [ 346.087356] vfs_write+0x198/0x500 03:25:06 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) 03:25:06 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:06 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r4 = dup2(r2, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 346.090915] SyS_write+0xfd/0x230 [ 346.094410] ? SyS_read+0x230/0x230 [ 346.098139] ? do_syscall_64+0x53/0x640 [ 346.102150] ? SyS_read+0x230/0x230 [ 346.105810] do_syscall_64+0x1e8/0x640 [ 346.109712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.114594] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.119794] RIP: 0033:0x45b349 [ 346.123020] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 346.130925] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 346.138227] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 346.145512] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 346.153095] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 346.160387] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 346.196759] warn_alloc_show_mem: 1 callbacks suppressed [ 346.196776] Mem-Info: [ 346.207307] active_anon:216026 inactive_anon:199 isolated_anon:117 [ 346.207307] active_file:8222 inactive_file:11922 isolated_file:0 03:25:06 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000200)={{0x2, 0x4e24, @local}, {0x6, @random="ea52cf96560c"}, 0x64, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x37}}, 'virt_wifi0\x00'}) perf_event_open(&(0x7f0000001340)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r4, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_MRU={0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x44004880}, 0x4000) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0xd) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x14, 0x0, 0x20}) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) [ 346.207307] unevictable:0 dirty:218 writeback:0 unstable:0 [ 346.207307] slab_reclaimable:13065 slab_unreclaimable:114320 [ 346.207307] mapped:60493 shmem:250 pagetables:1479 bounce:0 [ 346.207307] free:1166343 free_pcp:337 free_cma:0 [ 346.275617] Node 0 active_anon:868332kB inactive_anon:796kB active_file:32748kB inactive_file:47688kB unevictable:0kB isolated(anon):24kB isolated(file):0kB mapped:241972kB dirty:868kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 274432kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 346.323480] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 346.350640] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 346.377330] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 346.383444] Node 0 DMA32 free:868100kB min:36380kB low:45472kB high:54564kB active_anon:868260kB inactive_anon:796kB active_file:32748kB inactive_file:47688kB unevictable:0kB writepending:868kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:8000kB pagetables:5916kB bounce:0kB free_pcp:1032kB local_pcp:452kB free_cma:0kB [ 346.422129] lowmem_reserve[]: 0 0 0 0 0 03:25:07 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r1 = timerfd_create(0x3, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 346.426883] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 346.458891] lowmem_reserve[]: 0 0 0 0 0 [ 346.464129] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 346.505882] lowmem_reserve[]: 0 0 0 0 0 [ 346.511152] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 346.529321] Node 0 DMA32: 1701*4kB (UME) 737*8kB (UME) 328*16kB (UME) 340*32kB (UME) 441*64kB (UME) 28*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 0*2048kB 195*4096kB (M) = 868316kB [ 346.553380] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 346.566657] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 346.591444] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 03:25:07 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000001, 0x440200) setsockopt$inet6_dccp_buf(r1, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r5 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r7 = dup2(r6, r5) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r7, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x4, "66c5fbe757368fbe", "f023c160de364064eeac0a9d3ae5fcffffffad121ab53e98f094f1b256b26857"}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000480)={'netpci0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x57, r8}) [ 346.601753] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 346.611505] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 346.626265] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 346.643235] 20397 total pagecache pages [ 346.655518] 0 pages in swap cache [ 346.659507] Swap cache stats: add 0, delete 0, find 0/0 [ 346.666645] Free swap = 0kB [ 346.669981] Total swap = 0kB [ 346.674790] 1965979 pages RAM [ 346.678449] 0 pages HighMem/MovableOnly [ 346.682881] 335869 pages reserved [ 346.686589] 0 pages cma reserved [ 346.690690] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 346.707576] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 346.722133] CPU: 1 PID: 12947 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 346.730097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.739463] Call Trace: [ 346.742101] dump_stack+0x142/0x197 [ 346.745755] warn_alloc.cold+0x96/0x1af [ 346.749767] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 346.756814] ? lock_downgrade+0x740/0x740 [ 346.760994] ? avc_has_perm+0x2df/0x4b0 [ 346.764996] __vmalloc_node_range+0x3c3/0x6a0 [ 346.769523] ? trace_hardirqs_on_caller+0x400/0x590 [ 346.774568] vmalloc+0x46/0x50 [ 346.777777] ? sel_write_load+0x1a0/0x1050 [ 346.782025] sel_write_load+0x1a0/0x1050 [ 346.786128] ? sel_read_bool+0x240/0x240 [ 346.790230] ? mark_held_locks+0xb1/0x100 [ 346.794389] ? retint_kernel+0x2d/0x2d [ 346.798290] __vfs_write+0x105/0x6b0 [ 346.802050] ? sel_read_bool+0x240/0x240 [ 346.806130] ? kernel_read+0x120/0x120 [ 346.810030] ? retint_kernel+0x2d/0x2d [ 346.813947] ? __sb_start_write+0x21a/0x2f0 [ 346.818293] ? __sb_start_write+0x153/0x2f0 [ 346.822638] vfs_write+0x198/0x500 [ 346.826197] SyS_write+0xfd/0x230 [ 346.829676] ? SyS_read+0x230/0x230 [ 346.833316] ? do_syscall_64+0x81/0x640 [ 346.837299] ? SyS_read+0x230/0x230 [ 346.840948] do_syscall_64+0x1e8/0x640 [ 346.844851] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.849714] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.854931] RIP: 0033:0x45b349 03:25:07 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) [ 346.858125] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 346.865859] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 346.873227] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 346.880556] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 346.887853] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 346.895164] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:07 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:07 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) [ 346.933170] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 346.949415] sel_write_load: 4 callbacks suppressed [ 346.949418] SELinux: failed to load policy [ 346.970242] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:07 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:07 executing program 3: r0 = getpid() tkill(r0, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x8f}, 0x10200, 0x48b, 0x1, 0x0, 0x200}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$VIDIOC_S_FMT(r5, 0xc0d05605, &(0x7f00000001c0)={0x5, @sdr={0x56544943, 0x101}}) r6 = memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r9 = dup2(r8, r7) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x40, r11, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_RULES={0x1c, 0x22, [@NL80211_ATTR_REG_RULE_FLAGS={0x8}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x2e9}]}, @NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x40}}, 0x0) r12 = socket(0x11, 0x800000003, 0x0) bind(r12, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r12, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r13, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000002c0)={'vcan0\x00', r13}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r6, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x6c, r11, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x7f, 0x1}}, @NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0x76}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x4}, @NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x48}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x8000}, @NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0xb7}]}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, [@NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x59}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x1}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20040000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r9, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x4, "2628084f00000004", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$VT_ACTIVATE(r9, 0x5606, 0x161) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) [ 346.988302] SELinux: failed to load policy 03:25:07 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) [ 347.033738] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 347.065295] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 347.134262] CPU: 0 PID: 12960 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 347.142308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.151878] Call Trace: [ 347.155187] dump_stack+0x142/0x197 [ 347.158843] warn_alloc.cold+0x96/0x1af [ 347.162852] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 347.168115] ? lock_downgrade+0x740/0x740 [ 347.172325] ? avc_has_perm+0x2df/0x4b0 [ 347.176328] __vmalloc_node_range+0x3c3/0x6a0 [ 347.180958] ? mark_held_locks+0xb1/0x100 [ 347.185130] vmalloc+0x46/0x50 [ 347.188333] ? sel_write_load+0x1a0/0x1050 [ 347.192668] sel_write_load+0x1a0/0x1050 [ 347.196734] ? save_trace+0x290/0x290 [ 347.200568] ? sel_read_bool+0x240/0x240 [ 347.204650] ? trace_hardirqs_on_caller+0x400/0x590 [ 347.209690] ? mark_held_locks+0xb1/0x100 [ 347.213930] __vfs_write+0x105/0x6b0 [ 347.217678] ? trace_hardirqs_on_caller+0x400/0x590 [ 347.222695] ? sel_read_bool+0x240/0x240 [ 347.226770] ? kernel_read+0x120/0x120 [ 347.230673] ? check_preemption_disabled+0x3c/0x250 [ 347.235688] ? retint_kernel+0x2d/0x2d [ 347.239603] vfs_write+0x198/0x500 [ 347.243162] SyS_write+0xfd/0x230 [ 347.246657] ? SyS_read+0x230/0x230 [ 347.250328] ? do_syscall_64+0x53/0x640 [ 347.254441] ? SyS_read+0x230/0x230 [ 347.258061] do_syscall_64+0x1e8/0x640 [ 347.261937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.266806] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.272083] RIP: 0033:0x45b349 [ 347.275262] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 347.282973] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 347.290248] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 347.297513] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 347.304792] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 347.312237] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 347.321085] warn_alloc_show_mem: 1 callbacks suppressed [ 347.321089] Mem-Info: [ 347.329873] active_anon:215459 inactive_anon:200 isolated_anon:0 [ 347.329873] active_file:8222 inactive_file:11931 isolated_file:0 [ 347.329873] unevictable:0 dirty:227 writeback:0 unstable:0 [ 347.329873] slab_reclaimable:13065 slab_unreclaimable:114361 [ 347.329873] mapped:60485 shmem:250 pagetables:1378 bounce:0 [ 347.329873] free:1168140 free_pcp:266 free_cma:0 [ 347.364462] Node 0 active_anon:861824kB inactive_anon:800kB active_file:32748kB inactive_file:47736kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241940kB dirty:916kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 276480kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 347.392792] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 347.419326] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 347.446524] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 347.452615] Node 0 DMA32 free:874312kB min:36380kB low:45472kB high:54564kB active_anon:861824kB inactive_anon:800kB active_file:32748kB inactive_file:47736kB unevictable:0kB writepending:916kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7712kB pagetables:5504kB bounce:0kB free_pcp:1344kB local_pcp:624kB free_cma:0kB [ 347.482489] lowmem_reserve[]: 0 0 0 0 0 [ 347.486512] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 347.512115] lowmem_reserve[]: 0 0 0 0 0 [ 347.516135] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 347.544225] lowmem_reserve[]: 0 0 0 0 0 [ 347.548256] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 347.562238] Node 0 DMA32: 1788*4kB (UME) 610*8kB (UME) 397*16kB (UME) 352*32kB (UME) 425*64kB (UME) 28*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 3*2048kB (M) 195*4096kB (M) = 874256kB [ 347.580806] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 347.591741] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 347.609404] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 347.618319] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 347.627057] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 347.636042] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 347.644709] 20408 total pagecache pages [ 347.648701] 0 pages in swap cache [ 347.652329] Swap cache stats: add 0, delete 0, find 0/0 [ 347.657697] Free swap = 0kB [ 347.660792] Total swap = 0kB [ 347.664007] 1965979 pages RAM [ 347.667324] 0 pages HighMem/MovableOnly [ 347.671473] 335869 pages reserved [ 347.675560] 0 pages cma reserved 03:25:08 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x847, 0x48403) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:08 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000080)="81fa6c41ea9cc0e1a2d2c2dec685464872a9235f13beb31952193d5226a7855459d3d140fd4d24163c9b8acdf040a4d12b803a0b5a43fa56b86586912035be2c59782afc3584922891078ed598ab55", 0x4f}, 0x68) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2580, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:25:08 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r1 = timerfd_create(0x3, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:08 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 347.679045] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 347.689804] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 347.713324] CPU: 1 PID: 12987 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 347.721410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.730778] Call Trace: [ 347.733436] dump_stack+0x142/0x197 [ 347.737090] warn_alloc.cold+0x96/0x1af [ 347.741345] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 347.746231] ? lock_downgrade+0x740/0x740 [ 347.750406] ? avc_has_perm+0x2df/0x4b0 [ 347.754398] __vmalloc_node_range+0x3c3/0x6a0 [ 347.758923] vmalloc+0x46/0x50 [ 347.762137] ? sel_write_load+0x1a0/0x1050 [ 347.766494] sel_write_load+0x1a0/0x1050 [ 347.770573] ? save_trace+0x290/0x290 [ 347.774405] ? sel_read_bool+0x240/0x240 [ 347.778486] ? trace_hardirqs_on_caller+0x400/0x590 [ 347.783525] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 347.788304] __vfs_write+0x105/0x6b0 [ 347.792043] ? sel_read_bool+0x240/0x240 [ 347.796126] ? kernel_read+0x120/0x120 [ 347.800032] ? __lock_is_held+0xb6/0x140 [ 347.804107] ? check_preemption_disabled+0x3c/0x250 [ 347.809145] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 347.814618] ? rcu_read_lock_sched_held+0x110/0x130 [ 347.819659] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 347.824440] ? __sb_start_write+0x153/0x2f0 [ 347.828782] vfs_write+0x198/0x500 [ 347.832427] SyS_write+0xfd/0x230 [ 347.835878] ? SyS_read+0x230/0x230 [ 347.839512] ? do_syscall_64+0x53/0x640 [ 347.843678] ? SyS_read+0x230/0x230 [ 347.847317] do_syscall_64+0x1e8/0x640 [ 347.851211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.856090] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.861286] RIP: 0033:0x45b349 [ 347.864465] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 347.872174] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 347.879569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 347.887094] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 347.894475] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 347.901760] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:08 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:08 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r4 = accept(r3, 0x0, &(0x7f0000000000)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:08 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r1 = timerfd_create(0x3, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 348.026095] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 348.068016] SELinux: failed to load policy [ 348.098083] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 348.112980] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 348.118641] CPU: 0 PID: 13005 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 348.126545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.136255] Call Trace: [ 348.138865] dump_stack+0x142/0x197 [ 348.142537] warn_alloc.cold+0x96/0x1af [ 348.146529] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 348.151397] ? lock_downgrade+0x740/0x740 [ 348.155595] ? avc_has_perm+0x2df/0x4b0 [ 348.159597] __vmalloc_node_range+0x3c3/0x6a0 [ 348.164122] vmalloc+0x46/0x50 [ 348.167341] ? sel_write_load+0x1a0/0x1050 [ 348.171595] sel_write_load+0x1a0/0x1050 [ 348.175677] ? save_trace+0x290/0x290 [ 348.179502] ? sel_read_bool+0x240/0x240 [ 348.183577] ? trace_hardirqs_on_caller+0x400/0x590 [ 348.188610] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 348.193383] __vfs_write+0x105/0x6b0 [ 348.197116] ? sel_read_bool+0x240/0x240 [ 348.201229] ? kernel_read+0x120/0x120 [ 348.205146] ? __lock_is_held+0xb6/0x140 [ 348.209223] ? check_preemption_disabled+0x3c/0x250 [ 348.214259] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 348.219730] ? rcu_read_lock_sched_held+0x110/0x130 [ 348.224816] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 348.229582] ? __sb_start_write+0x153/0x2f0 [ 348.233908] vfs_write+0x198/0x500 [ 348.237452] SyS_write+0xfd/0x230 [ 348.240988] ? SyS_read+0x230/0x230 [ 348.244810] ? do_syscall_64+0x53/0x640 [ 348.248793] ? SyS_read+0x230/0x230 [ 348.252415] do_syscall_64+0x1e8/0x640 [ 348.256301] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.261288] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 348.266489] RIP: 0033:0x45b349 [ 348.269770] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 348.277799] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 348.285079] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 03:25:08 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:08 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 348.292360] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 348.299642] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 348.306926] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:09 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x40, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000b9000000b9000000090000000f00000000000008050000000000000000000003000000000500000001000000a5f900001000000000000001000000002b008106060000000000000c01000000080000000700000f010000000500000008000000ff03000004000000ff7f0000040000000100000001000080010000000100000004000000f8ffffff05000000be0a0000040000000400008f972be400ff7f00000400000001800000084e00005cd4100000000000000a3d000000010000000000000205000000000000004161002e5f2e30"], &(0x7f0000000000)=""/12, 0xdd, 0xc}, 0x20) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:09 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 348.399531] warn_alloc_show_mem: 1 callbacks suppressed [ 348.399548] Mem-Info: [ 348.435372] active_anon:216037 inactive_anon:197 isolated_anon:0 [ 348.435372] active_file:8223 inactive_file:11940 isolated_file:0 [ 348.435372] unevictable:0 dirty:237 writeback:0 unstable:0 [ 348.435372] slab_reclaimable:13065 slab_unreclaimable:114401 [ 348.435372] mapped:60544 shmem:250 pagetables:1435 bounce:0 [ 348.435372] free:1167437 free_pcp:278 free_cma:0 03:25:09 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r1 = timerfd_create(0x3, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 348.580434] Node 0 active_anon:866124kB inactive_anon:788kB active_file:32752kB inactive_file:47760kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242076kB dirty:944kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 280576kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:25:09 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 348.639654] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:25:09 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000008c0), 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x2, &(0x7f00000008c0), &(0x7f0000000900)=0x4) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r4 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r6, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="c81b0000", @ANYRES16=r7, @ANYBLOB="020028bd7000fddbdf2504000000080001000300000074010c003c000b00080009009ace536a08000a0097b30000080009001344300308000a0015b90000080009002367fd18080009002a21b2220800090020f43f7c0c000b0008000900bd2b82481c000b0008000900c276706c08000a000022000008000a005a6400003c000b0008000a00323a00000800090015aea47f0800090022d20a110800090059dc686a08000a00edc40000080009009ea5d33308000a002f5700001c000b0008000a00e04b0000080009003e18fd780800090073cd40672c000b000800090007fe4f5308000a009022000008000a00057d000008000900e3d96e0308000a001dba00004c000b0008000a0039f7000008000a0053bb000008000a000dfc000008000900e321853508000900de3db7490800090062fff82c08000900f4c5d55508000900b478191908000a008cb700003c000b0008000a00b98000000800090037893869080009006b11e07208000a00f377000008000a00d0df000008000a00bfe9000008000a00cc06000008000200020000000400040008000100010000000800020001000000b8000c000c000b0008000900b3d5a50904000b0054000b0008000a00457a000008000a0088dd000008000900d0135b710800090087a0316a08000a004b28000008000a00aca5000008000900adabba0808000a003636000008000900f5b4856508000a000157000014000b00080009007fc9a00b08000a00840400003c000b0008000a002104000008000900a906843a08000a00035b000008000a00704c000008000a00b17f000008000a00aadd000008000900916cd51c640008002400070008000600f000000008000500d7500e3e0800050017dd224a08000600990000003c00070008000600fd0000000800050072108f0708000500cefe1d360800050091d4592708000600fd0000000800050051f1de0c08000500e07d0346"], 0x2c8}, 0x1, 0x0, 0x0, 0xf76306595533e523}, 0x44000) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x602001, 0x0) ioctl$NS_GET_USERNS(r8, 0xb701, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r8, 0xc0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x1, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0x3}, 0x0, 0x0, &(0x7f0000000340)={0x5, 0x2, 0x7c732e19}, &(0x7f0000000380)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0xfff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880)=r9, 0x4) r10 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x202000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r10, 0x40a85323, &(0x7f00000000c0)={{0x3f}, 'port0\x00', 0x20, 0x80000, 0x1, 0x9, 0x1, 0xffff, 0x1, 0x0, 0x0, 0xf8}) [ 348.705215] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 348.805301] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 348.814859] Node 0 DMA32 free:867268kB min:36380kB low:45472kB high:54564kB active_anon:868304kB inactive_anon:788kB active_file:32752kB inactive_file:47760kB unevictable:0kB writepending:944kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7872kB pagetables:5888kB bounce:0kB free_pcp:900kB local_pcp:200kB free_cma:0kB 03:25:09 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r4 = accept(r3, 0x0, &(0x7f0000000000)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 348.867626] lowmem_reserve[]: 0 0 0 0 0 [ 348.890873] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 348.955406] lowmem_reserve[]: 0 0 0 0 0 [ 348.980369] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 349.014109] lowmem_reserve[]: 0 0 0 0 0 [ 349.018191] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 349.035181] Node 0 DMA32: 1695*4kB (UME) 647*8kB (UME) 325*16kB (UME) 329*32kB (UME) 442*64kB (UME) 23*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 3*2048kB (M) 195*4096kB (M) = 872740kB [ 349.053268] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 349.064283] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 349.082116] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 349.091091] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 349.099675] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 349.108634] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 349.117478] 20416 total pagecache pages [ 349.121730] 0 pages in swap cache [ 349.125192] Swap cache stats: add 0, delete 0, find 0/0 03:25:09 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:09 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:09 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:09 executing program 2: r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0xffffffff80000001, "0d4033c000008fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r5}) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x4000, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, r10, 0x1, 0x0, 0x0, {0x3, 0x6c00000000000000}}, 0x14}}, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r13, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r14, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x24, &(0x7f0000000380)={@initdev, @multicast1, 0x0}, &(0x7f0000000400)=0xc) r16 = socket(0x11, 0x800000003, 0x0) bind(r16, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r16, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r17, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r18 = socket(0x11, 0x800000003, 0x0) bind(r18, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r19, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r20 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r21 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r22 = dup2(r21, r20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r22, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) accept$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) r24 = socket(0x11, 0x800000003, 0x0) bind(r24, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r24, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r25, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r26 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r27 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r28 = dup2(r27, r26) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r28, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r28, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) r30 = socket(0x11, 0x800000003, 0x0) bind(r30, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r30, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r31, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r32 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r33 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r34 = dup2(r33, r32) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r34, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r34, 0x0, 0x24, &(0x7f0000000740)={@empty, @dev, 0x0}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) r37 = socket(0x11, 0x800000003, 0x0) bind(r37, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r37, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r38, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000880)={'team0\x00', r38}) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r40, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r41, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000008c0)={'vcan0\x00'}) r42 = socket(0x11, 0x800000003, 0x0) bind(r42, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r42, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r43, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000009c0)}, 0x7}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000a00)=""/207, 0xcf}, {&(0x7f0000000b00)=""/2, 0x2}, {&(0x7f0000000b40)=""/127, 0x7f}, {&(0x7f0000000bc0)=""/100, 0x64}, {&(0x7f0000000c40)=""/122, 0x7a}, {&(0x7f0000000cc0)=""/103, 0x67}, {&(0x7f0000000d40)=""/80, 0x50}, {&(0x7f0000000dc0)=""/80, 0x50}, {&(0x7f0000000e40)=""/69, 0x45}, {&(0x7f0000000ec0)=""/33, 0x21}], 0xa, &(0x7f0000000fc0)=""/133, 0x85}, 0x9}, {{&(0x7f0000001080)=@caif=@dgm, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/64, 0x40}, {&(0x7f0000001140)=""/3, 0x3}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x3, &(0x7f00000011c0)=""/139, 0x8b}, 0x401}], 0x3, 0x40000022, &(0x7f00000023c0)) r46 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r47 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r48 = dup2(r47, r46) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r48, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$PNPIPE_IFINDEX(r48, 0x113, 0x2, &(0x7f0000003540)=0x0, &(0x7f0000003580)=0x4) r50 = socket(0x11, 0x800000003, 0x0) bind(r50, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r50, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r51, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r52 = socket(0x11, 0x800000003, 0x0) bind(r52, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r52, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r53, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) accept4$packet(r5, &(0x7f0000003680)={0x11, 0x0, 0x0}, &(0x7f00000036c0)=0x14, 0x80800) r55 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r56 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r57 = dup2(r56, r55) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r57, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r58 = socket(0x11, 0x800000003, 0x0) bind(r58, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r58, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r59, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r57, 0x8933, &(0x7f0000003840)={'team0\x00', r59}) r61 = socket(0x11, 0x800000003, 0x0) bind(r61, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r61, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r62, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r63 = socket(0x11, 0x800000003, 0x0) bind(r63, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r63, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r64, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000003940)={@mcast2, 0x0}, &(0x7f0000003980)=0x14) r66 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r67 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r68 = dup2(r67, r66) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r68, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r68, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000003ac0)=0xe8) r70 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r71 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r72 = dup2(r71, r70) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r72, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r72, 0x0, 0x20, &(0x7f0000003bc0)={@broadcast, @loopback, 0x0}, &(0x7f0000003c00)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f00000046c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000004680)={&(0x7f0000003c40)={0xa04, r10, 0x2, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x1ac, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5851}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x58b0}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r31}, {0x1dc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x4b}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r39}, {0xf8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r41}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x4, 0x1, 0x6, 0x2}, {0x0, 0x4, 0x3, 0x6e5}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8000}}}]}}, {{0x8, 0x1, r43}, {0x268, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xcd}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r44}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r45}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r49}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r51}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r54}}}]}}, {{0x8, 0x1, r60}, {0x1ac, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r62}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r64}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r65}}}]}}, {{0x8, 0x1, r69}, {0xe4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r73}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x42bb, 0x7f, 0x3, 0x4}, {0x100, 0x9, 0x4f, 0x4}, {0x5d, 0xe, 0xd9, 0x38}, {0x3, 0x20, 0x1, 0x8000}, {0x8, 0x3, 0x80, 0x1000}, {0xfc00, 0x3f, 0xf9, 0x7}, {0x6, 0x9, 0x0, 0x5}]}}}]}}]}, 0xa04}, 0x1, 0x0, 0x0, 0x8041}, 0x20000000) r74 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r75 = dup2(r74, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r75, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r75}) r77 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)=0x6) r78 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r79 = dup2(r78, r77) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r79, 0xc0105303, &(0x7f0000000100)={0x0, 0x2, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f00000000c0)={r76, 0x80000, r79}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) [ 349.131457] Free swap = 0kB [ 349.134472] Total swap = 0kB [ 349.137481] 1965979 pages RAM [ 349.140667] 0 pages HighMem/MovableOnly [ 349.144644] 335869 pages reserved [ 349.148327] 0 pages cma reserved [ 349.151884] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 349.190184] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 349.210645] CPU: 1 PID: 13024 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 349.218581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.227955] Call Trace: [ 349.230559] dump_stack+0x142/0x197 [ 349.234222] warn_alloc.cold+0x96/0x1af [ 349.238339] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 349.243204] ? lock_downgrade+0x740/0x740 [ 349.247494] ? avc_has_perm+0x2df/0x4b0 [ 349.251511] __vmalloc_node_range+0x3c3/0x6a0 [ 349.256027] ? trace_hardirqs_on_caller+0x400/0x590 [ 349.261333] vmalloc+0x46/0x50 [ 349.264656] ? sel_write_load+0x1a0/0x1050 [ 349.268904] sel_write_load+0x1a0/0x1050 [ 349.272978] ? mark_held_locks+0xb1/0x100 [ 349.277257] ? retint_kernel+0x2d/0x2d [ 349.281278] ? sel_read_bool+0x240/0x240 [ 349.285349] ? retint_kernel+0x2d/0x2d [ 349.289251] ? trace_hardirqs_on_caller+0x400/0x590 [ 349.294279] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 349.299052] __vfs_write+0x105/0x6b0 [ 349.302782] ? sel_read_bool+0x240/0x240 [ 349.306861] ? kernel_read+0x120/0x120 [ 349.310759] ? __lock_is_held+0xb6/0x140 [ 349.314949] ? check_preemption_disabled+0x3c/0x250 [ 349.319992] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 349.325467] ? rcu_read_lock_sched_held+0x110/0x130 [ 349.330638] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 349.335433] ? __sb_start_write+0x153/0x2f0 [ 349.339769] vfs_write+0x198/0x500 [ 349.343322] SyS_write+0xfd/0x230 [ 349.346788] ? SyS_read+0x230/0x230 [ 349.350428] ? do_syscall_64+0x81/0x640 [ 349.354409] ? SyS_read+0x230/0x230 [ 349.358048] do_syscall_64+0x1e8/0x640 [ 349.361948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.366811] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 349.372012] RIP: 0033:0x45b349 [ 349.375211] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 349.382927] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 349.390207] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 349.397495] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 349.404774] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 349.412052] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 349.534011] Mem-Info: [ 349.536781] active_anon:216001 inactive_anon:200 isolated_anon:0 [ 349.536781] active_file:8223 inactive_file:11995 isolated_file:0 [ 349.536781] unevictable:0 dirty:243 writeback:0 unstable:0 [ 349.536781] slab_reclaimable:13065 slab_unreclaimable:114676 [ 349.536781] mapped:60518 shmem:250 pagetables:1417 bounce:0 [ 349.536781] free:1167415 free_pcp:200 free_cma:0 [ 349.577546] Node 0 active_anon:864004kB inactive_anon:800kB active_file:32752kB inactive_file:47980kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242072kB dirty:968kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 276480kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 349.620874] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 349.647146] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 349.675947] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 349.681194] Node 0 DMA32 free:870968kB min:36380kB low:45472kB high:54564kB active_anon:864040kB inactive_anon:808kB active_file:32752kB inactive_file:48180kB unevictable:0kB writepending:1044kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7680kB pagetables:5672kB bounce:0kB free_pcp:704kB local_pcp:332kB free_cma:0kB [ 349.712146] lowmem_reserve[]: 0 0 0 0 0 [ 349.716164] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 349.741630] lowmem_reserve[]: 0 0 0 0 0 [ 349.745759] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 349.773541] lowmem_reserve[]: 0 0 0 0 0 [ 349.777548] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 349.791229] Node 0 DMA32: 1660*4kB (UME) 828*8kB (UME) 321*16kB (UME) 317*32kB (UME) 438*64kB (UME) 20*128kB (UM) 13*256kB (UM) 5*512kB (U) 3*1024kB (ME) 2*2048kB (M) 195*4096kB (M) = 870912kB [ 349.808680] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 349.819596] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 349.837262] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 349.846195] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 349.854960] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 349.863874] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 349.873459] 20520 total pagecache pages [ 349.877575] 0 pages in swap cache 03:25:10 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 349.881096] Swap cache stats: add 0, delete 0, find 0/0 [ 349.887332] Free swap = 0kB [ 349.890411] Total swap = 0kB [ 349.893438] 1965979 pages RAM [ 349.896531] 0 pages HighMem/MovableOnly [ 349.900576] 335869 pages reserved [ 349.904031] 0 pages cma reserved [ 349.908040] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 349.917401] SELinux: failed to load policy 03:25:10 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000000)="e01540002e1997f986d402a82d9dba142aca0fbb46b349e6ce7719c9e37fae8712000000000000", 0x27) 03:25:10 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:10 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 349.928193] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 349.971854] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 349.995913] CPU: 0 PID: 13066 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 350.003858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.013236] Call Trace: [ 350.015848] dump_stack+0x142/0x197 [ 350.019603] warn_alloc.cold+0x96/0x1af [ 350.023600] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 350.028466] ? lock_downgrade+0x740/0x740 [ 350.032640] ? avc_has_perm+0x2df/0x4b0 [ 350.036641] __vmalloc_node_range+0x3c3/0x6a0 [ 350.041163] vmalloc+0x46/0x50 [ 350.044355] ? sel_write_load+0x1a0/0x1050 [ 350.048598] sel_write_load+0x1a0/0x1050 [ 350.052660] ? save_trace+0x290/0x290 [ 350.056516] ? sel_read_bool+0x240/0x240 [ 350.060674] ? mark_held_locks+0xb1/0x100 [ 350.064830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 350.069596] ? retint_kernel+0x2d/0x2d [ 350.073484] __vfs_write+0x105/0x6b0 [ 350.077213] ? sel_read_bool+0x240/0x240 [ 350.081276] ? kernel_read+0x120/0x120 [ 350.085190] ? retint_kernel+0x2d/0x2d [ 350.089099] ? __sb_start_write+0x21a/0x2f0 [ 350.093437] ? __sb_start_write+0x153/0x2f0 [ 350.097768] vfs_write+0x198/0x500 [ 350.101438] SyS_write+0xfd/0x230 [ 350.105041] ? SyS_read+0x230/0x230 [ 350.108684] ? do_syscall_64+0x53/0x640 [ 350.112648] ? SyS_read+0x230/0x230 [ 350.116284] do_syscall_64+0x1e8/0x640 [ 350.120176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.125017] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.130205] RIP: 0033:0x45b349 [ 350.133412] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 350.141121] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 350.148518] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 350.155900] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 350.163187] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 350.170562] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:10 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:10 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x40000) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f0000000200)={0x20, 0x1, 0x5, 0xfffffffffffffff7, 0xfffffffffffffffd}) r4 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x40) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7a1, 0x80000) r6 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r8 = dup2(r7, r6) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r8, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$GIO_SCRNMAP(r8, 0x4b40, &(0x7f0000000340)=""/75) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f0000000080)=0x1) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 350.204705] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 350.284160] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 350.309283] CPU: 0 PID: 13075 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 350.317361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.326728] Call Trace: [ 350.329346] dump_stack+0x142/0x197 [ 350.333024] warn_alloc.cold+0x96/0x1af [ 350.337017] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 350.341880] ? lock_downgrade+0x740/0x740 [ 350.346148] ? avc_has_perm+0x2df/0x4b0 [ 350.350142] __vmalloc_node_range+0x3c3/0x6a0 [ 350.354660] ? trace_hardirqs_on_caller+0x400/0x590 [ 350.359808] vmalloc+0x46/0x50 [ 350.363014] ? sel_write_load+0x1a0/0x1050 [ 350.367276] sel_write_load+0x1a0/0x1050 [ 350.371352] ? save_trace+0x290/0x290 [ 350.375178] ? sel_read_bool+0x240/0x240 [ 350.379257] ? trace_hardirqs_on_caller+0x400/0x590 [ 350.384419] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 350.389203] __vfs_write+0x105/0x6b0 [ 350.393047] ? sel_read_bool+0x240/0x240 [ 350.397132] ? kernel_read+0x120/0x120 [ 350.401059] ? lock_is_held_type+0x17e/0x210 [ 350.405488] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 350.410960] ? rcu_read_lock_sched_held+0x110/0x130 [ 350.415992] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 350.420777] ? __sb_start_write+0x153/0x2f0 [ 350.425120] vfs_write+0x198/0x500 [ 350.428703] SyS_write+0xfd/0x230 [ 350.432177] ? SyS_read+0x230/0x230 [ 350.435815] ? do_syscall_64+0x53/0x640 [ 350.439929] ? SyS_read+0x230/0x230 [ 350.443576] do_syscall_64+0x1e8/0x640 [ 350.447477] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.452344] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.457549] RIP: 0033:0x45b349 [ 350.460758] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 350.468533] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 350.475816] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 03:25:11 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:11 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 350.483306] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 350.490590] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 350.497986] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:11 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:11 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 350.621356] warn_alloc_show_mem: 1 callbacks suppressed [ 350.621374] Mem-Info: [ 350.629906] active_anon:216540 inactive_anon:200 isolated_anon:0 [ 350.629906] active_file:8223 inactive_file:12049 isolated_file:0 [ 350.629906] unevictable:0 dirty:291 writeback:0 unstable:0 [ 350.629906] slab_reclaimable:13064 slab_unreclaimable:115081 [ 350.629906] mapped:60537 shmem:250 pagetables:1423 bounce:0 [ 350.629906] free:1166259 free_pcp:307 free_cma:0 [ 350.694258] Node 0 active_anon:864084kB inactive_anon:800kB active_file:32752kB inactive_file:48196kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242148kB dirty:1160kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 278528kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:25:11 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 350.726885] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 350.758985] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 03:25:11 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="73f13993f01ba595130912056c4ac4126c425a1bc481c0159a83f09bb5f27acbd95772b8e93deb75b5766f3bb50723b0aebeb3c02d150a2b018bd1a3e469e3ba2b19f4245ebc1d47d8c64c6602e1437c06d6dafbff", @ANYRES16=0x0, @ANYBLOB="000129bd7000ffdbdf251d00000008000300", @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20040041}, 0x4000000) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r8 = memfd_create(&(0x7f0000000380)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x80\x00\x00\x05\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\r\xed\x14\xd1c|=6\x11\xd9\xa7\xbe\xf7\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00', 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r10 = dup2(r9, r8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r10, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) write$FUSE_CREATE_OPEN(r10, &(0x7f0000000100)={0xa0, 0xffffffffffffffb4, 0x8, {{0x6, 0x3, 0x4, 0xf39, 0x0, 0x8, {0x1, 0x0, 0x9e13, 0x4, 0xfffffffffffffff7, 0x10000000cc, 0x9, 0xb4, 0x4, 0x34a3, 0x7, r12, 0xee00, 0x401, 0x8}}, {0x0, 0x1}}}, 0x5c) r13 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0xfff, 0x6, 0x4, 0x20000000, 0x2, {}, {0x2, 0xc, 0x0, 0xfd, 0x5, 0x3f, "cd7b03c1"}, 0x1ff, 0x3, @offset=0x1000, 0x4, 0x0, r13}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(r14, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r7, &(0x7f0000000040)="e0", 0xfffffe00) [ 350.813186] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 350.818455] Node 0 DMA32 free:868852kB min:36380kB low:45472kB high:54564kB active_anon:864064kB inactive_anon:800kB active_file:32752kB inactive_file:48196kB unevictable:0kB writepending:1160kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7840kB pagetables:5840kB bounce:0kB free_pcp:664kB local_pcp:216kB free_cma:0kB [ 350.869118] lowmem_reserve[]: 0 0 0 0 0 [ 350.880356] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 350.957305] lowmem_reserve[]: 0 0 0 0 0 [ 350.962327] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 351.002219] lowmem_reserve[]: 0 0 0 0 0 [ 351.006537] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 351.021718] Node 0 DMA32: 1584*4kB (UME) 694*8kB (UME) 348*16kB (UME) 350*32kB (UME) 429*64kB (UME) 19*128kB (UM) 11*256kB (UM) 5*512kB (U) 3*1024kB (ME) 2*2048kB (M) 195*4096kB (M) = 869808kB [ 351.039546] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 351.052541] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 351.070445] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 351.079605] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 351.088791] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 351.097928] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 351.107074] 20521 total pagecache pages [ 351.115568] 0 pages in swap cache [ 351.119568] Swap cache stats: add 0, delete 0, find 0/0 [ 351.131235] Free swap = 0kB [ 351.134433] Total swap = 0kB [ 351.137514] 1965979 pages RAM [ 351.141849] 0 pages HighMem/MovableOnly [ 351.145984] 335869 pages reserved [ 351.149505] 0 pages cma reserved 03:25:11 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:11 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:11 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x40000) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f0000000200)={0x20, 0x1, 0x5, 0xfffffffffffffff7, 0xfffffffffffffffd}) r4 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x40) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7a1, 0x80000) r6 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r8 = dup2(r7, r6) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r8, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$GIO_SCRNMAP(r8, 0x4b40, &(0x7f0000000340)=""/75) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f0000000080)=0x1) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:11 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:11 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000000)={0x6}, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 351.153823] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 351.164153] SELinux: failed to load policy [ 351.178924] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 351.215763] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 351.254494] CPU: 1 PID: 13103 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 351.262428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.272140] Call Trace: [ 351.274749] dump_stack+0x142/0x197 [ 351.278400] warn_alloc.cold+0x96/0x1af [ 351.282392] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 351.287254] ? lock_downgrade+0x740/0x740 [ 351.291428] ? avc_has_perm+0x2df/0x4b0 [ 351.295459] __vmalloc_node_range+0x3c3/0x6a0 [ 351.300114] vmalloc+0x46/0x50 [ 351.303316] ? sel_write_load+0x1a0/0x1050 [ 351.307566] sel_write_load+0x1a0/0x1050 [ 351.311638] ? save_trace+0x290/0x290 [ 351.315457] ? sel_read_bool+0x240/0x240 [ 351.319623] ? mark_held_locks+0xb1/0x100 [ 351.323793] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 351.328563] ? retint_kernel+0x2d/0x2d [ 351.332474] __vfs_write+0x105/0x6b0 [ 351.336207] ? sel_read_bool+0x240/0x240 [ 351.340282] ? kernel_read+0x120/0x120 [ 351.344225] ? __lock_is_held+0xb6/0x140 [ 351.348296] ? check_preemption_disabled+0x3c/0x250 [ 351.353331] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 351.358802] ? rcu_read_lock_sched_held+0x110/0x130 [ 351.363840] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 351.368626] ? __sb_start_write+0x153/0x2f0 [ 351.372966] vfs_write+0x198/0x500 [ 351.376529] SyS_write+0xfd/0x230 [ 351.379998] ? SyS_read+0x230/0x230 [ 351.383639] ? do_syscall_64+0x53/0x640 [ 351.387647] ? SyS_read+0x230/0x230 [ 351.391291] do_syscall_64+0x1e8/0x640 [ 351.395192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.400064] entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:25:12 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x40000) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f0000000200)={0x20, 0x1, 0x5, 0xfffffffffffffff7, 0xfffffffffffffffd}) r4 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x40) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7a1, 0x80000) r6 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r8 = dup2(r7, r6) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r8, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$GIO_SCRNMAP(r8, 0x4b40, &(0x7f0000000340)=""/75) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f0000000080)=0x1) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:12 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) [ 351.405426] RIP: 0033:0x45b349 [ 351.408622] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 351.416523] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 351.423947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 351.431231] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 351.438516] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 351.445909] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 351.649103] Mem-Info: [ 351.654678] active_anon:215466 inactive_anon:203 isolated_anon:0 [ 351.654678] active_file:8224 inactive_file:12060 isolated_file:0 [ 351.654678] unevictable:0 dirty:304 writeback:0 unstable:0 [ 351.654678] slab_reclaimable:13061 slab_unreclaimable:115125 [ 351.654678] mapped:60566 shmem:251 pagetables:1393 bounce:0 [ 351.654678] free:1167367 free_pcp:284 free_cma:0 [ 351.700987] Node 0 active_anon:859720kB inactive_anon:812kB active_file:32756kB inactive_file:48240kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242264kB dirty:1212kB writeback:0kB shmem:1004kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 276480kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 351.731722] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 351.757832] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 351.784254] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 351.789308] Node 0 DMA32 free:873584kB min:36380kB low:45472kB high:54564kB active_anon:859720kB inactive_anon:816kB active_file:32756kB inactive_file:48240kB unevictable:0kB writepending:1220kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7680kB pagetables:5472kB bounce:0kB free_pcp:1280kB local_pcp:656kB free_cma:0kB [ 351.819712] lowmem_reserve[]: 0 0 0 0 0 [ 351.823838] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 351.850430] lowmem_reserve[]: 0 0 0 0 0 [ 351.854468] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 351.882594] lowmem_reserve[]: 0 0 0 0 0 [ 351.886606] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 351.900355] Node 0 DMA32: 1736*4kB (UME) 635*8kB (UME) 347*16kB (UME) 336*32kB (UME) 430*64kB (UME) 20*128kB (UM) 11*256kB (UM) 5*512kB (U) 3*1024kB (ME) 2*2048kB (M) 196*4096kB (M) = 873768kB [ 351.917909] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 351.928772] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 351.946615] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 351.955546] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 351.964881] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 351.973905] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 351.983046] 20537 total pagecache pages [ 351.987086] 0 pages in swap cache [ 351.990639] Swap cache stats: add 0, delete 0, find 0/0 [ 351.996107] Free swap = 0kB [ 351.999131] Total swap = 0kB 03:25:12 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:12 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:12 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:12 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="d57f00000000ffffffff12"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4ca64}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, r3, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x24, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x40, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc221}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4004010}, 0x44) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:12 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 352.002283] 1965979 pages RAM [ 352.005392] 0 pages HighMem/MovableOnly [ 352.009352] 335869 pages reserved [ 352.012877] 0 pages cma reserved [ 352.025521] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 352.050925] SELinux: failed to load policy 03:25:12 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:12 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 352.102298] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 352.121719] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 352.134595] CPU: 0 PID: 13161 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 352.142611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.151973] Call Trace: [ 352.154589] dump_stack+0x142/0x197 [ 352.158237] warn_alloc.cold+0x96/0x1af [ 352.162498] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 352.167403] ? mark_held_locks+0xb1/0x100 [ 352.171667] ? retint_kernel+0x2d/0x2d [ 352.175652] ? trace_hardirqs_on_caller+0x400/0x590 [ 352.181201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 352.185982] __vmalloc_node_range+0x3c3/0x6a0 [ 352.190491] vmalloc+0x46/0x50 [ 352.193696] ? sel_write_load+0x1a0/0x1050 [ 352.197941] sel_write_load+0x1a0/0x1050 [ 352.202025] ? sel_read_bool+0x240/0x240 [ 352.206106] ? trace_hardirqs_on_caller+0x400/0x590 [ 352.211280] ? mark_held_locks+0xb1/0x100 [ 352.215430] __vfs_write+0x105/0x6b0 [ 352.219450] ? trace_hardirqs_on_caller+0x400/0x590 [ 352.224473] ? sel_read_bool+0x240/0x240 [ 352.228548] ? kernel_read+0x120/0x120 [ 352.232426] ? check_preemption_disabled+0x3c/0x250 [ 352.237460] ? retint_kernel+0x2d/0x2d [ 352.241545] vfs_write+0x198/0x500 [ 352.245178] SyS_write+0xfd/0x230 [ 352.248624] ? SyS_read+0x230/0x230 [ 352.252240] ? do_syscall_64+0x53/0x640 [ 352.256203] ? SyS_read+0x230/0x230 [ 352.259817] do_syscall_64+0x1e8/0x640 [ 352.263700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.268554] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 352.273736] RIP: 0033:0x45b349 [ 352.276930] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 352.284973] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 352.292238] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 352.299692] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 352.306969] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 352.314358] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 352.332085] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 352.339506] SELinux: failed to load policy 03:25:13 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 352.344339] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 352.355323] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 352.361727] CPU: 0 PID: 13169 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 352.369657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.379031] Call Trace: [ 352.381639] dump_stack+0x142/0x197 [ 352.385288] warn_alloc.cold+0x96/0x1af [ 352.389305] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 352.394187] ? lock_downgrade+0x740/0x740 [ 352.398350] ? avc_has_perm+0x2df/0x4b0 [ 352.402476] __vmalloc_node_range+0x3c3/0x6a0 [ 352.407009] ? trace_hardirqs_on_caller+0x400/0x590 [ 352.412070] vmalloc+0x46/0x50 [ 352.415302] ? sel_write_load+0x1a0/0x1050 [ 352.419556] sel_write_load+0x1a0/0x1050 [ 352.423644] ? sel_read_bool+0x240/0x240 [ 352.427720] ? mark_held_locks+0xb1/0x100 [ 352.431881] ? retint_kernel+0x2d/0x2d [ 352.435903] __vfs_write+0x105/0x6b0 [ 352.439628] ? sel_read_bool+0x240/0x240 [ 352.443701] ? kernel_read+0x120/0x120 [ 352.447773] ? __lock_is_held+0xb6/0x140 [ 352.451848] ? check_preemption_disabled+0x3c/0x250 [ 352.456996] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 352.462473] ? rcu_read_lock_sched_held+0x110/0x130 [ 352.467630] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 352.472403] ? __sb_start_write+0x153/0x2f0 [ 352.476735] vfs_write+0x198/0x500 [ 352.480288] SyS_write+0xfd/0x230 [ 352.483756] ? SyS_read+0x230/0x230 [ 352.487409] ? do_syscall_64+0x53/0x640 [ 352.491393] ? SyS_read+0x230/0x230 [ 352.495032] do_syscall_64+0x1e8/0x640 [ 352.498954] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:25:13 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 352.503818] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 352.509006] RIP: 0033:0x45b349 [ 352.512197] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 352.519912] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 352.527192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 352.534473] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 352.541750] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 03:25:13 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 352.549119] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:13 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:13 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 352.674003] warn_alloc_show_mem: 1 callbacks suppressed [ 352.674098] Mem-Info: [ 352.688059] active_anon:216558 inactive_anon:200 isolated_anon:0 [ 352.688059] active_file:8224 inactive_file:12064 isolated_file:0 [ 352.688059] unevictable:0 dirty:308 writeback:0 unstable:0 [ 352.688059] slab_reclaimable:13061 slab_unreclaimable:114615 [ 352.688059] mapped:60560 shmem:250 pagetables:1477 bounce:0 [ 352.688059] free:1166178 free_pcp:322 free_cma:0 03:25:13 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 352.798086] Node 0 active_anon:868336kB inactive_anon:800kB active_file:32756kB inactive_file:48256kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242340kB dirty:1228kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 280576kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:25:13 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 352.842490] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 352.879603] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 352.923755] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 352.929445] Node 0 DMA32 free:866432kB min:36380kB low:45472kB high:54564kB active_anon:868288kB inactive_anon:800kB active_file:32756kB inactive_file:48256kB unevictable:0kB writepending:1228kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7936kB pagetables:5760kB bounce:0kB free_pcp:936kB local_pcp:520kB free_cma:0kB [ 352.959970] lowmem_reserve[]: 0 0 0 0 0 [ 352.964436] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 352.991321] lowmem_reserve[]: 0 0 0 0 0 03:25:13 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 352.995442] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 353.027716] lowmem_reserve[]: 0 0 0 0 0 [ 353.031899] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 353.046802] Node 0 DMA32: 1499*4kB (UME) 613*8kB (UME) 349*16kB (UME) 377*32kB (UME) 436*64kB (UME) 21*128kB (UM) 11*256kB (UM) 5*512kB (U) 3*1024kB (ME) 1*2048kB (M) 195*4096kB (M) = 868356kB [ 353.065432] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 353.076645] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 353.101784] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 353.111193] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 353.119800] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 353.130501] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 353.139099] 20545 total pagecache pages [ 353.143196] 0 pages in swap cache [ 353.146751] Swap cache stats: add 0, delete 0, find 0/0 03:25:13 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:13 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 353.152234] Free swap = 0kB [ 353.155265] Total swap = 0kB [ 353.158286] 1965979 pages RAM [ 353.161492] 0 pages HighMem/MovableOnly [ 353.165463] 335869 pages reserved [ 353.168957] 0 pages cma reserved [ 353.173123] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 353.183628] SELinux: failed to load policy [ 353.194894] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 353.215719] SELinux: failed to load policy [ 353.231908] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:25:13 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:13 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r3, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r4, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x12) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r7 = creat(&(0x7f0000000500)='./file0\x00', 0xef) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r7, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x58, 0x1, 0x8, 0x0, 0x0, 0x0, {0x0, 0x0, 0x2}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8863}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x806}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0xff51ec54a743f1ad) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r7, 0x111, 0x3, 0x1, 0x4) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000200)={0x4, 0x8, 0xd3, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x9909d5, 0x4, [], @p_u8=&(0x7f0000000080)}}) [ 353.270461] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 353.292045] CPU: 0 PID: 13185 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 353.300602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.310072] Call Trace: [ 353.312782] dump_stack+0x142/0x197 [ 353.316457] warn_alloc.cold+0x96/0x1af [ 353.320454] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 353.325320] ? lock_downgrade+0x740/0x740 [ 353.329494] ? avc_has_perm+0x2df/0x4b0 [ 353.333487] __vmalloc_node_range+0x3c3/0x6a0 [ 353.337994] ? retint_kernel+0x2d/0x2d [ 353.341990] vmalloc+0x46/0x50 [ 353.345200] ? sel_write_load+0x1a0/0x1050 [ 353.349472] sel_write_load+0x1a0/0x1050 [ 353.353547] ? mark_held_locks+0xb1/0x100 [ 353.357702] ? save_trace+0x290/0x290 [ 353.361524] ? sel_read_bool+0x240/0x240 [ 353.365598] ? mark_held_locks+0xb1/0x100 [ 353.369761] ? retint_kernel+0x2d/0x2d [ 353.373669] __vfs_write+0x105/0x6b0 [ 353.377404] ? sel_read_bool+0x240/0x240 [ 353.381478] ? kernel_read+0x120/0x120 [ 353.385448] ? retint_kernel+0x2d/0x2d [ 353.389372] ? __sb_start_write+0x222/0x2f0 [ 353.393711] ? __sb_start_write+0x153/0x2f0 [ 353.398307] vfs_write+0x198/0x500 [ 353.401932] SyS_write+0xfd/0x230 [ 353.405426] ? SyS_read+0x230/0x230 [ 353.409058] ? do_syscall_64+0xcf/0x640 [ 353.413034] ? SyS_read+0x230/0x230 [ 353.416667] do_syscall_64+0x1e8/0x640 [ 353.420560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.426429] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.431610] RIP: 0033:0x45b349 [ 353.434799] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 353.442503] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 353.449791] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 353.457181] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 353.464458] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 353.472180] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 353.502617] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 353.535211] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 353.560416] CPU: 1 PID: 13195 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 353.568343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.577711] Call Trace: [ 353.580318] dump_stack+0x142/0x197 [ 353.583975] warn_alloc.cold+0x96/0x1af [ 353.588080] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 353.592963] __vmalloc_node_range+0x3c3/0x6a0 [ 353.597476] ? retint_kernel+0x2d/0x2d [ 353.601382] vmalloc+0x46/0x50 [ 353.604604] ? sel_write_load+0x1a0/0x1050 [ 353.608859] sel_write_load+0x1a0/0x1050 [ 353.612936] ? sel_read_bool+0x240/0x240 [ 353.617136] ? trace_hardirqs_on_caller+0x400/0x590 [ 353.622346] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 353.627128] __vfs_write+0x105/0x6b0 [ 353.630856] ? sel_read_bool+0x240/0x240 [ 353.635151] ? kernel_read+0x120/0x120 [ 353.639254] ? __lock_is_held+0xb6/0x140 [ 353.643331] ? check_preemption_disabled+0x3c/0x250 [ 353.648367] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 353.653928] ? rcu_read_lock_sched_held+0x110/0x130 [ 353.659041] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 353.663809] ? __sb_start_write+0x153/0x2f0 [ 353.668144] vfs_write+0x198/0x500 [ 353.671702] SyS_write+0xfd/0x230 [ 353.675165] ? SyS_read+0x230/0x230 [ 353.678801] ? do_syscall_64+0x53/0x640 [ 353.682808] ? SyS_read+0x230/0x230 [ 353.686454] do_syscall_64+0x1e8/0x640 [ 353.690477] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.695449] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.700826] RIP: 0033:0x45b349 03:25:14 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 353.704024] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 353.711878] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 353.719161] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 353.726459] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 353.733746] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 353.741156] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:14 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 353.776687] warn_alloc_show_mem: 1 callbacks suppressed [ 353.776713] Mem-Info: [ 353.789844] active_anon:216538 inactive_anon:200 isolated_anon:0 [ 353.789844] active_file:8224 inactive_file:12072 isolated_file:0 [ 353.789844] unevictable:0 dirty:318 writeback:0 unstable:0 [ 353.789844] slab_reclaimable:13061 slab_unreclaimable:114751 [ 353.789844] mapped:60558 shmem:250 pagetables:1432 bounce:0 [ 353.789844] free:1166622 free_pcp:154 free_cma:0 03:25:14 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 353.851775] Node 0 active_anon:868224kB inactive_anon:800kB active_file:32756kB inactive_file:48288kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242232kB dirty:1268kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 280576kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:25:14 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="d57f00000000ffffffff12"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4ca64}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, r3, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x24, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x40, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc221}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4004010}, 0x44) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 353.887980] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 353.915755] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 353.945965] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 353.956335] Node 0 DMA32 free:868552kB min:36380kB low:45472kB high:54564kB active_anon:866136kB inactive_anon:800kB active_file:32756kB inactive_file:48312kB unevictable:0kB writepending:1300kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7936kB pagetables:5728kB bounce:0kB free_pcp:792kB local_pcp:548kB free_cma:0kB [ 353.996579] lowmem_reserve[]: 0 0 0 0 0 [ 354.000845] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 354.027450] lowmem_reserve[]: 0 0 0 0 0 [ 354.031711] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 354.059983] lowmem_reserve[]: 0 0 0 0 0 [ 354.064234] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 354.078895] Node 0 DMA32: 1482*4kB (UME) 545*8kB (UME) 371*16kB (UME) 392*32kB (UME) 437*64kB (UME) 19*128kB (UM) 11*256kB (UM) 5*512kB (U) 3*1024kB (ME) 1*2048kB (M) 195*4096kB (M) = 868384kB [ 354.097198] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 354.108272] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 354.125995] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 354.135046] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 354.143919] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 03:25:14 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:14 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 354.153622] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 354.162311] 20556 total pagecache pages [ 354.166296] 0 pages in swap cache [ 354.169749] Swap cache stats: add 0, delete 0, find 0/0 [ 354.175219] Free swap = 0kB [ 354.178237] Total swap = 0kB [ 354.181379] 1965979 pages RAM [ 354.184592] 0 pages HighMem/MovableOnly [ 354.188609] 335869 pages reserved [ 354.192182] 0 pages cma reserved [ 354.195629] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 354.221364] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 354.229537] CPU: 1 PID: 13208 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 354.237461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.246842] Call Trace: [ 354.249451] dump_stack+0x142/0x197 [ 354.253127] warn_alloc.cold+0x96/0x1af [ 354.257125] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 354.261993] ? lock_downgrade+0x740/0x740 [ 354.266168] ? avc_has_perm+0x2df/0x4b0 [ 354.270166] __vmalloc_node_range+0x3c3/0x6a0 [ 354.274687] ? trace_hardirqs_on_caller+0x400/0x590 [ 354.279819] vmalloc+0x46/0x50 [ 354.283032] ? sel_write_load+0x1a0/0x1050 [ 354.287285] sel_write_load+0x1a0/0x1050 [ 354.291365] ? save_trace+0x290/0x290 [ 354.295197] ? sel_read_bool+0x240/0x240 [ 354.299374] ? trace_hardirqs_on_caller+0x400/0x590 [ 354.305381] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 354.310161] __vfs_write+0x105/0x6b0 [ 354.313886] ? sel_read_bool+0x240/0x240 [ 354.318665] ? kernel_read+0x120/0x120 [ 354.322577] ? __lock_is_held+0xb6/0x140 [ 354.326655] ? check_preemption_disabled+0x3c/0x250 [ 354.331693] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 354.337164] ? rcu_read_lock_sched_held+0x110/0x130 [ 354.342217] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 354.346991] ? __sb_start_write+0x153/0x2f0 [ 354.351331] vfs_write+0x198/0x500 [ 354.355038] SyS_write+0xfd/0x230 [ 354.358596] ? SyS_read+0x230/0x230 [ 354.362240] ? do_syscall_64+0x53/0x640 [ 354.366269] ? SyS_read+0x230/0x230 03:25:14 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x8) 03:25:15 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x8) [ 354.369935] do_syscall_64+0x1e8/0x640 [ 354.373855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.378724] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.383929] RIP: 0033:0x45b349 [ 354.387142] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 354.394869] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 354.402169] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 354.409452] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:25:15 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 354.416737] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 354.424017] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 354.436211] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 354.453820] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 354.465237] CPU: 1 PID: 13218 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 354.473466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.483007] Call Trace: [ 354.485612] dump_stack+0x142/0x197 [ 354.489490] warn_alloc.cold+0x96/0x1af [ 354.493593] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 354.498506] ? lock_downgrade+0x740/0x740 [ 354.502651] ? avc_has_perm+0x2df/0x4b0 [ 354.506666] __vmalloc_node_range+0x3c3/0x6a0 [ 354.511231] vmalloc+0x46/0x50 [ 354.514455] ? sel_write_load+0x1a0/0x1050 [ 354.518689] sel_write_load+0x1a0/0x1050 [ 354.522742] ? save_trace+0x290/0x290 [ 354.526606] ? sel_read_bool+0x240/0x240 [ 354.530676] ? trace_hardirqs_on+0x10/0x10 [ 354.534920] ? debug_smp_processor_id+0x1c/0x20 [ 354.539642] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 354.544575] __vfs_write+0x105/0x6b0 [ 354.548289] ? sel_read_bool+0x240/0x240 [ 354.552342] ? kernel_read+0x120/0x120 [ 354.556235] ? __lock_is_held+0xb6/0x140 [ 354.560293] ? check_preemption_disabled+0x3c/0x250 [ 354.565307] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 354.570881] ? rcu_read_lock_sched_held+0x110/0x130 [ 354.575914] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 354.580806] ? __sb_start_write+0x153/0x2f0 [ 354.585241] vfs_write+0x198/0x500 [ 354.588771] SyS_write+0xfd/0x230 [ 354.592395] ? SyS_read+0x230/0x230 [ 354.596076] ? do_syscall_64+0x53/0x640 [ 354.600235] ? SyS_read+0x230/0x230 [ 354.603988] do_syscall_64+0x1e8/0x640 [ 354.607875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.612714] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.617920] RIP: 0033:0x45b349 [ 354.621098] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 354.628811] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 354.636174] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 354.643456] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 354.650881] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 354.658243] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 354.667763] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 354.689123] SELinux: failed to load policy [ 354.704030] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 354.715454] SELinux: failed to load policy 03:25:15 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:15 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x8) 03:25:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:15 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 354.724729] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 354.744921] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 354.765499] CPU: 0 PID: 13240 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 354.773792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.783159] Call Trace: [ 354.785867] dump_stack+0x142/0x197 [ 354.789531] warn_alloc.cold+0x96/0x1af [ 354.793620] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 354.798499] ? lock_downgrade+0x740/0x740 [ 354.802679] ? avc_has_perm+0x2df/0x4b0 [ 354.806676] __vmalloc_node_range+0x3c3/0x6a0 [ 354.811203] vmalloc+0x46/0x50 [ 354.814412] ? sel_write_load+0x1a0/0x1050 [ 354.818668] sel_write_load+0x1a0/0x1050 [ 354.822759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 354.828525] ? retint_kernel+0x2d/0x2d [ 354.832427] ? sel_read_bool+0x240/0x240 [ 354.836508] ? sel_read_bool+0x240/0x240 [ 354.840587] __vfs_write+0x105/0x6b0 [ 354.844310] ? sel_read_bool+0x240/0x240 [ 354.848386] ? kernel_read+0x120/0x120 [ 354.852307] ? __lock_is_held+0xb6/0x140 [ 354.856384] ? check_preemption_disabled+0x3c/0x250 [ 354.861450] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 354.867242] ? rcu_read_lock_sched_held+0x110/0x130 [ 354.872275] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 354.877053] ? __sb_start_write+0x153/0x2f0 [ 354.881387] vfs_write+0x198/0x500 [ 354.884949] SyS_write+0xfd/0x230 [ 354.888438] ? SyS_read+0x230/0x230 [ 354.892068] ? do_syscall_64+0x53/0x640 [ 354.896053] ? SyS_read+0x230/0x230 [ 354.899955] do_syscall_64+0x1e8/0x640 [ 354.903859] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.908721] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.913918] RIP: 0033:0x45b349 [ 354.917261] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 03:25:15 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 354.924985] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 354.932261] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 354.939576] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 354.946863] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 354.954149] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 355.034954] warn_alloc_show_mem: 2 callbacks suppressed [ 355.034972] Mem-Info: [ 355.063742] active_anon:216536 inactive_anon:201 isolated_anon:0 [ 355.063742] active_file:8225 inactive_file:12088 isolated_file:0 [ 355.063742] unevictable:0 dirty:343 writeback:0 unstable:0 [ 355.063742] slab_reclaimable:13061 slab_unreclaimable:114957 [ 355.063742] mapped:60550 shmem:250 pagetables:1438 bounce:0 [ 355.063742] free:1166470 free_pcp:213 free_cma:0 [ 355.114117] Node 0 active_anon:868236kB inactive_anon:804kB active_file:32760kB inactive_file:48352kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242200kB dirty:1368kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 280576kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 355.142811] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 355.170336] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 355.197060] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 355.210096] Node 0 DMA32 free:866372kB min:36380kB low:45472kB high:54564kB active_anon:866144kB inactive_anon:796kB active_file:32760kB inactive_file:48368kB unevictable:0kB writepending:1384kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7872kB pagetables:5724kB bounce:0kB free_pcp:832kB local_pcp:252kB free_cma:0kB [ 355.241004] lowmem_reserve[]: 0 0 0 0 0 [ 355.245151] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 355.270990] lowmem_reserve[]: 0 0 0 0 0 [ 355.275204] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 355.303744] lowmem_reserve[]: 0 0 0 0 0 [ 355.307880] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 355.322030] Node 0 DMA32: 1532*4kB (UME) 739*8kB (UME) 323*16kB (UME) 320*32kB (UME) 429*64kB (UME) 20*128kB (UM) 11*256kB (UM) 5*512kB (U) 3*1024kB (ME) 1*2048kB (M) 195*4096kB (M) = 866680kB [ 355.340664] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 355.351608] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 355.369193] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 355.378653] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 355.387442] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 355.396337] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 355.404996] 20568 total pagecache pages [ 355.408985] 0 pages in swap cache [ 355.412489] Swap cache stats: add 0, delete 0, find 0/0 [ 355.417971] Free swap = 0kB [ 355.421065] Total swap = 0kB [ 355.424090] 1965979 pages RAM [ 355.427204] 0 pages HighMem/MovableOnly [ 355.431377] 335869 pages reserved 03:25:16 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 355.434839] 0 pages cma reserved [ 355.438375] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 355.461051] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 355.476485] CPU: 1 PID: 13249 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 355.484446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.493962] Call Trace: [ 355.496570] dump_stack+0x142/0x197 [ 355.500222] warn_alloc.cold+0x96/0x1af [ 355.504217] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 355.509080] ? lock_downgrade+0x740/0x740 [ 355.513381] ? avc_has_perm+0x2df/0x4b0 [ 355.517395] __vmalloc_node_range+0x3c3/0x6a0 [ 355.522106] vmalloc+0x46/0x50 [ 355.525320] ? sel_write_load+0x1a0/0x1050 [ 355.529708] sel_write_load+0x1a0/0x1050 03:25:16 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:16 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 355.534313] ? save_trace+0x290/0x290 [ 355.538142] ? sel_read_bool+0x240/0x240 [ 355.542229] ? trace_hardirqs_on_caller+0x400/0x590 [ 355.547360] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 355.552131] __vfs_write+0x105/0x6b0 [ 355.555858] ? sel_read_bool+0x240/0x240 [ 355.560029] ? kernel_read+0x120/0x120 [ 355.563937] ? lock_is_held_type+0x17e/0x210 [ 355.568368] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 355.573831] ? rcu_read_lock_sched_held+0x110/0x130 [ 355.578994] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 355.583886] ? __sb_start_write+0x153/0x2f0 [ 355.588234] vfs_write+0x198/0x500 [ 355.591794] SyS_write+0xfd/0x230 [ 355.597412] ? SyS_read+0x230/0x230 [ 355.601042] ? do_syscall_64+0x53/0x640 [ 355.605032] ? SyS_read+0x230/0x230 [ 355.608667] do_syscall_64+0x1e8/0x640 [ 355.612539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.617384] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.622578] RIP: 0033:0x45b349 [ 355.625780] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 355.633496] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 355.640855] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 355.648135] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 355.655506] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 355.662795] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:16 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 355.705471] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 355.724857] SELinux: failed to load policy [ 355.735116] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:25:16 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:16 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 355.767480] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 355.797406] CPU: 0 PID: 13266 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 355.805361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.814736] Call Trace: [ 355.817345] dump_stack+0x142/0x197 [ 355.820997] warn_alloc.cold+0x96/0x1af [ 355.824999] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 355.829863] ? lock_downgrade+0x740/0x740 [ 355.834168] ? avc_has_perm+0x2df/0x4b0 [ 355.838186] __vmalloc_node_range+0x3c3/0x6a0 [ 355.842705] vmalloc+0x46/0x50 [ 355.845909] ? sel_write_load+0x1a0/0x1050 [ 355.850161] sel_write_load+0x1a0/0x1050 [ 355.854243] ? save_trace+0x290/0x290 [ 355.858069] ? sel_read_bool+0x240/0x240 [ 355.862142] ? trace_hardirqs_on+0x10/0x10 [ 355.866402] ? debug_smp_processor_id+0x1c/0x20 [ 355.871096] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 355.876049] __vfs_write+0x105/0x6b0 [ 355.879780] ? sel_read_bool+0x240/0x240 [ 355.883859] ? kernel_read+0x120/0x120 [ 355.887768] ? __lock_is_held+0xb6/0x140 [ 355.891843] ? check_preemption_disabled+0x3c/0x250 [ 355.896894] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 355.902370] ? rcu_read_lock_sched_held+0x110/0x130 [ 355.907396] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 355.912278] ? __sb_start_write+0x153/0x2f0 [ 355.916746] vfs_write+0x198/0x500 [ 355.920321] SyS_write+0xfd/0x230 [ 355.923788] ? SyS_read+0x230/0x230 [ 355.927860] ? do_syscall_64+0x53/0x640 [ 355.931849] ? SyS_read+0x230/0x230 [ 355.935483] do_syscall_64+0x1e8/0x640 [ 355.939386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.944256] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.949486] RIP: 0033:0x45b349 [ 355.952681] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 355.960405] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 355.967700] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 355.974996] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 355.982271] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 355.989554] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:16 executing program 4: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:16 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 356.012500] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 356.022173] SELinux: failed to load policy [ 356.048892] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 356.093270] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 356.112179] CPU: 0 PID: 13277 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 356.120120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.129494] Call Trace: [ 356.132097] dump_stack+0x142/0x197 [ 356.135748] warn_alloc.cold+0x96/0x1af [ 356.139869] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 356.144729] ? lock_downgrade+0x740/0x740 [ 356.148900] ? avc_has_perm+0x2df/0x4b0 [ 356.152909] __vmalloc_node_range+0x3c3/0x6a0 [ 356.157424] ? trace_hardirqs_on_caller+0x400/0x590 [ 356.162478] vmalloc+0x46/0x50 [ 356.165703] ? sel_write_load+0x1a0/0x1050 [ 356.169943] sel_write_load+0x1a0/0x1050 [ 356.174187] ? sel_read_bool+0x240/0x240 [ 356.178260] ? trace_hardirqs_on_caller+0x400/0x590 [ 356.183282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 356.188058] __vfs_write+0x105/0x6b0 [ 356.191779] ? sel_read_bool+0x240/0x240 [ 356.195844] ? kernel_read+0x120/0x120 [ 356.199735] ? __lock_is_held+0xb6/0x140 [ 356.203798] ? check_preemption_disabled+0x3c/0x250 [ 356.209038] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 356.214515] ? rcu_read_lock_sched_held+0x110/0x130 [ 356.219557] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 356.224334] ? __sb_start_write+0x153/0x2f0 [ 356.228667] vfs_write+0x198/0x500 [ 356.232303] SyS_write+0xfd/0x230 [ 356.235763] ? SyS_read+0x230/0x230 [ 356.239407] ? do_syscall_64+0x53/0x640 [ 356.243402] ? SyS_read+0x230/0x230 [ 356.247045] do_syscall_64+0x1e8/0x640 [ 356.250938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.255791] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.261108] RIP: 0033:0x45b349 [ 356.264405] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 356.272127] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 356.279417] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 356.286703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:25:17 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 356.294330] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 356.301612] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 356.310872] warn_alloc_show_mem: 2 callbacks suppressed [ 356.310875] Mem-Info: [ 356.318918] active_anon:216533 inactive_anon:197 isolated_anon:0 [ 356.318918] active_file:8225 inactive_file:12101 isolated_file:0 [ 356.318918] unevictable:0 dirty:356 writeback:0 unstable:0 [ 356.318918] slab_reclaimable:13061 slab_unreclaimable:116110 [ 356.318918] mapped:60552 shmem:250 pagetables:1462 bounce:0 [ 356.318918] free:1165279 free_pcp:224 free_cma:0 [ 356.376495] Node 0 active_anon:864232kB inactive_anon:788kB active_file:32760kB inactive_file:48404kB unevictable:0kB isolated(anon):1924kB isolated(file):0kB mapped:242208kB dirty:1420kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 276480kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 356.405345] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 356.433912] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 356.461146] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 356.466454] Node 0 DMA32 free:863968kB min:36380kB low:45472kB high:54564kB active_anon:862072kB inactive_anon:788kB active_file:32760kB inactive_file:48404kB unevictable:0kB writepending:1420kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7808kB pagetables:5552kB bounce:0kB free_pcp:1056kB local_pcp:692kB free_cma:0kB [ 356.497110] lowmem_reserve[]: 0 0 0 0 0 [ 356.501363] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 356.527983] lowmem_reserve[]: 0 0 0 0 0 [ 356.532132] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 356.559889] lowmem_reserve[]: 0 0 0 0 0 [ 356.564001] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 356.577867] Node 0 DMA32: 1940*4kB (UME) 832*8kB (UME) 506*16kB (UME) 450*32kB (UME) 484*64kB (ME) 34*128kB (UM) 5*256kB (UM) 5*512kB (U) 3*1024kB (ME) 0*2048kB 192*4096kB (M) = 865584kB [ 356.595732] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 356.606665] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 356.624570] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 356.633613] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 356.642263] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 356.651352] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 356.660101] 20581 total pagecache pages [ 356.664086] 0 pages in swap cache [ 356.667798] Swap cache stats: add 0, delete 0, find 0/0 [ 356.673274] Free swap = 0kB [ 356.676388] Total swap = 0kB [ 356.679416] 1965979 pages RAM [ 356.682740] 0 pages HighMem/MovableOnly [ 356.687114] 335869 pages reserved [ 356.690635] 0 pages cma reserved 03:25:17 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:17 executing program 4: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:17 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:17 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 356.694529] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 356.703580] SELinux: failed to load policy [ 356.720195] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 356.794989] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 356.818446] CPU: 0 PID: 13294 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 356.826375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.835750] Call Trace: [ 356.838372] dump_stack+0x142/0x197 [ 356.842020] warn_alloc.cold+0x96/0x1af [ 356.846119] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 356.850974] ? lock_downgrade+0x740/0x740 [ 356.855142] ? avc_has_perm+0x2df/0x4b0 [ 356.860436] __vmalloc_node_range+0x3c3/0x6a0 [ 356.864944] vmalloc+0x46/0x50 [ 356.868215] ? sel_write_load+0x1a0/0x1050 [ 356.872470] sel_write_load+0x1a0/0x1050 [ 356.876673] ? save_trace+0x290/0x290 [ 356.880592] ? sel_read_bool+0x240/0x240 [ 356.884695] ? mark_held_locks+0xb1/0x100 [ 356.888834] ? retint_kernel+0x2d/0x2d [ 356.892772] __vfs_write+0x105/0x6b0 [ 356.896484] ? sel_read_bool+0x240/0x240 [ 356.900552] ? kernel_read+0x120/0x120 [ 356.904466] ? __lock_is_held+0xb6/0x140 [ 356.908794] ? check_preemption_disabled+0x3c/0x250 [ 356.913824] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 356.919267] ? rcu_read_lock_sched_held+0x110/0x130 [ 356.924297] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 356.929067] ? __sb_start_write+0x153/0x2f0 [ 356.933545] vfs_write+0x198/0x500 [ 356.937082] SyS_write+0xfd/0x230 [ 356.940524] ? SyS_read+0x230/0x230 [ 356.944165] ? do_syscall_64+0x53/0x640 [ 356.948161] ? SyS_read+0x230/0x230 [ 356.951783] do_syscall_64+0x1e8/0x640 [ 356.955674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.960525] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.965711] RIP: 0033:0x45b349 [ 356.968989] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 356.976699] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 356.983964] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 03:25:17 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:17 executing program 4: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:17 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:17 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) [ 356.991353] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 356.998664] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 357.006034] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 357.020987] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 357.028097] SELinux: failed to load policy 03:25:17 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) [ 357.077883] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:17 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:17 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) [ 357.137213] SELinux: failed to load policy 03:25:17 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 357.171852] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:25:17 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 357.230716] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 357.263284] CPU: 1 PID: 13337 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 357.271239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.280609] Call Trace: [ 357.283215] dump_stack+0x142/0x197 [ 357.286860] warn_alloc.cold+0x96/0x1af [ 357.290847] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 357.295700] ? check_preemption_disabled+0x3c/0x250 [ 357.300728] ? retint_kernel+0x2d/0x2d [ 357.304634] ? __vmalloc_node_range+0x31/0x6a0 [ 357.309226] __vmalloc_node_range+0x3c3/0x6a0 [ 357.313786] ? finish_task_switch+0x178/0x650 [ 357.318286] ? finish_task_switch+0x14d/0x650 [ 357.322862] ? switch_mm_irqs_off+0x5e1/0xec0 [ 357.327376] vmalloc+0x46/0x50 [ 357.330581] ? sel_write_load+0x1a0/0x1050 [ 357.334823] sel_write_load+0x1a0/0x1050 [ 357.338891] ? save_trace+0x290/0x290 [ 357.342699] ? sel_read_bool+0x240/0x240 [ 357.346775] ? trace_hardirqs_on+0x10/0x10 [ 357.351019] ? debug_smp_processor_id+0x1c/0x20 [ 357.355702] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 357.360644] __vfs_write+0x105/0x6b0 [ 357.364362] ? sel_read_bool+0x240/0x240 [ 357.368431] ? kernel_read+0x120/0x120 [ 357.372330] ? __lock_is_held+0xb6/0x140 [ 357.376414] ? check_preemption_disabled+0x3c/0x250 [ 357.381446] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 357.386907] ? rcu_read_lock_sched_held+0x110/0x130 [ 357.391930] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 357.396713] ? __sb_start_write+0x153/0x2f0 [ 357.401063] vfs_write+0x198/0x500 [ 357.404611] SyS_write+0xfd/0x230 [ 357.408064] ? SyS_read+0x230/0x230 [ 357.411688] ? do_syscall_64+0x53/0x640 [ 357.416182] ? SyS_read+0x230/0x230 [ 357.419809] do_syscall_64+0x1e8/0x640 [ 357.423698] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:25:18 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 357.428551] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.433748] RIP: 0033:0x45b349 [ 357.436934] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 357.445861] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 357.453141] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 357.460417] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 357.467692] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 357.474964] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:18 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="73f13993f01ba595130912056c4ac4126c425a1bc481c0159a83f09bb5f27acbd95772b8e93deb75b5766f3bb50723b0aebeb3c02d150a2b018bd1a3e469e3ba2b19f4245ebc1d47d8c64c6602e1437c06d6dafbff", @ANYRES16=0x0, @ANYBLOB="000129bd7000ffdbdf251d00000008000300", @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20040041}, 0x4000000) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r8 = memfd_create(&(0x7f0000000380)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x80\x00\x00\x05\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\r\xed\x14\xd1c|=6\x11\xd9\xa7\xbe\xf7\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00', 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r10 = dup2(r9, r8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r10, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) write$FUSE_CREATE_OPEN(r10, &(0x7f0000000100)={0xa0, 0xffffffffffffffb4, 0x8, {{0x6, 0x3, 0x4, 0xf39, 0x0, 0x8, {0x1, 0x0, 0x9e13, 0x4, 0xfffffffffffffff7, 0x10000000cc, 0x9, 0xb4, 0x4, 0x34a3, 0x7, r12, 0xee00, 0x401, 0x8}}, {0x0, 0x1}}}, 0x5c) r13 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0xfff, 0x6, 0x4, 0x20000000, 0x2, {}, {0x2, 0xc, 0x0, 0xfd, 0x5, 0x3f, "cd7b03c1"}, 0x1ff, 0x3, @offset=0x1000, 0x4, 0x0, r13}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(r14, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r7, &(0x7f0000000040)="e0", 0xfffffe00) [ 357.496350] warn_alloc_show_mem: 1 callbacks suppressed [ 357.496376] Mem-Info: [ 357.514961] active_anon:216001 inactive_anon:198 isolated_anon:0 [ 357.514961] active_file:8225 inactive_file:12110 isolated_file:0 [ 357.514961] unevictable:0 dirty:365 writeback:0 unstable:0 [ 357.514961] slab_reclaimable:13061 slab_unreclaimable:115971 [ 357.514961] mapped:60575 shmem:250 pagetables:1468 bounce:0 03:25:18 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 357.514961] free:1165304 free_pcp:158 free_cma:0 [ 357.562221] Node 0 active_anon:868244kB inactive_anon:792kB active_file:32760kB inactive_file:48440kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242300kB dirty:1456kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 292864kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 357.605740] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 357.649766] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 357.677617] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 357.684977] Node 0 DMA32 free:860824kB min:36380kB low:45472kB high:54564kB active_anon:868304kB inactive_anon:792kB active_file:32760kB inactive_file:48440kB unevictable:0kB writepending:1456kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7936kB pagetables:5872kB bounce:0kB free_pcp:1004kB local_pcp:288kB free_cma:0kB [ 357.716170] lowmem_reserve[]: 0 0 0 0 0 [ 357.727723] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 357.755472] lowmem_reserve[]: 0 0 0 0 0 [ 357.761029] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 357.824127] lowmem_reserve[]: 0 0 0 0 0 [ 357.828854] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 357.851736] Node 0 DMA32: 1768*4kB (UME) 872*8kB (UME) 479*16kB (UME) 439*32kB (UME) 486*64kB (UME) 36*128kB (M) 2*256kB (M) 4*512kB (U) 3*1024kB (ME) 1*2048kB (M) 191*4096kB (M) = 861488kB [ 357.878718] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 357.892268] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 357.913652] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 357.923472] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 357.932980] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 357.949334] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 357.958516] 20584 total pagecache pages [ 357.964862] 0 pages in swap cache [ 357.968504] Swap cache stats: add 0, delete 0, find 0/0 [ 357.974335] Free swap = 0kB [ 357.977367] Total swap = 0kB 03:25:18 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:18 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:18 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x40000) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f0000000200)={0x20, 0x1, 0x5, 0xfffffffffffffff7, 0xfffffffffffffffd}) r4 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x40) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7a1, 0x80000) r6 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r8 = dup2(r7, r6) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r8, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$GIO_SCRNMAP(r8, 0x4b40, &(0x7f0000000340)=""/75) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f0000000080)=0x1) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 357.980547] 1965979 pages RAM [ 357.983718] 0 pages HighMem/MovableOnly [ 357.987687] 335869 pages reserved [ 357.991329] 0 pages cma reserved [ 357.995021] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 358.017618] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 358.033934] CPU: 0 PID: 13350 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 358.041885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.051261] Call Trace: [ 358.053888] dump_stack+0x142/0x197 [ 358.057535] warn_alloc.cold+0x96/0x1af [ 358.061526] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 358.066394] ? lock_downgrade+0x740/0x740 [ 358.070566] ? avc_has_perm+0x2df/0x4b0 [ 358.074561] __vmalloc_node_range+0x3c3/0x6a0 [ 358.079076] vmalloc+0x46/0x50 [ 358.082279] ? sel_write_load+0x1a0/0x1050 [ 358.086526] sel_write_load+0x1a0/0x1050 [ 358.090594] ? save_trace+0x290/0x290 [ 358.094401] ? sel_read_bool+0x240/0x240 [ 358.098480] ? mark_held_locks+0xb1/0x100 [ 358.102634] ? retint_kernel+0x2d/0x2d [ 358.106525] __vfs_write+0x105/0x6b0 [ 358.110240] ? sel_read_bool+0x240/0x240 [ 358.114331] ? kernel_read+0x120/0x120 [ 358.118227] ? __lock_is_held+0xb6/0x140 [ 358.122301] ? check_preemption_disabled+0x3c/0x250 [ 358.127324] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 358.132780] ? rcu_read_lock_sched_held+0x110/0x130 [ 358.137805] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 358.142605] ? __sb_start_write+0x153/0x2f0 [ 358.147049] vfs_write+0x198/0x500 [ 358.150601] SyS_write+0xfd/0x230 [ 358.154066] ? SyS_read+0x230/0x230 [ 358.157701] ? do_syscall_64+0x53/0x640 [ 358.161686] ? SyS_read+0x230/0x230 [ 358.165324] do_syscall_64+0x1e8/0x640 [ 358.169213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 358.174063] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 358.179255] RIP: 0033:0x45b349 03:25:18 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:18 executing program 0: r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0xffffffff80000001, "0d4033c000008fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r5}) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x4000, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, r10, 0x1, 0x0, 0x0, {0x3, 0x6c00000000000000}}, 0x14}}, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r13, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r14, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x24, &(0x7f0000000380)={@initdev, @multicast1, 0x0}, &(0x7f0000000400)=0xc) r16 = socket(0x11, 0x800000003, 0x0) bind(r16, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r16, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r17, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r18 = socket(0x11, 0x800000003, 0x0) bind(r18, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r19, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r20 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r21 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r22 = dup2(r21, r20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r22, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) accept$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) r24 = socket(0x11, 0x800000003, 0x0) bind(r24, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r24, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r25, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r26 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r27 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r28 = dup2(r27, r26) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r28, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r28, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) r30 = socket(0x11, 0x800000003, 0x0) bind(r30, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r30, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r31, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r32 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r33 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r34 = dup2(r33, r32) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r34, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r34, 0x0, 0x24, &(0x7f0000000740)={@empty, @dev, 0x0}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) r37 = socket(0x11, 0x800000003, 0x0) bind(r37, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r37, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r38, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000880)={'team0\x00', r38}) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r40, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r41, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000008c0)={'vcan0\x00'}) r42 = socket(0x11, 0x800000003, 0x0) bind(r42, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r42, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r43, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000009c0)}, 0x7}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000a00)=""/207, 0xcf}, {&(0x7f0000000b00)=""/2, 0x2}, {&(0x7f0000000b40)=""/127, 0x7f}, {&(0x7f0000000bc0)=""/100, 0x64}, {&(0x7f0000000c40)=""/122, 0x7a}, {&(0x7f0000000cc0)=""/103, 0x67}, {&(0x7f0000000d40)=""/80, 0x50}, {&(0x7f0000000dc0)=""/80, 0x50}, {&(0x7f0000000e40)=""/69, 0x45}, {&(0x7f0000000ec0)=""/33, 0x21}], 0xa, &(0x7f0000000fc0)=""/133, 0x85}, 0x9}, {{&(0x7f0000001080)=@caif=@dgm, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/64, 0x40}, {&(0x7f0000001140)=""/3, 0x3}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x3, &(0x7f00000011c0)=""/139, 0x8b}, 0x401}], 0x3, 0x40000022, &(0x7f00000023c0)) r46 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r47 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r48 = dup2(r47, r46) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r48, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$PNPIPE_IFINDEX(r48, 0x113, 0x2, &(0x7f0000003540)=0x0, &(0x7f0000003580)=0x4) r50 = socket(0x11, 0x800000003, 0x0) bind(r50, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r50, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r51, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r52 = socket(0x11, 0x800000003, 0x0) bind(r52, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r52, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r53, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) accept4$packet(r5, &(0x7f0000003680)={0x11, 0x0, 0x0}, &(0x7f00000036c0)=0x14, 0x80800) r55 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r56 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r57 = dup2(r56, r55) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r57, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r58 = socket(0x11, 0x800000003, 0x0) bind(r58, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r58, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r59, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r57, 0x8933, &(0x7f0000003840)={'team0\x00', r59}) r61 = socket(0x11, 0x800000003, 0x0) bind(r61, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r61, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r62, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r63 = socket(0x11, 0x800000003, 0x0) bind(r63, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r63, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r64, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000003940)={@mcast2, 0x0}, &(0x7f0000003980)=0x14) r66 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r67 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r68 = dup2(r67, r66) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r68, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r68, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000003ac0)=0xe8) r70 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r71 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r72 = dup2(r71, r70) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r72, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r72, 0x0, 0x20, &(0x7f0000003bc0)={@broadcast, @loopback, 0x0}, &(0x7f0000003c00)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f00000046c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000004680)={&(0x7f0000003c40)={0xa04, r10, 0x2, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x1ac, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5851}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x58b0}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r31}, {0x1dc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x4b}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r39}, {0xf8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r41}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x4, 0x1, 0x6, 0x2}, {0x0, 0x4, 0x3, 0x6e5}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8000}}}]}}, {{0x8, 0x1, r43}, {0x268, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xcd}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r44}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r45}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r49}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r51}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r54}}}]}}, {{0x8, 0x1, r60}, {0x1ac, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r62}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r64}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r65}}}]}}, {{0x8, 0x1, r69}, {0xe4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r73}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x42bb, 0x7f, 0x3, 0x4}, {0x100, 0x9, 0x4f, 0x4}, {0x5d, 0xe, 0xd9, 0x38}, {0x3, 0x20, 0x1, 0x8000}, {0x8, 0x3, 0x80, 0x1000}, {0xfc00, 0x3f, 0xf9, 0x7}, {0x6, 0x9, 0x0, 0x5}]}}}]}}]}, 0xa04}, 0x1, 0x0, 0x0, 0x8041}, 0x20000000) r74 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r75 = dup2(r74, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r75, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r75}) r77 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)=0x6) r78 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r79 = dup2(r78, r77) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r79, 0xc0105303, &(0x7f0000000100)={0x0, 0x2, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f00000000c0)={r76, 0x80000, r79}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) [ 358.182445] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 358.190156] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 358.197447] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 358.204730] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 358.212019] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 358.219568] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 358.269863] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 358.279695] SELinux: failed to load policy [ 358.295412] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 358.312170] SELinux: failed to load policy 03:25:19 executing program 3: r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0xffffffff80000001, "0d4033c000008fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r5}) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x4000, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, r10, 0x1, 0x0, 0x0, {0x3, 0x6c00000000000000}}, 0x14}}, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r13, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r14, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x24, &(0x7f0000000380)={@initdev, @multicast1, 0x0}, &(0x7f0000000400)=0xc) r16 = socket(0x11, 0x800000003, 0x0) bind(r16, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r16, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r17, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r18 = socket(0x11, 0x800000003, 0x0) bind(r18, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r19, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r20 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r21 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r22 = dup2(r21, r20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r22, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) accept$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) r24 = socket(0x11, 0x800000003, 0x0) bind(r24, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r24, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r25, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r26 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r27 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r28 = dup2(r27, r26) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r28, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r28, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) r30 = socket(0x11, 0x800000003, 0x0) bind(r30, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r30, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r31, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r32 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r33 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r34 = dup2(r33, r32) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r34, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r34, 0x0, 0x24, &(0x7f0000000740)={@empty, @dev, 0x0}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) r37 = socket(0x11, 0x800000003, 0x0) bind(r37, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r37, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r38, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000880)={'team0\x00', r38}) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r40, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r41, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000008c0)={'vcan0\x00'}) r42 = socket(0x11, 0x800000003, 0x0) bind(r42, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r42, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r43, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000009c0)}, 0x7}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000a00)=""/207, 0xcf}, {&(0x7f0000000b00)=""/2, 0x2}, {&(0x7f0000000b40)=""/127, 0x7f}, {&(0x7f0000000bc0)=""/100, 0x64}, {&(0x7f0000000c40)=""/122, 0x7a}, {&(0x7f0000000cc0)=""/103, 0x67}, {&(0x7f0000000d40)=""/80, 0x50}, {&(0x7f0000000dc0)=""/80, 0x50}, {&(0x7f0000000e40)=""/69, 0x45}, {&(0x7f0000000ec0)=""/33, 0x21}], 0xa, &(0x7f0000000fc0)=""/133, 0x85}, 0x9}, {{&(0x7f0000001080)=@caif=@dgm, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/64, 0x40}, {&(0x7f0000001140)=""/3, 0x3}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x3, &(0x7f00000011c0)=""/139, 0x8b}, 0x401}], 0x3, 0x40000022, &(0x7f00000023c0)) r46 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r47 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r48 = dup2(r47, r46) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r48, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$PNPIPE_IFINDEX(r48, 0x113, 0x2, &(0x7f0000003540)=0x0, &(0x7f0000003580)=0x4) r50 = socket(0x11, 0x800000003, 0x0) bind(r50, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r50, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r51, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r52 = socket(0x11, 0x800000003, 0x0) bind(r52, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r52, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r53, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) accept4$packet(r5, &(0x7f0000003680)={0x11, 0x0, 0x0}, &(0x7f00000036c0)=0x14, 0x80800) r55 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r56 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r57 = dup2(r56, r55) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r57, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r58 = socket(0x11, 0x800000003, 0x0) bind(r58, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r58, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r59, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r57, 0x8933, &(0x7f0000003840)={'team0\x00', r59}) r61 = socket(0x11, 0x800000003, 0x0) bind(r61, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r61, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r62, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r63 = socket(0x11, 0x800000003, 0x0) bind(r63, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r63, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r64, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000003940)={@mcast2, 0x0}, &(0x7f0000003980)=0x14) r66 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r67 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r68 = dup2(r67, r66) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r68, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r68, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000003ac0)=0xe8) r70 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r71 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r72 = dup2(r71, r70) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r72, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r72, 0x0, 0x20, &(0x7f0000003bc0)={@broadcast, @loopback, 0x0}, &(0x7f0000003c00)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f00000046c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000004680)={&(0x7f0000003c40)={0xa04, r10, 0x2, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x1ac, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5851}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x58b0}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r31}, {0x1dc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x4b}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r39}, {0xf8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r41}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x4, 0x1, 0x6, 0x2}, {0x0, 0x4, 0x3, 0x6e5}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8000}}}]}}, {{0x8, 0x1, r43}, {0x268, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xcd}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r44}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r45}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r49}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r51}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r54}}}]}}, {{0x8, 0x1, r60}, {0x1ac, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r62}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r64}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r65}}}]}}, {{0x8, 0x1, r69}, {0xe4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r73}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x42bb, 0x7f, 0x3, 0x4}, {0x100, 0x9, 0x4f, 0x4}, {0x5d, 0xe, 0xd9, 0x38}, {0x3, 0x20, 0x1, 0x8000}, {0x8, 0x3, 0x80, 0x1000}, {0xfc00, 0x3f, 0xf9, 0x7}, {0x6, 0x9, 0x0, 0x5}]}}}]}}]}, 0xa04}, 0x1, 0x0, 0x0, 0x8041}, 0x20000000) r74 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r75 = dup2(r74, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r75, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r75}) r77 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)=0x6) r78 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r79 = dup2(r78, r77) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r79, 0xc0105303, &(0x7f0000000100)={0x0, 0x2, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f00000000c0)={r76, 0x80000, r79}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:19 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 358.327211] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:25:19 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 358.404009] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 358.434767] CPU: 1 PID: 13374 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 358.442711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.452185] Call Trace: [ 358.454792] dump_stack+0x142/0x197 [ 358.458446] warn_alloc.cold+0x96/0x1af [ 358.462437] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 358.467297] ? lock_downgrade+0x740/0x740 [ 358.471467] ? avc_has_perm+0x2df/0x4b0 [ 358.475459] __vmalloc_node_range+0x3c3/0x6a0 [ 358.479972] vmalloc+0x46/0x50 [ 358.483186] ? sel_write_load+0x1a0/0x1050 [ 358.487447] sel_write_load+0x1a0/0x1050 [ 358.491520] ? retint_kernel+0x2d/0x2d [ 358.495525] ? sel_read_bool+0x240/0x240 [ 358.499598] ? mark_held_locks+0xb1/0x100 [ 358.503765] ? retint_kernel+0x2d/0x2d [ 358.507665] __vfs_write+0x105/0x6b0 [ 358.511410] ? sel_read_bool+0x240/0x240 [ 358.515485] ? kernel_read+0x120/0x120 [ 358.519397] ? retint_kernel+0x2d/0x2d [ 358.523307] ? __sb_start_write+0x21a/0x2f0 [ 358.527638] ? __sb_start_write+0x153/0x2f0 [ 358.531972] vfs_write+0x198/0x500 [ 358.535644] SyS_write+0xfd/0x230 [ 358.539106] ? SyS_read+0x230/0x230 [ 358.542737] ? do_syscall_64+0x53/0x640 [ 358.546766] ? SyS_read+0x230/0x230 [ 358.550405] do_syscall_64+0x1e8/0x640 [ 358.554298] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 358.559155] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 358.564349] RIP: 0033:0x45b349 [ 358.567542] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 358.575259] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 358.582538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 358.589819] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 358.597102] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 03:25:19 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 358.604382] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 358.626570] warn_alloc_show_mem: 1 callbacks suppressed [ 358.626587] Mem-Info: [ 358.645355] active_anon:216563 inactive_anon:199 isolated_anon:0 [ 358.645355] active_file:8225 inactive_file:12116 isolated_file:0 [ 358.645355] unevictable:0 dirty:480 writeback:0 unstable:0 [ 358.645355] slab_reclaimable:13062 slab_unreclaimable:115918 [ 358.645355] mapped:60589 shmem:250 pagetables:1445 bounce:0 [ 358.645355] free:1165449 free_pcp:134 free_cma:0 [ 358.704160] Node 0 active_anon:868308kB inactive_anon:796kB active_file:32760kB inactive_file:48564kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242456kB dirty:2016kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 292864kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 358.733254] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 358.763363] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 358.791016] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 358.796828] Node 0 DMA32 free:859256kB min:36380kB low:45472kB high:54564kB active_anon:868300kB inactive_anon:788kB active_file:32760kB inactive_file:48576kB unevictable:0kB writepending:1996kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7968kB pagetables:5912kB bounce:0kB free_pcp:720kB local_pcp:404kB free_cma:0kB [ 358.828093] lowmem_reserve[]: 0 0 0 0 0 03:25:19 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 358.833278] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 358.866615] lowmem_reserve[]: 0 0 0 0 0 [ 358.872042] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 03:25:19 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 358.909502] lowmem_reserve[]: 0 0 0 0 0 [ 358.926682] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 358.955132] Node 0 DMA32: 1706*4kB (UME) 1015*8kB (UME) 487*16kB (UME) 465*32kB (UME) 488*64kB (UME) 37*128kB (UM) 2*256kB (M) 3*512kB (U) 3*1024kB (ME) 0*2048kB 191*4096kB (M) = 861040kB 03:25:19 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 359.012279] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 359.029684] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 359.076838] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 359.088359] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 359.110262] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 359.119289] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 359.128520] 20631 total pagecache pages [ 359.132596] 0 pages in swap cache [ 359.136313] Swap cache stats: add 0, delete 0, find 0/0 [ 359.141813] Free swap = 0kB [ 359.145145] Total swap = 0kB [ 359.148181] 1965979 pages RAM [ 359.151415] 0 pages HighMem/MovableOnly [ 359.155616] 335869 pages reserved [ 359.164523] 0 pages cma reserved 03:25:19 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:19 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 359.168054] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 359.200179] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 359.218668] CPU: 0 PID: 13384 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 359.226610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.235982] Call Trace: [ 359.238583] dump_stack+0x142/0x197 [ 359.242217] warn_alloc.cold+0x96/0x1af [ 359.246221] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 359.251059] ? lock_downgrade+0x740/0x740 [ 359.255219] ? avc_has_perm+0x2df/0x4b0 [ 359.259195] __vmalloc_node_range+0x3c3/0x6a0 [ 359.263714] ? retint_kernel+0x2d/0x2d [ 359.267628] vmalloc+0x46/0x50 [ 359.270814] ? sel_write_load+0x1a0/0x1050 [ 359.275112] sel_write_load+0x1a0/0x1050 [ 359.279198] ? save_trace+0x290/0x290 [ 359.283004] ? sel_read_bool+0x240/0x240 [ 359.287074] ? trace_hardirqs_on_caller+0x400/0x590 [ 359.292107] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.296872] __vfs_write+0x105/0x6b0 [ 359.302796] ? sel_read_bool+0x240/0x240 [ 359.306880] ? kernel_read+0x120/0x120 [ 359.310769] ? __lock_is_held+0xb6/0x140 [ 359.314836] ? check_preemption_disabled+0x3c/0x250 [ 359.319869] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 359.325334] ? rcu_read_lock_sched_held+0x110/0x130 [ 359.330348] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 359.335096] ? __sb_start_write+0x153/0x2f0 [ 359.339425] vfs_write+0x198/0x500 [ 359.342980] SyS_write+0xfd/0x230 [ 359.346449] ? SyS_read+0x230/0x230 [ 359.350076] ? do_syscall_64+0x53/0x640 [ 359.354048] ? SyS_read+0x230/0x230 [ 359.357691] do_syscall_64+0x1e8/0x640 [ 359.361586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.366453] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.371643] RIP: 0033:0x45b349 [ 359.374834] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 359.382550] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 359.389832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 03:25:20 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 359.397113] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 359.404397] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 359.411671] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 359.423717] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 359.436304] SELinux: failed to load policy 03:25:20 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 359.494887] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 359.523254] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 359.536155] CPU: 0 PID: 13406 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 359.544088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.553545] Call Trace: [ 359.556154] dump_stack+0x142/0x197 [ 359.559778] warn_alloc.cold+0x96/0x1af [ 359.563743] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 359.568595] __vmalloc_node_range+0x3c3/0x6a0 [ 359.573101] ? retint_kernel+0x2d/0x2d [ 359.576988] vmalloc+0x46/0x50 [ 359.580390] ? sel_write_load+0x1a0/0x1050 [ 359.584623] sel_write_load+0x1a0/0x1050 [ 359.589942] ? mark_held_locks+0xb1/0x100 [ 359.594090] ? save_trace+0x290/0x290 [ 359.597891] ? sel_read_bool+0x240/0x240 [ 359.601952] ? trace_hardirqs_on_caller+0x400/0x590 [ 359.607016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.611829] __vfs_write+0x105/0x6b0 [ 359.615532] ? sel_read_bool+0x240/0x240 [ 359.619575] ? kernel_read+0x120/0x120 [ 359.625155] ? lock_is_held_type+0x17e/0x210 [ 359.629567] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 359.635014] ? rcu_read_lock_sched_held+0x110/0x130 [ 359.640058] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 359.644902] ? __sb_start_write+0x153/0x2f0 [ 359.649210] vfs_write+0x198/0x500 [ 359.652740] SyS_write+0xfd/0x230 [ 359.656179] ? SyS_read+0x230/0x230 [ 359.659791] ? do_syscall_64+0x53/0x640 [ 359.663756] ? SyS_read+0x230/0x230 [ 359.667368] do_syscall_64+0x1e8/0x640 [ 359.671289] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.676199] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.681420] RIP: 0033:0x45b349 [ 359.684598] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 359.692293] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 359.699634] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 359.706896] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 359.714166] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 359.721425] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 359.731706] warn_alloc_show_mem: 1 callbacks suppressed [ 359.732300] Mem-Info: [ 359.742661] active_anon:214923 inactive_anon:200 isolated_anon:0 [ 359.742661] active_file:8250 inactive_file:12132 isolated_file:0 [ 359.742661] unevictable:0 dirty:516 writeback:0 unstable:0 [ 359.742661] slab_reclaimable:13035 slab_unreclaimable:116304 [ 359.742661] mapped:60569 shmem:250 pagetables:1343 bounce:0 [ 359.742661] free:1166746 free_pcp:318 free_cma:0 [ 359.777718] Node 0 active_anon:859692kB inactive_anon:800kB active_file:32860kB inactive_file:48540kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242276kB dirty:2072kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 296960kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 359.807274] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 359.833810] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 359.861361] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 359.866627] Node 0 DMA32 free:868188kB min:36380kB low:45472kB high:54564kB active_anon:859692kB inactive_anon:800kB active_file:32860kB inactive_file:48540kB unevictable:0kB writepending:2076kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7680kB pagetables:5372kB bounce:0kB free_pcp:1276kB local_pcp:724kB free_cma:0kB 03:25:20 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:20 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:20 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:20 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 359.897136] lowmem_reserve[]: 0 0 0 0 0 [ 359.901791] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 359.929595] lowmem_reserve[]: 0 0 0 0 0 [ 359.937021] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 03:25:20 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 360.004723] lowmem_reserve[]: 0 0 0 0 0 [ 360.012375] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB 03:25:20 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:20 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 360.066636] Node 0 DMA32: 1763*4kB (UME) 992*8kB (UME) 540*16kB (UME) 472*32kB (UME) 486*64kB (ME) 36*128kB (M) 3*256kB (UM) 1*512kB (U) 3*1024kB (ME) 2*2048kB (M) 191*4096kB (M) = 865228kB [ 360.099264] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 360.155472] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 360.181177] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 03:25:20 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 360.205713] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 360.236246] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 360.257293] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 360.300270] 20640 total pagecache pages [ 360.308852] 0 pages in swap cache [ 360.320354] Swap cache stats: add 0, delete 0, find 0/0 [ 360.325906] Free swap = 0kB [ 360.329032] Total swap = 0kB [ 360.332589] 1965979 pages RAM [ 360.335803] 0 pages HighMem/MovableOnly [ 360.339869] 335869 pages reserved [ 360.343847] 0 pages cma reserved [ 360.347429] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 360.368040] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 360.381030] CPU: 1 PID: 13412 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 360.388996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.398653] Call Trace: [ 360.401253] dump_stack+0x142/0x197 [ 360.404892] warn_alloc.cold+0x96/0x1af [ 360.408896] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 360.413765] ? lock_downgrade+0x740/0x740 [ 360.417936] ? avc_has_perm+0x2df/0x4b0 [ 360.421934] __vmalloc_node_range+0x3c3/0x6a0 [ 360.426460] vmalloc+0x46/0x50 [ 360.429686] ? sel_write_load+0x1a0/0x1050 [ 360.433940] sel_write_load+0x1a0/0x1050 [ 360.438042] ? save_trace+0x290/0x290 [ 360.441873] ? sel_read_bool+0x240/0x240 [ 360.445947] ? trace_hardirqs_on+0x10/0x10 [ 360.450191] ? debug_smp_processor_id+0x1c/0x20 [ 360.455015] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 360.459959] __vfs_write+0x105/0x6b0 [ 360.463807] ? sel_read_bool+0x240/0x240 [ 360.467881] ? kernel_read+0x120/0x120 [ 360.471792] ? __lock_is_held+0xb6/0x140 [ 360.475860] ? check_preemption_disabled+0x3c/0x250 [ 360.481114] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 360.486583] ? rcu_read_lock_sched_held+0x110/0x130 [ 360.491620] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 360.496401] ? __sb_start_write+0x153/0x2f0 [ 360.500765] vfs_write+0x198/0x500 [ 360.504327] SyS_write+0xfd/0x230 [ 360.507818] ? SyS_read+0x230/0x230 [ 360.511474] ? do_syscall_64+0x53/0x640 [ 360.515597] ? SyS_read+0x230/0x230 [ 360.519238] do_syscall_64+0x1e8/0x640 [ 360.523135] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.527995] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.533194] RIP: 0033:0x45b349 [ 360.536389] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 360.544114] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 03:25:21 executing program 5: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:21 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:21 executing program 3: r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0xffffffff80000001, "0d4033c000008fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r5}) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x4000, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, r10, 0x1, 0x0, 0x0, {0x3, 0x6c00000000000000}}, 0x14}}, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r13, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r14, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x24, &(0x7f0000000380)={@initdev, @multicast1, 0x0}, &(0x7f0000000400)=0xc) r16 = socket(0x11, 0x800000003, 0x0) bind(r16, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r16, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r17, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r18 = socket(0x11, 0x800000003, 0x0) bind(r18, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r19, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r20 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r21 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r22 = dup2(r21, r20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r22, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) accept$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) r24 = socket(0x11, 0x800000003, 0x0) bind(r24, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r24, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r25, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r26 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r27 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r28 = dup2(r27, r26) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r28, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r28, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) r30 = socket(0x11, 0x800000003, 0x0) bind(r30, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r30, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r31, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r32 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r33 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r34 = dup2(r33, r32) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r34, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r34, 0x0, 0x24, &(0x7f0000000740)={@empty, @dev, 0x0}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) r37 = socket(0x11, 0x800000003, 0x0) bind(r37, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r37, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r38, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000880)={'team0\x00', r38}) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r40, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r41, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000008c0)={'vcan0\x00'}) r42 = socket(0x11, 0x800000003, 0x0) bind(r42, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r42, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r43, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000009c0)}, 0x7}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000a00)=""/207, 0xcf}, {&(0x7f0000000b00)=""/2, 0x2}, {&(0x7f0000000b40)=""/127, 0x7f}, {&(0x7f0000000bc0)=""/100, 0x64}, {&(0x7f0000000c40)=""/122, 0x7a}, {&(0x7f0000000cc0)=""/103, 0x67}, {&(0x7f0000000d40)=""/80, 0x50}, {&(0x7f0000000dc0)=""/80, 0x50}, {&(0x7f0000000e40)=""/69, 0x45}, {&(0x7f0000000ec0)=""/33, 0x21}], 0xa, &(0x7f0000000fc0)=""/133, 0x85}, 0x9}, {{&(0x7f0000001080)=@caif=@dgm, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/64, 0x40}, {&(0x7f0000001140)=""/3, 0x3}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x3, &(0x7f00000011c0)=""/139, 0x8b}, 0x401}], 0x3, 0x40000022, &(0x7f00000023c0)) r46 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r47 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r48 = dup2(r47, r46) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r48, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$PNPIPE_IFINDEX(r48, 0x113, 0x2, &(0x7f0000003540)=0x0, &(0x7f0000003580)=0x4) r50 = socket(0x11, 0x800000003, 0x0) bind(r50, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r50, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r51, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r52 = socket(0x11, 0x800000003, 0x0) bind(r52, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r52, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r53, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) accept4$packet(r5, &(0x7f0000003680)={0x11, 0x0, 0x0}, &(0x7f00000036c0)=0x14, 0x80800) r55 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r56 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r57 = dup2(r56, r55) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r57, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r58 = socket(0x11, 0x800000003, 0x0) bind(r58, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r58, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r59, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r57, 0x8933, &(0x7f0000003840)={'team0\x00', r59}) r61 = socket(0x11, 0x800000003, 0x0) bind(r61, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r61, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r62, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r63 = socket(0x11, 0x800000003, 0x0) bind(r63, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r63, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r64, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000003940)={@mcast2, 0x0}, &(0x7f0000003980)=0x14) r66 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r67 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r68 = dup2(r67, r66) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r68, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r68, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000003ac0)=0xe8) r70 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r71 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r72 = dup2(r71, r70) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r72, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r72, 0x0, 0x20, &(0x7f0000003bc0)={@broadcast, @loopback, 0x0}, &(0x7f0000003c00)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f00000046c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000004680)={&(0x7f0000003c40)={0xa04, r10, 0x2, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x1ac, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5851}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x58b0}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r31}, {0x1dc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x4b}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r39}, {0xf8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r41}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x4, 0x1, 0x6, 0x2}, {0x0, 0x4, 0x3, 0x6e5}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8000}}}]}}, {{0x8, 0x1, r43}, {0x268, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xcd}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r44}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r45}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r49}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r51}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r54}}}]}}, {{0x8, 0x1, r60}, {0x1ac, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r62}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r64}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r65}}}]}}, {{0x8, 0x1, r69}, {0xe4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r73}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x42bb, 0x7f, 0x3, 0x4}, {0x100, 0x9, 0x4f, 0x4}, {0x5d, 0xe, 0xd9, 0x38}, {0x3, 0x20, 0x1, 0x8000}, {0x8, 0x3, 0x80, 0x1000}, {0xfc00, 0x3f, 0xf9, 0x7}, {0x6, 0x9, 0x0, 0x5}]}}}]}}]}, 0xa04}, 0x1, 0x0, 0x0, 0x8041}, 0x20000000) r74 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r75 = dup2(r74, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r75, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r75}) r77 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)=0x6) r78 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r79 = dup2(r78, r77) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r79, 0xc0105303, &(0x7f0000000100)={0x0, 0x2, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f00000000c0)={r76, 0x80000, r79}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) [ 360.551394] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 360.558675] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 360.565952] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 360.573348] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 360.588721] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:25:21 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 360.612028] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 360.618268] CPU: 1 PID: 13424 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 360.626205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.635570] Call Trace: [ 360.638302] dump_stack+0x142/0x197 [ 360.641955] warn_alloc.cold+0x96/0x1af [ 360.645955] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 360.651516] ? mark_held_locks+0xb1/0x100 [ 360.655687] ? retint_kernel+0x2d/0x2d [ 360.659625] ? trace_hardirqs_on_caller+0x400/0x590 [ 360.664661] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.669683] __vmalloc_node_range+0x3c3/0x6a0 [ 360.674206] vmalloc+0x46/0x50 [ 360.677422] ? sel_write_load+0x1a0/0x1050 [ 360.681672] sel_write_load+0x1a0/0x1050 [ 360.685751] ? save_trace+0x290/0x290 [ 360.689671] ? mark_held_locks+0xb1/0x100 [ 360.693855] ? sel_read_bool+0x240/0x240 [ 360.698016] ? retint_kernel+0x2d/0x2d [ 360.702009] ? trace_hardirqs_on_caller+0x400/0x590 [ 360.707050] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.711935] __vfs_write+0x105/0x6b0 [ 360.715674] ? retint_kernel+0x2d/0x2d [ 360.719574] ? sel_read_bool+0x240/0x240 [ 360.723661] ? kernel_read+0x120/0x120 [ 360.728353] ? __lock_is_held+0xb6/0x140 [ 360.732434] ? check_preemption_disabled+0x3c/0x250 [ 360.737565] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 360.743037] ? rcu_read_lock_sched_held+0x110/0x130 [ 360.748072] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 360.752842] ? __sb_start_write+0x153/0x2f0 [ 360.757277] vfs_write+0x198/0x500 [ 360.760833] SyS_write+0xfd/0x230 [ 360.764296] ? SyS_read+0x230/0x230 [ 360.767941] ? do_syscall_64+0x53/0x640 [ 360.771934] ? SyS_read+0x230/0x230 [ 360.775588] do_syscall_64+0x1e8/0x640 [ 360.779514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.784378] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.789580] RIP: 0033:0x45b349 [ 360.792775] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 360.800500] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 360.807872] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 360.815381] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 360.822671] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 360.829957] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 360.858945] warn_alloc_show_mem: 1 callbacks suppressed [ 360.858949] Mem-Info: [ 360.866995] active_anon:216564 inactive_anon:199 isolated_anon:0 [ 360.866995] active_file:8270 inactive_file:12121 isolated_file:0 [ 360.866995] unevictable:0 dirty:525 writeback:0 unstable:0 [ 360.866995] slab_reclaimable:13036 slab_unreclaimable:116311 [ 360.866995] mapped:60580 shmem:250 pagetables:1427 bounce:0 [ 360.866995] free:1165039 free_pcp:181 free_cma:0 [ 360.902496] Node 0 active_anon:866356kB inactive_anon:796kB active_file:32940kB inactive_file:48484kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242420kB dirty:2096kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 296960kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 360.933159] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 360.959098] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 360.986084] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 360.991219] Node 0 DMA32 free:861652kB min:36380kB low:45472kB high:54564kB active_anon:866264kB inactive_anon:788kB active_file:32940kB inactive_file:48484kB unevictable:0kB writepending:2112kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7744kB pagetables:5736kB bounce:0kB free_pcp:1328kB local_pcp:720kB free_cma:0kB [ 361.021359] lowmem_reserve[]: 0 0 0 0 0 [ 361.025377] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 361.051360] lowmem_reserve[]: 0 0 0 0 0 [ 361.055383] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 361.083068] lowmem_reserve[]: 0 0 0 0 0 [ 361.087072] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 361.100803] Node 0 DMA32: 1701*4kB (UME) 823*8kB (UME) 500*16kB (UME) 503*32kB (UME) 486*64kB (ME) 36*128kB (M) 2*256kB (M) 1*512kB (U) 3*1024kB (ME) 1*2048kB (M) 191*4096kB (M) = 861676kB [ 361.118040] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 361.129008] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 361.146579] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 361.155497] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 361.164181] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 361.173101] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 361.181760] 20650 total pagecache pages [ 361.185745] 0 pages in swap cache [ 361.189192] Swap cache stats: add 0, delete 0, find 0/0 [ 361.194619] Free swap = 0kB [ 361.197644] Total swap = 0kB [ 361.200762] 1965979 pages RAM [ 361.203863] 0 pages HighMem/MovableOnly 03:25:21 executing program 0: r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0xffffffff80000001, "0d4033c000008fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r5}) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x4000, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, r10, 0x1, 0x0, 0x0, {0x3, 0x6c00000000000000}}, 0x14}}, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r13, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r14, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x24, &(0x7f0000000380)={@initdev, @multicast1, 0x0}, &(0x7f0000000400)=0xc) r16 = socket(0x11, 0x800000003, 0x0) bind(r16, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r16, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r17, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r18 = socket(0x11, 0x800000003, 0x0) bind(r18, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r19, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r20 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r21 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r22 = dup2(r21, r20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r22, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) accept$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) r24 = socket(0x11, 0x800000003, 0x0) bind(r24, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r24, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r25, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r26 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r27 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r28 = dup2(r27, r26) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r28, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r28, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) r30 = socket(0x11, 0x800000003, 0x0) bind(r30, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r30, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r31, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r32 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r33 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r34 = dup2(r33, r32) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r34, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r34, 0x0, 0x24, &(0x7f0000000740)={@empty, @dev, 0x0}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) r37 = socket(0x11, 0x800000003, 0x0) bind(r37, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r37, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r38, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000880)={'team0\x00', r38}) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r40, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r41, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000008c0)={'vcan0\x00'}) r42 = socket(0x11, 0x800000003, 0x0) bind(r42, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r42, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r43, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000009c0)}, 0x7}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000a00)=""/207, 0xcf}, {&(0x7f0000000b00)=""/2, 0x2}, {&(0x7f0000000b40)=""/127, 0x7f}, {&(0x7f0000000bc0)=""/100, 0x64}, {&(0x7f0000000c40)=""/122, 0x7a}, {&(0x7f0000000cc0)=""/103, 0x67}, {&(0x7f0000000d40)=""/80, 0x50}, {&(0x7f0000000dc0)=""/80, 0x50}, {&(0x7f0000000e40)=""/69, 0x45}, {&(0x7f0000000ec0)=""/33, 0x21}], 0xa, &(0x7f0000000fc0)=""/133, 0x85}, 0x9}, {{&(0x7f0000001080)=@caif=@dgm, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/64, 0x40}, {&(0x7f0000001140)=""/3, 0x3}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x3, &(0x7f00000011c0)=""/139, 0x8b}, 0x401}], 0x3, 0x40000022, &(0x7f00000023c0)) r46 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r47 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r48 = dup2(r47, r46) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r48, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$PNPIPE_IFINDEX(r48, 0x113, 0x2, &(0x7f0000003540)=0x0, &(0x7f0000003580)=0x4) r50 = socket(0x11, 0x800000003, 0x0) bind(r50, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r50, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r51, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r52 = socket(0x11, 0x800000003, 0x0) bind(r52, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r52, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r53, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) accept4$packet(r5, &(0x7f0000003680)={0x11, 0x0, 0x0}, &(0x7f00000036c0)=0x14, 0x80800) r55 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r56 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r57 = dup2(r56, r55) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r57, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r58 = socket(0x11, 0x800000003, 0x0) bind(r58, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r58, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r59, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r57, 0x8933, &(0x7f0000003840)={'team0\x00', r59}) r61 = socket(0x11, 0x800000003, 0x0) bind(r61, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r61, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r62, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) r63 = socket(0x11, 0x800000003, 0x0) bind(r63, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r63, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r64, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200"], 0x3}}, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000003940)={@mcast2, 0x0}, &(0x7f0000003980)=0x14) r66 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r67 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r68 = dup2(r67, r66) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r68, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_IP_IPSEC_POLICY(r68, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000003ac0)=0xe8) r70 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r71 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r72 = dup2(r71, r70) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r72, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) getsockopt$inet_mreqn(r72, 0x0, 0x20, &(0x7f0000003bc0)={@broadcast, @loopback, 0x0}, &(0x7f0000003c00)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f00000046c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000004680)={&(0x7f0000003c40)={0xa04, r10, 0x2, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x1ac, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5851}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x58b0}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r31}, {0x1dc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x4b}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r39}, {0xf8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r41}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x4, 0x1, 0x6, 0x2}, {0x0, 0x4, 0x3, 0x6e5}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8000}}}]}}, {{0x8, 0x1, r43}, {0x268, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xcd}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r44}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r45}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r49}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r51}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r54}}}]}}, {{0x8, 0x1, r60}, {0x1ac, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r62}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r64}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r65}}}]}}, {{0x8, 0x1, r69}, {0xe4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r73}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x42bb, 0x7f, 0x3, 0x4}, {0x100, 0x9, 0x4f, 0x4}, {0x5d, 0xe, 0xd9, 0x38}, {0x3, 0x20, 0x1, 0x8000}, {0x8, 0x3, 0x80, 0x1000}, {0xfc00, 0x3f, 0xf9, 0x7}, {0x6, 0x9, 0x0, 0x5}]}}}]}}]}, 0xa04}, 0x1, 0x0, 0x0, 0x8041}, 0x20000000) r74 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r75 = dup2(r74, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r75, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r75}) r77 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)=0x6) r78 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r79 = dup2(r78, r77) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r79, 0xc0105303, &(0x7f0000000100)={0x0, 0x2, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f00000000c0)={r76, 0x80000, r79}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:21 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 361.207835] 335869 pages reserved [ 361.211351] 0 pages cma reserved [ 361.215420] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 361.238033] SELinux: failed to load policy 03:25:21 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 361.253018] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 361.280230] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 361.329761] CPU: 1 PID: 13449 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 361.337700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.347071] Call Trace: [ 361.349798] dump_stack+0x142/0x197 [ 361.353452] warn_alloc.cold+0x96/0x1af [ 361.357450] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 361.362304] ? lock_downgrade+0x740/0x740 [ 361.366474] ? avc_has_perm+0x2df/0x4b0 [ 361.370467] __vmalloc_node_range+0x3c3/0x6a0 [ 361.374984] vmalloc+0x46/0x50 [ 361.378289] ? sel_write_load+0x1a0/0x1050 [ 361.382710] sel_write_load+0x1a0/0x1050 [ 361.386783] ? save_trace+0x290/0x290 [ 361.390605] ? sel_read_bool+0x240/0x240 [ 361.394693] ? trace_hardirqs_on+0x10/0x10 [ 361.398953] ? debug_smp_processor_id+0x1c/0x20 [ 361.403640] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 361.408586] __vfs_write+0x105/0x6b0 [ 361.412314] ? sel_read_bool+0x240/0x240 [ 361.416385] ? kernel_read+0x120/0x120 [ 361.420289] ? __lock_is_held+0xb6/0x140 [ 361.424362] ? check_preemption_disabled+0x3c/0x250 [ 361.429742] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 361.435207] ? rcu_read_lock_sched_held+0x110/0x130 [ 361.440238] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 361.445022] ? __sb_start_write+0x153/0x2f0 [ 361.449360] vfs_write+0x198/0x500 [ 361.452916] SyS_write+0xfd/0x230 [ 361.456386] ? SyS_read+0x230/0x230 [ 361.460028] ? do_syscall_64+0x53/0x640 [ 361.464012] ? SyS_read+0x230/0x230 [ 361.467658] do_syscall_64+0x1e8/0x640 [ 361.471555] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.476436] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.481636] RIP: 0033:0x45b349 [ 361.484843] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.492564] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 361.499856] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 361.507341] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 361.514616] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 361.521903] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:22 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 361.532933] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 361.550413] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 361.562210] CPU: 1 PID: 13453 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 361.570139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.579504] Call Trace: 03:25:22 executing program 5: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 361.582109] dump_stack+0x142/0x197 [ 361.585755] warn_alloc.cold+0x96/0x1af [ 361.589746] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 361.594607] ? lock_downgrade+0x740/0x740 [ 361.598780] ? avc_has_perm+0x2df/0x4b0 [ 361.602779] __vmalloc_node_range+0x3c3/0x6a0 [ 361.607405] vmalloc+0x46/0x50 [ 361.610785] ? sel_write_load+0x1a0/0x1050 [ 361.615029] sel_write_load+0x1a0/0x1050 [ 361.619110] ? save_trace+0x290/0x290 [ 361.622928] ? sel_read_bool+0x240/0x240 [ 361.627002] ? trace_hardirqs_on+0x10/0x10 [ 361.631254] ? debug_smp_processor_id+0x1c/0x20 [ 361.635988] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 361.640941] __vfs_write+0x105/0x6b0 [ 361.644676] ? sel_read_bool+0x240/0x240 [ 361.648752] ? kernel_read+0x120/0x120 [ 361.652654] ? __lock_is_held+0xb6/0x140 [ 361.656736] ? check_preemption_disabled+0x3c/0x250 [ 361.661779] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 361.667383] ? rcu_read_lock_sched_held+0x110/0x130 [ 361.672419] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 361.677360] ? __sb_start_write+0x153/0x2f0 03:25:22 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 361.681703] vfs_write+0x198/0x500 [ 361.685278] SyS_write+0xfd/0x230 [ 361.688743] ? SyS_read+0x230/0x230 [ 361.692379] ? do_syscall_64+0x53/0x640 [ 361.696361] ? SyS_read+0x230/0x230 [ 361.700230] do_syscall_64+0x1e8/0x640 [ 361.704132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.708996] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.714324] RIP: 0033:0x45b349 [ 361.717519] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.725241] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 361.732694] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 361.739973] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 361.747255] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 361.754540] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c 03:25:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 361.788481] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 361.824627] SELinux: failed to load policy 03:25:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 361.849812] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:25:22 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 361.898148] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 361.915132] CPU: 1 PID: 13469 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 361.923075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.932552] Call Trace: [ 361.935188] dump_stack+0x142/0x197 [ 361.938844] warn_alloc.cold+0x96/0x1af [ 361.942838] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 361.947704] ? lock_downgrade+0x740/0x740 [ 361.951880] ? avc_has_perm+0x2df/0x4b0 [ 361.955885] __vmalloc_node_range+0x3c3/0x6a0 [ 361.960411] vmalloc+0x46/0x50 [ 361.963630] ? sel_write_load+0x1a0/0x1050 [ 361.967882] sel_write_load+0x1a0/0x1050 [ 361.971965] ? save_trace+0x290/0x290 [ 361.975790] ? sel_read_bool+0x240/0x240 [ 361.979875] ? trace_hardirqs_on+0x10/0x10 [ 361.984148] ? debug_smp_processor_id+0x1c/0x20 [ 361.988837] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 361.993792] __vfs_write+0x105/0x6b0 [ 361.997532] ? sel_read_bool+0x240/0x240 [ 362.001605] ? kernel_read+0x120/0x120 [ 362.005529] ? __lock_is_held+0xb6/0x140 [ 362.009601] ? check_preemption_disabled+0x3c/0x250 [ 362.014638] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 362.020128] ? rcu_read_lock_sched_held+0x110/0x130 [ 362.025166] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 362.029941] ? __sb_start_write+0x153/0x2f0 [ 362.034279] vfs_write+0x198/0x500 [ 362.037839] SyS_write+0xfd/0x230 [ 362.041309] ? SyS_read+0x230/0x230 [ 362.044953] ? do_syscall_64+0x53/0x640 [ 362.048945] ? SyS_read+0x230/0x230 [ 362.053066] do_syscall_64+0x1e8/0x640 [ 362.056974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.061846] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.067265] RIP: 0033:0x45b349 [ 362.070471] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 362.078298] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 362.086192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 362.093516] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 362.100786] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 362.108199] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 362.121907] warn_alloc_show_mem: 2 callbacks suppressed [ 362.121911] Mem-Info: [ 362.131846] active_anon:214935 inactive_anon:200 isolated_anon:0 [ 362.131846] active_file:8296 inactive_file:12112 isolated_file:0 [ 362.131846] unevictable:0 dirty:549 writeback:0 unstable:0 [ 362.131846] slab_reclaimable:13035 slab_unreclaimable:116426 [ 362.131846] mapped:60589 shmem:250 pagetables:1391 bounce:0 [ 362.131846] free:1166367 free_pcp:301 free_cma:0 [ 362.166189] Node 0 active_anon:859740kB inactive_anon:800kB active_file:33044kB inactive_file:48448kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242356kB dirty:2192kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 290816kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 362.195274] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 362.221244] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 362.247760] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 362.252861] Node 0 DMA32 free:868700kB min:36380kB low:45472kB high:54564kB active_anon:859724kB inactive_anon:800kB active_file:33044kB inactive_file:48456kB unevictable:0kB writepending:2212kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7680kB pagetables:5400kB bounce:0kB free_pcp:1344kB local_pcp:624kB free_cma:0kB [ 362.283057] lowmem_reserve[]: 0 0 0 0 0 03:25:22 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:22 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 362.287115] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 362.325051] lowmem_reserve[]: 0 0 0 0 0 [ 362.329109] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 362.357266] lowmem_reserve[]: 0 0 0 0 0 [ 362.362214] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 362.380922] Node 0 DMA32: 1795*4kB (UME) 799*8kB (UME) 513*16kB (UME) 532*32kB (UME) 486*64kB (ME) 36*128kB (M) 2*256kB (M) 1*512kB (U) 3*1024kB (ME) 0*2048kB 192*4096kB (M) = 865044kB [ 362.400738] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 362.412153] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 362.431460] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 362.440405] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 362.448999] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 362.457952] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 362.466681] 20663 total pagecache pages [ 362.470778] 0 pages in swap cache [ 362.474272] Swap cache stats: add 0, delete 0, find 0/0 [ 362.479645] Free swap = 0kB [ 362.482743] Total swap = 0kB [ 362.485774] 1965979 pages RAM [ 362.489086] 0 pages HighMem/MovableOnly [ 362.493234] 335869 pages reserved [ 362.496694] 0 pages cma reserved [ 362.507710] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 362.516155] SELinux: failed to load policy 03:25:23 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:23 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:23 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:23 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:23 executing program 5: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:23 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:23 executing program 5: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:23 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) [ 362.675004] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 362.698562] SELinux: failed to load policy [ 362.709098] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:23 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r2 = dup2(r0, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 362.742407] SELinux: failed to load policy 03:25:23 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:23 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:23 executing program 5: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:23 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:23 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) [ 362.862832] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 362.909690] SELinux: failed to load policy 03:25:23 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:23 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 363.021307] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 363.049082] SELinux: failed to load policy 03:25:23 executing program 5: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:23 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 363.065827] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 363.087896] SELinux: failed to load policy 03:25:23 executing program 5: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:23 executing program 5: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 03:25:23 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:23 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 363.162603] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 363.180442] SELinux: failed to load policy [ 363.197066] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:23 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) dup2(r2, r3) [ 363.268896] SELinux: failed to load policy 03:25:24 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:24 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) dup2(r2, r3) 03:25:24 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 363.348891] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 363.412098] SELinux: failed to load policy [ 363.448628] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 363.466220] SELinux: failed to load policy 03:25:24 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:24 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 363.494845] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 363.515543] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:24 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:24 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) dup2(r2, r3) [ 363.651163] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:24 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 363.756290] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 363.799247] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 363.815295] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:24 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:24 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:24 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r3 = dup2(r2, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:24 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:24 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:24 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 364.005784] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 364.043918] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:24 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x3) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) io_setup(0x20, &(0x7f0000000180)=0x0) io_getevents(r3, 0x4, 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)={0x77359400}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, r4, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 364.082246] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:24 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x3) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) io_setup(0x20, &(0x7f0000000180)=0x0) io_getevents(r3, 0x4, 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)={0x77359400}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, r4, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:24 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:24 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 364.192696] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0x9, 0xffffffffffffffff, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "511ce459b06596ab94cb784f67ea2f51fe5e3470"}, 0x15, 0x1) ioctl$TCFLSH(r0, 0x540b, 0xfff) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 364.300453] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 364.324202] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:25 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x3) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) io_setup(0x20, &(0x7f0000000180)=0x0) io_getevents(r3, 0x4, 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)={0x77359400}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, r4, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 364.357180] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 364.376094] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:25 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:25 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:25 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x3) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) io_setup(0x20, &(0x7f0000000180)=0x0) io_getevents(r3, 0x4, 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)={0x77359400}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, r4, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0x9, 0xffffffffffffffff, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "511ce459b06596ab94cb784f67ea2f51fe5e3470"}, 0x15, 0x1) ioctl$TCFLSH(r0, 0x540b, 0xfff) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:25 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) fremovexattr(r0, &(0x7f0000000080)=@random={'btrfs.', '\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000000)=0x5, 0x4) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) [ 364.504595] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 364.643803] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 364.686395] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:25 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x3) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) io_setup(0x20, &(0x7f0000000180)=0x0) io_getevents(r3, 0x4, 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)={0x77359400}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, r4, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) dup2(r2, r5) 03:25:25 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, 0x0, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:25 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) [ 364.732479] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:25 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x3f, 0x1f, 0x5, 0x9, 0x0, 0x9, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x100, 0x2, @perf_config_ext={0x40, 0xfffffffffffffffe}, 0x5239, 0x5cef24ec, 0x6, 0x6, 0x9, 0x7, 0xffff}, 0xffffffffffffffff, 0x0, r2, 0x8) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0xd) r4 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) sendmsg$IPSET_CMD_GET_BYINDEX(r6, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r10 = dup2(r9, r8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r10, 0xc0105303, &(0x7f0000000100)={0xfffffffd, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857", 0x3}) ioctl$TUNSETSTEERINGEBPF(r10, 0x800454e0, &(0x7f0000000400)=r6) r11 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r12 = dup2(r11, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r12, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) sendmsg$NLBL_MGMT_C_PROTOCOLS(r12, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x908, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x1c}}, 0x4004080) [ 364.852075] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 364.896507] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:25 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:25 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x3f, 0x1f, 0x5, 0x9, 0x0, 0x9, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x100, 0x2, @perf_config_ext={0x40, 0xfffffffffffffffe}, 0x5239, 0x5cef24ec, 0x6, 0x6, 0x9, 0x7, 0xffff}, 0xffffffffffffffff, 0x0, r2, 0x8) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0xd) r4 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) sendmsg$IPSET_CMD_GET_BYINDEX(r6, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r10 = dup2(r9, r8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r10, 0xc0105303, &(0x7f0000000100)={0xfffffffd, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857", 0x3}) ioctl$TUNSETSTEERINGEBPF(r10, 0x800454e0, &(0x7f0000000400)=r6) r11 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r12 = dup2(r11, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r12, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) sendmsg$NLBL_MGMT_C_PROTOCOLS(r12, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x908, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x1c}}, 0x4004080) [ 365.014764] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:25 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x3f, 0x1f, 0x5, 0x9, 0x0, 0x9, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x100, 0x2, @perf_config_ext={0x40, 0xfffffffffffffffe}, 0x5239, 0x5cef24ec, 0x6, 0x6, 0x9, 0x7, 0xffff}, 0xffffffffffffffff, 0x0, r2, 0x8) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0xd) r4 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) sendmsg$IPSET_CMD_GET_BYINDEX(r6, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, 0xf, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r10 = dup2(r9, r8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r10, 0xc0105303, &(0x7f0000000100)={0xfffffffd, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857", 0x3}) ioctl$TUNSETSTEERINGEBPF(r10, 0x800454e0, &(0x7f0000000400)=r6) r11 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r12 = dup2(r11, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r12, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) sendmsg$NLBL_MGMT_C_PROTOCOLS(r12, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x908, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x1c}}, 0x4004080) 03:25:25 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, 0x0, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:25 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) fremovexattr(r0, &(0x7f0000000080)=@random={'btrfs.', '\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000000)=0x5, 0x4) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:25 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x3) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) io_setup(0x20, &(0x7f0000000180)=0x0) io_getevents(r3, 0x4, 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)={0x77359400}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, r4, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) dup2(r2, r5) 03:25:25 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:25 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f00000000c0)=0x3) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) io_setup(0x20, &(0x7f0000000180)=0x0) io_getevents(r3, 0x4, 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)={0x77359400}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, r4, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x4}, 0x16, 0x2) dup2(r2, r5) [ 365.327125] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:26 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, 0x0, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 365.393049] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:26 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 365.476252] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 365.501525] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:26 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:26 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x1, 0x4) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xdf8f, 0x240000) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x8000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0x40000000}) [ 365.599314] SELinux: policydb table sizes (5,7) do not match mine (6,7) 03:25:26 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 365.683620] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 365.719983] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 365.725710] CPU: 1 PID: 13747 Comm: syz-executor.1 Not tainted 4.14.166-syzkaller #0 [ 365.733635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.742990] Call Trace: [ 365.745606] dump_stack+0x142/0x197 [ 365.749234] warn_alloc.cold+0x96/0x1af [ 365.753218] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 365.758189] ? lock_downgrade+0x740/0x740 [ 365.762361] ? avc_has_perm+0x2df/0x4b0 [ 365.766541] __vmalloc_node_range+0x3c3/0x6a0 [ 365.771048] ? trace_hardirqs_on+0x10/0x10 [ 365.775293] vmalloc+0x46/0x50 [ 365.778494] ? sel_write_load+0x1a0/0x1050 [ 365.782741] sel_write_load+0x1a0/0x1050 [ 365.786812] ? save_trace+0x290/0x290 [ 365.790607] ? sel_read_bool+0x240/0x240 [ 365.794803] ? trace_hardirqs_on+0x10/0x10 [ 365.799055] ? debug_smp_processor_id+0x1c/0x20 [ 365.803731] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 365.808662] __vfs_write+0x105/0x6b0 [ 365.812389] ? sel_read_bool+0x240/0x240 [ 365.816458] ? kernel_read+0x120/0x120 [ 365.820451] ? __lock_is_held+0xb6/0x140 [ 365.824639] ? check_preemption_disabled+0x3c/0x250 [ 365.829676] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 365.835145] ? rcu_read_lock_sched_held+0x110/0x130 [ 365.840166] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 365.844929] ? __sb_start_write+0x153/0x2f0 [ 365.849355] vfs_write+0x198/0x500 [ 365.852908] SyS_write+0xfd/0x230 [ 365.856491] ? SyS_read+0x230/0x230 [ 365.860114] ? do_syscall_64+0x53/0x640 [ 365.864082] ? SyS_read+0x230/0x230 [ 365.868080] do_syscall_64+0x1e8/0x640 [ 365.871962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.876822] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.882011] RIP: 0033:0x45b349 [ 365.885282] RSP: 002b:00007ff77f034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 365.892988] RAX: ffffffffffffffda RBX: 00007ff77f0356d4 RCX: 000000000045b349 [ 365.900262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 365.907654] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 365.914925] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 365.922190] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bfd4 03:25:26 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x1, 0x4) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xdf8f, 0x240000) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x8000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0x40000000}) 03:25:26 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 366.037812] Mem-Info: [ 366.048525] active_anon:216049 inactive_anon:198 isolated_anon:0 [ 366.048525] active_file:8313 inactive_file:12106 isolated_file:0 [ 366.048525] unevictable:0 dirty:433 writeback:0 unstable:0 [ 366.048525] slab_reclaimable:13028 slab_unreclaimable:116064 [ 366.048525] mapped:60606 shmem:250 pagetables:1451 bounce:0 [ 366.048525] free:1165342 free_pcp:174 free_cma:0 03:25:26 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:26 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x1, 0x4) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xdf8f, 0x240000) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x8000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0x40000000}) 03:25:26 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendto$ax25(r1, &(0x7f00000013c0)="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", 0x1000, 0x0, &(0x7f00000001c0)={{0x3, @default, 0x2}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default]}, 0x48) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000400)=ANY=[@ANYBLOB="8cff7cf908000080010000050000de5011ee1981e00752bf4221d0c78299bf57554deca5697afd0d5e"], 0x20) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="2008000000000000002af353b94b89f5aca62723181b859e885e0bdc91aa002b16ee846283634cc0e67681", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64=r1, @ANYRESOCT=0x0], @ANYRES16=r5], 0x3}, 0x1, 0x0, 0x0, 0x40011}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000900)={&(0x7f0000000780), 0xc, &(0x7f00000008c0)={&(0x7f0000000440)={0x74, r2, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x1a}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'vlan1\x00'}}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x40}, 0x15) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r6 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r8 = dup2(r7, r6) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r8, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) sendmsg$NL80211_CMD_GET_MPP(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x20008085) [ 366.244232] Node 0 active_anon:868376kB inactive_anon:800kB active_file:33112kB inactive_file:48436kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242420kB dirty:1820kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 296960kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:25:27 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc001, 0x0) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f0000000080)={0x5, 0xa4f, 0xa8, 0x100000001, 0x3f}) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f00000000c0)=0x800, 0x4) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) 03:25:27 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040), 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:27 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000000), 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x1, 0x4) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xdf8f, 0x240000) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x8000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0x40000000}) [ 366.384984] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:25:27 executing program 3 (fault-call:2 fault-nth:0): setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 366.502405] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 366.534592] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 366.539931] Node 0 DMA32 free:861232kB min:36380kB low:45472kB high:54564kB active_anon:868324kB inactive_anon:800kB active_file:33112kB inactive_file:48436kB unevictable:0kB writepending:1820kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7968kB pagetables:5828kB bounce:0kB free_pcp:1172kB local_pcp:576kB free_cma:0kB [ 366.614166] lowmem_reserve[]: 0 0 0 0 0 [ 366.635442] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 366.740675] lowmem_reserve[]: 0 0 0 0 0 [ 366.758958] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 366.795695] lowmem_reserve[]: 0 0 0 0 0 [ 366.799799] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 366.814995] Node 0 DMA32: 1765*4kB (UME) 915*8kB (UME) 482*16kB (UME) 486*32kB (UME) 501*64kB (UME) 38*128kB (UM) 2*256kB (M) 1*512kB (U) 3*1024kB (ME) 1*2048kB (M) 191*4096kB (M) = 863052kB [ 366.832563] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 366.846944] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 366.866079] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 366.875529] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 366.884441] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 03:25:27 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:27 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x8) 03:25:27 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 366.894260] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 366.902962] 20671 total pagecache pages [ 366.907012] 0 pages in swap cache [ 366.910936] Swap cache stats: add 0, delete 0, find 0/0 [ 366.916375] Free swap = 0kB [ 366.919475] Total swap = 0kB [ 366.922977] 1965979 pages RAM [ 366.926162] 0 pages HighMem/MovableOnly [ 366.930710] 335869 pages reserved [ 366.934228] 0 pages cma reserved [ 366.996968] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 367.035228] SELinux: policydb string length -2147483640 does not match expected length 8 [ 367.053758] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 367.061441] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 367.072652] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 367.078345] CPU: 0 PID: 13785 Comm: syz-executor.3 Not tainted 4.14.166-syzkaller #0 [ 367.086328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.095693] Call Trace: [ 367.098327] dump_stack+0x142/0x197 [ 367.101982] warn_alloc.cold+0x96/0x1af [ 367.106019] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 367.110885] ? lock_downgrade+0x740/0x740 [ 367.115054] ? avc_has_perm+0x2df/0x4b0 [ 367.119041] __vmalloc_node_range+0x3c3/0x6a0 [ 367.123581] vmalloc+0x46/0x50 [ 367.126788] ? sel_write_load+0x1a0/0x1050 [ 367.131022] sel_write_load+0x1a0/0x1050 [ 367.135095] ? save_trace+0x290/0x290 [ 367.138913] ? sel_read_bool+0x240/0x240 [ 367.143029] ? trace_hardirqs_on+0x10/0x10 [ 367.147798] ? debug_smp_processor_id+0x1c/0x20 [ 367.152566] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 367.157573] __vfs_write+0x105/0x6b0 [ 367.161337] ? sel_read_bool+0x240/0x240 [ 367.165412] ? kernel_read+0x120/0x120 [ 367.169293] ? __lock_is_held+0xb6/0x140 [ 367.173372] ? check_preemption_disabled+0x3c/0x250 [ 367.178409] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 367.183868] ? rcu_read_lock_sched_held+0x110/0x130 [ 367.188908] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 367.193778] ? __sb_start_write+0x153/0x2f0 [ 367.198120] vfs_write+0x198/0x500 [ 367.201662] SyS_write+0xfd/0x230 [ 367.205119] ? SyS_read+0x230/0x230 [ 367.208750] ? do_syscall_64+0x53/0x640 [ 367.212730] ? SyS_read+0x230/0x230 [ 367.216365] do_syscall_64+0x1e8/0x640 [ 367.220258] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 367.225111] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.230409] RIP: 0033:0x45b349 [ 367.233589] RSP: 002b:00007f1a0cb1cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.241346] RAX: ffffffffffffffda RBX: 00007f1a0cb1d6d4 RCX: 000000000045b349 [ 367.248647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 367.255970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 367.263595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 367.271012] R13: 0000000000000c91 R14: 00000000004cd771 R15: 0000000000000000 [ 367.288040] Mem-Info: [ 367.290799] active_anon:216049 inactive_anon:200 isolated_anon:103 [ 367.290799] active_file:8313 inactive_file:12111 isolated_file:0 03:25:28 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x8) [ 367.290799] unevictable:0 dirty:464 writeback:0 unstable:0 [ 367.290799] slab_reclaimable:13028 slab_unreclaimable:116476 [ 367.290799] mapped:60580 shmem:250 pagetables:1457 bounce:0 [ 367.290799] free:1164629 free_pcp:328 free_cma:0 03:25:28 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 367.330943] Node 0 active_anon:864196kB inactive_anon:800kB active_file:33112kB inactive_file:48444kB unevictable:0kB isolated(anon):412kB isolated(file):0kB mapped:242320kB dirty:1852kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 367.372474] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 367.404214] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 367.432687] lowmem_reserve[]: 0 2569 2569 2569 2569 03:25:28 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x8) [ 367.437845] Node 0 DMA32 free:859524kB min:36380kB low:45472kB high:54564kB active_anon:866320kB inactive_anon:800kB active_file:33112kB inactive_file:48444kB unevictable:0kB writepending:1852kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7936kB pagetables:5828kB bounce:0kB free_pcp:1268kB local_pcp:640kB free_cma:0kB [ 367.478850] lowmem_reserve[]: 0 0 0 0 0 03:25:28 executing program 0 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x0) [ 367.485876] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 367.541963] lowmem_reserve[]: 0 0 0 0 0 [ 367.546300] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 367.585739] lowmem_reserve[]: 0 0 0 0 0 [ 367.590520] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 367.604525] Node 0 DMA32: 2251*4kB (UME) 1016*8kB (UME) 737*16kB (UME) 596*32kB (UME) 531*64kB (UME) 43*128kB (UM) 2*256kB (M) 1*512kB (U) 3*1024kB (ME) 1*2048kB (M) 187*4096kB (M) = 859580kB [ 367.622463] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB 03:25:28 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x0) [ 367.634035] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 367.651895] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 367.663627] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 367.672694] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 367.682682] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 367.691880] 20673 total pagecache pages [ 367.701759] 0 pages in swap cache [ 367.705449] Swap cache stats: add 0, delete 0, find 0/0 [ 367.711324] Free swap = 0kB [ 367.714667] Total swap = 0kB [ 367.717871] 1965979 pages RAM [ 367.721378] 0 pages HighMem/MovableOnly [ 367.725645] 335869 pages reserved [ 367.729279] 0 pages cma reserved [ 367.733418] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 367.733560] FAULT_INJECTION: forcing a failure. [ 367.733560] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 367.756519] CPU: 1 PID: 13785 Comm: syz-executor.3 Not tainted 4.14.166-syzkaller #0 [ 367.757960] syz-executor.1 cpuset= [ 367.764429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.764435] Call Trace: [ 367.764455] dump_stack+0x142/0x197 [ 367.764469] should_fail.cold+0x10f/0x159 [ 367.764479] ? save_trace+0x290/0x290 [ 367.764492] __alloc_pages_nodemask+0x1d6/0x7a0 [ 367.764502] ? find_held_lock+0x35/0x130 [ 367.764511] ? __alloc_pages_slowpath+0x2930/0x2930 [ 367.764523] ? lock_downgrade+0x740/0x740 [ 367.764536] alloc_pages_current+0xec/0x1e0 [ 367.764611] __get_free_pages+0xf/0x40 [ 367.764620] __tlb_remove_page_size+0x2c5/0x4f0 [ 367.764632] unmap_page_range+0xb59/0x19f0 [ 367.764654] ? vm_normal_page_pmd+0x360/0x360 [ 367.798446] syz1 [ 367.800692] ? uprobe_munmap+0x94/0x210 [ 367.808131] mems_allowed=0-1 [ 367.810030] unmap_single_vma+0x15d/0x2c0 [ 367.810044] unmap_vmas+0xac/0x170 [ 367.810057] exit_mmap+0x285/0x4e0 [ 367.810067] ? SyS_munmap+0x30/0x30 [ 367.810089] ? kmem_cache_free+0x244/0x2b0 [ 367.810101] ? __khugepaged_exit+0xcf/0x3d0 [ 367.810165] ? mm_update_next_owner+0x450/0x5d0 [ 367.810206] mmput+0x114/0x440 [ 367.810216] do_exit+0x952/0x2cd0 [ 367.810253] ? get_signal+0x319/0x1cd0 [ 367.810265] ? mm_update_next_owner+0x5d0/0x5d0 [ 367.884576] do_group_exit+0x111/0x330 [ 367.888583] get_signal+0x381/0x1cd0 [ 367.892324] ? save_trace+0x290/0x290 [ 367.896221] do_signal+0x86/0x19a0 [ 367.899788] ? lock_downgrade+0x740/0x740 [ 367.903967] ? setup_sigcontext+0x7d0/0x7d0 [ 367.908303] ? check_preemption_disabled+0x3c/0x250 [ 367.913334] ? kick_process+0xef/0x180 [ 367.917307] ? task_work_add+0x8e/0xf0 [ 367.921350] ? fput+0xd4/0x150 [ 367.924560] ? exit_to_usermode_loop+0x3d/0x220 [ 367.929235] exit_to_usermode_loop+0x15c/0x220 [ 367.933823] do_syscall_64+0x4bc/0x640 [ 367.937706] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:25:28 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x0) [ 367.942650] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.947844] RIP: 0033:0x45b349 [ 367.951131] RSP: 002b:00007f1a0cb1cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.958843] RAX: fffffffffffffff4 RBX: 00007f1a0cb1d6d4 RCX: 000000000045b349 [ 367.966286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 367.973593] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 367.981053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 367.988338] R13: 0000000000000c91 R14: 00000000004cd771 R15: 0000000000000000 [ 368.005912] CPU: 0 PID: 13801 Comm: syz-executor.1 Not tainted 4.14.166-syzkaller #0 [ 368.014072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.023456] Call Trace: [ 368.026052] dump_stack+0x142/0x197 [ 368.029692] warn_alloc.cold+0x96/0x1af [ 368.034063] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 368.039426] ? lock_downgrade+0x740/0x740 [ 368.043584] ? avc_has_perm+0x2df/0x4b0 [ 368.047647] __vmalloc_node_range+0x3c3/0x6a0 [ 368.052263] vmalloc+0x46/0x50 [ 368.055469] ? sel_write_load+0x1a0/0x1050 [ 368.059711] sel_write_load+0x1a0/0x1050 [ 368.063781] ? save_trace+0x290/0x290 [ 368.067587] ? sel_read_bool+0x240/0x240 [ 368.071663] ? trace_hardirqs_on+0x10/0x10 [ 368.075982] ? debug_smp_processor_id+0x1c/0x20 [ 368.080918] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 368.085847] __vfs_write+0x105/0x6b0 [ 368.089619] ? sel_read_bool+0x240/0x240 [ 368.093678] ? kernel_read+0x120/0x120 [ 368.097578] ? __lock_is_held+0xb6/0x140 [ 368.101656] ? check_preemption_disabled+0x3c/0x250 [ 368.106831] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 368.112299] ? rcu_read_lock_sched_held+0x110/0x130 [ 368.117449] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 368.122216] ? __sb_start_write+0x153/0x2f0 [ 368.126614] vfs_write+0x198/0x500 [ 368.130156] SyS_write+0xfd/0x230 [ 368.133670] ? SyS_read+0x230/0x230 [ 368.137467] ? do_syscall_64+0x53/0x640 [ 368.141446] ? SyS_read+0x230/0x230 [ 368.145111] do_syscall_64+0x1e8/0x640 [ 368.148997] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.154005] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.159250] RIP: 0033:0x45b349 [ 368.162899] RSP: 002b:00007ff77f034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 368.171383] RAX: ffffffffffffffda RBX: 00007ff77f0356d4 RCX: 000000000045b349 [ 368.178745] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 368.186073] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 03:25:28 executing program 3: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:28 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:28 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x0) [ 368.193456] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 368.200995] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bfd4 [ 368.212935] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 368.231927] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 368.270921] CPU: 0 PID: 13800 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 368.278863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.288230] Call Trace: [ 368.290837] dump_stack+0x142/0x197 [ 368.294485] warn_alloc.cold+0x96/0x1af [ 368.299160] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 368.304049] ? lock_downgrade+0x740/0x740 [ 368.308217] ? avc_has_perm+0x2df/0x4b0 [ 368.312368] __vmalloc_node_range+0x3c3/0x6a0 [ 368.316897] vmalloc+0x46/0x50 [ 368.320106] ? sel_write_load+0x1a0/0x1050 [ 368.324350] sel_write_load+0x1a0/0x1050 [ 368.328516] ? save_trace+0x290/0x290 [ 368.332336] ? sel_read_bool+0x240/0x240 [ 368.336409] ? trace_hardirqs_on+0x10/0x10 [ 368.340666] ? debug_smp_processor_id+0x1c/0x20 [ 368.345559] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 368.350498] __vfs_write+0x105/0x6b0 [ 368.354209] ? sel_read_bool+0x240/0x240 [ 368.358284] ? kernel_read+0x120/0x120 [ 368.362187] ? __lock_is_held+0xb6/0x140 [ 368.366270] ? check_preemption_disabled+0x3c/0x250 03:25:29 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x0) [ 368.371521] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 368.377000] ? rcu_read_lock_sched_held+0x110/0x130 [ 368.382079] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 368.386855] ? __sb_start_write+0x153/0x2f0 [ 368.391191] vfs_write+0x198/0x500 [ 368.394986] SyS_write+0xfd/0x230 [ 368.398479] ? SyS_read+0x230/0x230 [ 368.402121] ? do_syscall_64+0x53/0x640 [ 368.406122] ? SyS_read+0x230/0x230 [ 368.409951] do_syscall_64+0x1e8/0x640 [ 368.413857] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.418822] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.424036] RIP: 0033:0x45b349 [ 368.427243] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 368.435004] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 368.442312] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 368.449590] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 368.456877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 368.464153] R13: 0000000000000c91 R14: 00000000004cd771 R15: 0000000000000000 03:25:29 executing program 4 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 368.494914] warn_alloc_show_mem: 1 callbacks suppressed [ 368.494919] Mem-Info: [ 368.502961] active_anon:217079 inactive_anon:200 isolated_anon:0 [ 368.502961] active_file:8313 inactive_file:12120 isolated_file:0 [ 368.502961] unevictable:0 dirty:477 writeback:0 unstable:0 [ 368.502961] slab_reclaimable:13028 slab_unreclaimable:116536 [ 368.502961] mapped:60580 shmem:250 pagetables:1468 bounce:0 [ 368.502961] free:1164429 free_pcp:277 free_cma:0 [ 368.550118] Node 0 active_anon:866244kB inactive_anon:800kB active_file:33112kB inactive_file:48480kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242320kB dirty:1904kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 313344kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 368.579743] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 368.607858] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 368.612050] FAULT_INJECTION: forcing a failure. [ 368.612050] name failslab, interval 1, probability 0, space 0, times 0 [ 368.639693] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 368.648517] CPU: 1 PID: 13839 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 368.656870] Node 0 [ 368.659566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.659572] Call Trace: [ 368.659594] dump_stack+0x142/0x197 [ 368.659608] should_fail.cold+0x10f/0x159 [ 368.659624] should_failslab+0xdb/0x130 [ 368.662453] DMA32 free:859776kB min:36380kB low:45472kB high:54564kB active_anon:868340kB inactive_anon:800kB active_file:33112kB inactive_file:48480kB unevictable:0kB writepending:1904kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7776kB pagetables:5724kB bounce:0kB free_pcp:980kB local_pcp:524kB free_cma:0kB [ 368.671230] __kmalloc+0x2f0/0x7a0 [ 368.671244] ? mutex_trylock+0x168/0x1c0 [ 368.671372] ? tty_write_lock+0x20/0x60 [ 368.671383] ? tty_write+0x4b1/0x700 [ 368.671395] tty_write+0x4b1/0x700 [ 368.671428] ? n_hdlc_tty_poll+0x310/0x310 [ 368.671442] __vfs_write+0x105/0x6b0 [ 368.678872] lowmem_reserve[]: [ 368.681932] ? tty_read+0x270/0x270 [ 368.681945] ? kernel_read+0x120/0x120 [ 368.681956] ? __inode_security_revalidate+0xd6/0x130 [ 368.681966] ? selinux_file_permission+0x14e/0x480 [ 368.681975] ? avc_policy_seqno+0x9/0x20 [ 368.681984] ? selinux_file_permission+0x85/0x480 [ 368.682050] ? security_file_permission+0x89/0x1f0 [ 368.682062] ? rw_verify_area+0xea/0x2b0 [ 368.686832] 0 [ 368.715733] vfs_write+0x198/0x500 [ 368.715747] SyS_write+0xfd/0x230 [ 368.715757] ? SyS_read+0x230/0x230 [ 368.715769] ? do_syscall_64+0x53/0x640 [ 368.715777] ? SyS_read+0x230/0x230 [ 368.715788] do_syscall_64+0x1e8/0x640 [ 368.715796] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.715813] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.715822] RIP: 0033:0x45b349 [ 368.715827] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 368.715838] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 368.715843] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 368.715849] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 368.715854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 368.715859] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000000 [ 368.865255] 0 0 0 0 [ 368.867602] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 368.894536] lowmem_reserve[]: 0 0 0 0 0 [ 368.898554] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 368.926778] lowmem_reserve[]: 0 0 0 0 0 [ 368.930840] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 368.944587] Node 0 DMA32: 2245*4kB (UME) 1155*8kB (UME) 729*16kB (UME) 593*32kB (UME) 547*64kB (UME) 43*128kB (UM) 2*256kB (M) 1*512kB (U) 3*1024kB (ME) 1*2048kB (M) 187*4096kB (M) = 861468kB [ 368.962419] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 368.974063] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 368.992064] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 369.000999] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 369.009757] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 369.019146] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 369.027921] 20686 total pagecache pages [ 369.031983] 0 pages in swap cache [ 369.035451] Swap cache stats: add 0, delete 0, find 0/0 [ 369.040975] Free swap = 0kB [ 369.044123] Total swap = 0kB [ 369.047140] 1965979 pages RAM [ 369.050307] 0 pages HighMem/MovableOnly [ 369.054385] 335869 pages reserved [ 369.057839] 0 pages cma reserved [ 369.061362] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 369.061392] FAULT_INJECTION: forcing a failure. [ 369.061392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 369.061402] CPU: 0 PID: 13800 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 369.076842] syz-executor.2 cpuset= [ 369.083439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.083445] Call Trace: [ 369.083465] dump_stack+0x142/0x197 [ 369.083478] should_fail.cold+0x10f/0x159 [ 369.083487] ? save_trace+0x290/0x290 [ 369.083501] __alloc_pages_nodemask+0x1d6/0x7a0 [ 369.083510] ? find_held_lock+0x35/0x130 [ 369.083520] ? __alloc_pages_slowpath+0x2930/0x2930 [ 369.083534] ? lock_downgrade+0x740/0x740 [ 369.083546] alloc_pages_current+0xec/0x1e0 [ 369.083559] __get_free_pages+0xf/0x40 [ 369.083567] __tlb_remove_page_size+0x2c5/0x4f0 [ 369.083577] unmap_page_range+0xb59/0x19f0 [ 369.083600] ? vm_normal_page_pmd+0x360/0x360 [ 369.092487] syz2 [ 369.095084] ? uprobe_munmap+0x94/0x210 [ 369.104831] mems_allowed=0-1 [ 369.107125] unmap_single_vma+0x15d/0x2c0 [ 369.107140] unmap_vmas+0xac/0x170 [ 369.107153] exit_mmap+0x285/0x4e0 [ 369.107163] ? SyS_munmap+0x30/0x30 [ 369.107185] ? kmem_cache_free+0x244/0x2b0 [ 369.107196] ? __khugepaged_exit+0xcf/0x3d0 [ 369.107210] ? mm_update_next_owner+0x450/0x5d0 [ 369.195735] mmput+0x114/0x440 [ 369.199040] do_exit+0x952/0x2cd0 [ 369.202484] ? get_signal+0x319/0x1cd0 [ 369.206369] ? mm_update_next_owner+0x5d0/0x5d0 [ 369.211058] do_group_exit+0x111/0x330 [ 369.214946] get_signal+0x381/0x1cd0 [ 369.218681] ? save_trace+0x290/0x290 [ 369.222497] do_signal+0x86/0x19a0 [ 369.226032] ? lock_downgrade+0x740/0x740 [ 369.230182] ? setup_sigcontext+0x7d0/0x7d0 [ 369.234509] ? check_preemption_disabled+0x3c/0x250 [ 369.239541] ? kick_process+0xef/0x180 [ 369.243427] ? task_work_add+0x8e/0xf0 [ 369.247320] ? fput+0xd4/0x150 [ 369.250615] ? exit_to_usermode_loop+0x3d/0x220 [ 369.255294] exit_to_usermode_loop+0x15c/0x220 [ 369.259888] do_syscall_64+0x4bc/0x640 [ 369.263902] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.268763] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.273954] RIP: 0033:0x45b349 [ 369.277133] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 369.284840] RAX: fffffffffffffff4 RBX: 00007f28868626d4 RCX: 000000000045b349 [ 369.292252] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 369.299520] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 369.306828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 369.314126] R13: 0000000000000c91 R14: 00000000004cd771 R15: 0000000000000000 [ 369.321590] CPU: 1 PID: 13809 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 369.329493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.339138] Call Trace: [ 369.341722] dump_stack+0x142/0x197 [ 369.345387] warn_alloc.cold+0x96/0x1af [ 369.349363] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 369.354578] ? lock_downgrade+0x740/0x740 [ 369.359544] ? avc_has_perm+0x2df/0x4b0 [ 369.363551] __vmalloc_node_range+0x3c3/0x6a0 [ 369.368059] vmalloc+0x46/0x50 [ 369.371305] ? sel_write_load+0x1a0/0x1050 [ 369.375544] sel_write_load+0x1a0/0x1050 [ 369.379610] ? save_trace+0x290/0x290 [ 369.383422] ? sel_read_bool+0x240/0x240 [ 369.387487] ? trace_hardirqs_on+0x10/0x10 [ 369.392153] ? debug_smp_processor_id+0x1c/0x20 [ 369.396840] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 369.401772] __vfs_write+0x105/0x6b0 [ 369.405548] ? sel_read_bool+0x240/0x240 [ 369.409613] ? kernel_read+0x120/0x120 [ 369.413505] ? __lock_is_held+0xb6/0x140 [ 369.417565] ? check_preemption_disabled+0x3c/0x250 [ 369.422595] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 369.428182] ? rcu_read_lock_sched_held+0x110/0x130 [ 369.433460] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 369.438205] ? __sb_start_write+0x153/0x2f0 [ 369.442520] vfs_write+0x198/0x500 [ 369.446071] SyS_write+0xfd/0x230 [ 369.449561] ? SyS_read+0x230/0x230 [ 369.453391] ? do_syscall_64+0x53/0x640 [ 369.457392] ? SyS_read+0x230/0x230 [ 369.461130] do_syscall_64+0x1e8/0x640 [ 369.465020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.469869] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.475071] RIP: 0033:0x45b349 [ 369.478503] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 369.486529] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 369.493803] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 03:25:30 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:25:30 executing program 4 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 369.501245] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 369.508671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 369.516158] R13: 0000000000000c91 R14: 00000000004cd771 R15: 0000000000000000 [ 369.524918] Mem-Info: [ 369.535726] active_anon:216010 inactive_anon:200 isolated_anon:0 [ 369.535726] active_file:8313 inactive_file:12131 isolated_file:0 [ 369.535726] unevictable:0 dirty:495 writeback:0 unstable:0 [ 369.535726] slab_reclaimable:13021 slab_unreclaimable:116375 [ 369.535726] mapped:60580 shmem:250 pagetables:1442 bounce:0 [ 369.535726] free:1165662 free_pcp:260 free_cma:0 [ 369.585614] Node 0 active_anon:868332kB inactive_anon:800kB active_file:33112kB inactive_file:48524kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242320kB dirty:1976kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 311296kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 369.614594] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 369.629879] FAULT_INJECTION: forcing a failure. [ 369.629879] name failslab, interval 1, probability 0, space 0, times 0 [ 369.640892] Node 0 [ 369.651930] CPU: 0 PID: 13848 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 369.651936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.651939] Call Trace: [ 369.651958] dump_stack+0x142/0x197 [ 369.651970] should_fail.cold+0x10f/0x159 [ 369.651983] should_failslab+0xdb/0x130 [ 369.651990] __kmalloc+0x71/0x7a0 [ 369.652003] ? __tty_buffer_request_room+0x1a4/0x500 [ 369.652012] __tty_buffer_request_room+0x1a4/0x500 [ 369.652025] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 369.654381] DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 369.662146] pty_write+0x113/0x1d0 [ 369.662156] ? pty_unthrottle+0x50/0x50 [ 369.662177] n_hdlc_send_frames+0x238/0x3e0 [ 369.662191] n_hdlc_tty_write+0x504/0x5f0 [ 369.662208] ? n_hdlc_tty_poll+0x310/0x310 [ 369.671920] lowmem_reserve[]: [ 369.674393] ? wake_up_q+0xf0/0xf0 [ 369.674408] ? _copy_from_user+0x99/0x110 [ 369.674420] tty_write+0x3f6/0x700 [ 369.674434] ? n_hdlc_tty_poll+0x310/0x310 [ 369.678179] 0 [ 369.682236] __vfs_write+0x105/0x6b0 [ 369.682249] ? tty_read+0x270/0x270 [ 369.682258] ? kernel_read+0x120/0x120 [ 369.682268] ? __inode_security_revalidate+0xd6/0x130 [ 369.682275] ? avc_policy_seqno+0x9/0x20 [ 369.682283] ? selinux_file_permission+0x85/0x480 [ 369.682294] ? security_file_permission+0x89/0x1f0 [ 369.682304] ? rw_verify_area+0xea/0x2b0 [ 369.686374] 2569 [ 369.689725] vfs_write+0x198/0x500 [ 369.689736] SyS_write+0xfd/0x230 [ 369.689745] ? SyS_read+0x230/0x230 [ 369.689754] ? do_syscall_64+0x53/0x640 [ 369.689764] ? SyS_read+0x230/0x230 [ 369.695111] 2569 [ 369.699917] do_syscall_64+0x1e8/0x640 [ 369.699928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.699942] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.699956] RIP: 0033:0x45b349 [ 369.705631] 2569 [ 369.731262] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 369.731275] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 369.731279] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 369.731284] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 369.731288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 369.731293] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000001 [ 369.731320] [ 369.731323] ====================================================== [ 369.731326] WARNING: possible circular locking dependency detected [ 369.731328] 4.14.166-syzkaller #0 Not tainted [ 369.731331] ------------------------------------------------------ [ 369.731338] syz-executor.4/13848 is trying to acquire lock: [ 369.731339] (console_owner){-.-.}, at: [] vprintk_emit+0x2f1/0x600 [ 369.731345] [ 369.731347] but task is already holding lock: [ 369.731348] (&(&port->lock)->rlock){-.-.}, at: [] pty_write+0xe0/0x1d0 [ 369.731354] [ 369.731357] which lock already depends on the new lock. [ 369.731358] [ 369.731359] [ 369.731362] the existing dependency chain (in reverse order) is: [ 369.731363] [ 369.731364] -> #2 (&(&port->lock)->rlock){-.-.}: [ 369.731372] lock_acquire+0x16f/0x430 [ 369.731374] _raw_spin_lock_irqsave+0x95/0xcd [ 369.731376] tty_port_tty_get+0x22/0x90 [ 369.731378] tty_port_default_wakeup+0x16/0x40 [ 369.731381] tty_port_tty_wakeup+0x57/0x70 [ 369.731383] uart_write_wakeup+0x46/0x70 [ 369.731385] serial8250_tx_chars+0x40d/0xa10 [ 369.731388] serial8250_handle_irq.part.0+0x206/0x250 [ 369.731391] serial8250_default_handle_irq+0xa1/0x120 [ 369.731393] serial8250_interrupt+0xe9/0x1a0 [ 369.731395] __handle_irq_event_percpu+0x125/0x7f0 [ 369.731398] handle_irq_event_percpu+0x65/0x130 [ 369.731400] handle_irq_event+0xa7/0x134 [ 369.731402] handle_edge_irq+0x22b/0x840 [ 369.731404] handle_irq+0x39/0x50 [ 369.731406] do_IRQ+0x99/0x1d0 [ 369.731409] ret_from_intr+0x0/0x1e [ 369.731411] _raw_spin_unlock_irqrestore+0x95/0xe0 [ 369.731417] uart_write+0x29a/0x4f0 [ 369.731420] n_tty_write+0x38b/0xf20 [ 369.731422] tty_write+0x3f6/0x700 [ 369.731424] redirected_tty_write+0xa3/0xb0 [ 369.731426] __vfs_write+0x105/0x6b0 [ 369.731428] vfs_write+0x198/0x500 [ 369.731430] SyS_write+0xfd/0x230 [ 369.731432] do_syscall_64+0x1e8/0x640 [ 369.731435] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.731436] [ 369.731437] -> #1 (&port_lock_key){-.-.}: [ 369.731445] lock_acquire+0x16f/0x430 [ 369.731447] _raw_spin_lock_irqsave+0x95/0xcd [ 369.731450] serial8250_console_write+0x709/0x930 [ 369.731452] univ8250_console_write+0x5f/0x70 [ 369.731454] console_unlock+0x9ba/0xed0 [ 369.731456] vprintk_emit+0x1f9/0x600 [ 369.731459] vprintk_default+0x28/0x30 [ 369.731461] vprintk_func+0x5d/0x159 [ 369.731463] printk+0x9e/0xbc [ 369.731465] register_console+0x614/0x9e0 [ 369.731467] univ8250_console_init+0x33/0x3f [ 369.731469] console_init+0x4d/0x5d [ 369.731471] start_kernel+0x43c/0x6fd [ 369.731474] x86_64_start_reservations+0x29/0x2b [ 369.731476] x86_64_start_kernel+0x77/0x7b [ 369.731478] secondary_startup_64+0xa5/0xb0 [ 369.731479] [ 369.731480] -> #0 (console_owner){-.-.}: [ 369.731488] __lock_acquire+0x2cb3/0x4620 [ 369.731490] lock_acquire+0x16f/0x430 [ 369.731492] vprintk_emit+0x32e/0x600 [ 369.731494] vprintk_default+0x28/0x30 [ 369.731496] vprintk_func+0x5d/0x159 [ 369.731499] printk+0x9e/0xbc [ 369.731501] should_fail.cold+0xe4/0x159 [ 369.731503] should_failslab+0xdb/0x130 [ 369.731505] __kmalloc+0x71/0x7a0 [ 369.731507] __tty_buffer_request_room+0x1a4/0x500 [ 369.731510] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 369.731512] pty_write+0x113/0x1d0 [ 369.731515] n_hdlc_send_frames+0x238/0x3e0 [ 369.731517] n_hdlc_tty_write+0x504/0x5f0 [ 369.731519] tty_write+0x3f6/0x700 [ 369.731521] __vfs_write+0x105/0x6b0 [ 369.731523] vfs_write+0x198/0x500 [ 369.731525] SyS_write+0xfd/0x230 [ 369.731527] do_syscall_64+0x1e8/0x640 [ 369.731530] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.731531] [ 369.731534] other info that might help us debug this: [ 369.731535] [ 369.731537] Chain exists of: [ 369.731538] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 369.731547] [ 369.731556] Possible unsafe locking scenario: [ 369.731557] [ 369.731560] CPU0 CPU1 [ 369.731562] ---- ---- [ 369.731563] lock(&(&port->lock)->rlock); [ 369.731568] lock(&port_lock_key); [ 369.731573] lock(&(&port->lock)->rlock); [ 369.731578] lock(console_owner); [ 369.731582] [ 369.731583] *** DEADLOCK *** [ 369.731585] [ 369.731587] 3 locks held by syz-executor.4/13848: [ 369.731588] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 369.731596] #1: (&tty->atomic_write_lock){+.+.}, at: [] tty_write_lock+0x20/0x60 [ 369.731605] #2: (&(&port->lock)->rlock){-.-.}, at: [] pty_write+0xe0/0x1d0 [ 369.731613] [ 369.731614] stack backtrace: [ 369.731618] CPU: 0 PID: 13848 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 369.731622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.731624] Call Trace: [ 369.731626] dump_stack+0x142/0x197 [ 369.731628] ? vprintk_func+0x65/0x159 [ 369.731631] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 369.731633] __lock_acquire+0x2cb3/0x4620 [ 369.731635] ? trace_hardirqs_on+0x10/0x10 [ 369.731637] ? vprintk_emit+0x309/0x600 [ 369.731639] lock_acquire+0x16f/0x430 [ 369.731641] ? vprintk_emit+0x2f1/0x600 [ 369.731643] vprintk_emit+0x32e/0x600 [ 369.731645] ? vprintk_emit+0x2f1/0x600 [ 369.731647] vprintk_default+0x28/0x30 [ 369.731649] vprintk_func+0x5d/0x159 [ 369.731651] printk+0x9e/0xbc [ 369.731653] ? show_regs_print_info+0x63/0x63 [ 369.731656] ? __lock_acquire+0x5f7/0x4620 [ 369.731658] ? ___ratelimit+0x55/0x537 [ 369.731660] should_fail.cold+0xe4/0x159 [ 369.731662] should_failslab+0xdb/0x130 [ 369.731664] __kmalloc+0x71/0x7a0 [ 369.731667] ? __tty_buffer_request_room+0x1a4/0x500 [ 369.731669] __tty_buffer_request_room+0x1a4/0x500 [ 369.731672] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 369.731674] pty_write+0x113/0x1d0 [ 369.731676] ? pty_unthrottle+0x50/0x50 [ 369.731678] n_hdlc_send_frames+0x238/0x3e0 [ 369.731680] n_hdlc_tty_write+0x504/0x5f0 [ 369.731682] ? n_hdlc_tty_poll+0x310/0x310 [ 369.731684] ? wake_up_q+0xf0/0xf0 [ 369.731686] ? _copy_from_user+0x99/0x110 [ 369.731688] tty_write+0x3f6/0x700 [ 369.731690] ? n_hdlc_tty_poll+0x310/0x310 [ 369.731692] __vfs_write+0x105/0x6b0 [ 369.731693] ? tty_read+0x270/0x270 [ 369.731695] ? kernel_read+0x120/0x120 [ 369.731698] ? __inode_security_revalidate+0xd6/0x130 [ 369.731700] ? avc_policy_seqno+0x9/0x20 [ 369.731702] ? selinux_file_permission+0x85/0x480 [ 369.731705] ? security_file_permission+0x89/0x1f0 [ 369.731707] ? rw_verify_area+0xea/0x2b0 [ 369.731709] vfs_write+0x198/0x500 [ 369.731711] SyS_write+0xfd/0x230 [ 369.731712] ? SyS_read+0x230/0x230 [ 369.731715] ? do_syscall_64+0x53/0x640 [ 369.731717] ? SyS_read+0x230/0x230 [ 369.731719] do_syscall_64+0x1e8/0x640 [ 369.731721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.731723] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.731725] RIP: 0033:0x45b349 [ 369.731728] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 369.731733] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 369.731736] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 369.731739] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 369.731743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 369.731746] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000001 [ 370.644525] 2569 [ 370.647146] Node 0 DMA32 free:862148kB min:36380kB low:45472kB high:54564kB active_anon:866220kB inactive_anon:800kB active_file:33112kB inactive_file:48612kB unevictable:0kB writepending:1164kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7648kB pagetables:5724kB bounce:0kB free_pcp:916kB local_pcp:356kB free_cma:0kB [ 370.677666] lowmem_reserve[]: 0 0 0 0 0 [ 370.682354] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 370.707933] lowmem_reserve[]: 0 0 0 0 0 [ 370.711999] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 370.739967] lowmem_reserve[]: 0 0 0 0 0 [ 370.744166] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 370.757933] Node 0 DMA32: 2241*4kB (UME) 1220*8kB (UME) 791*16kB (UME) 602*32kB (UME) 547*64kB (UME) 43*128kB (UM) 2*256kB (M) 1*512kB (U) 3*1024kB (ME) 1*2048kB (M) 187*4096kB (M) = 863252kB [ 370.775464] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 370.786261] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 370.803861] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 370.812739] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 370.821353] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 370.830245] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 370.838949] 20717 total pagecache pages [ 370.842975] 0 pages in swap cache [ 370.846423] Swap cache stats: add 0, delete 0, find 0/0 [ 370.852058] Free swap = 0kB [ 370.855188] Total swap = 0kB [ 370.858190] 1965979 pages RAM [ 370.861347] 0 pages HighMem/MovableOnly [ 370.865314] 335869 pages reserved [ 370.868747] 0 pages cma reserved [ 370.872462] FAULT_INJECTION: forcing a failure. [ 370.872462] name failslab, interval 1, probability 0, space 0, times 0 [ 370.872519] FAULT_INJECTION: forcing a failure. [ 370.872519] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 370.886441] CPU: 1 PID: 13816 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 370.903433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.912784] Call Trace: [ 370.915377] dump_stack+0x142/0x197 [ 370.918995] should_fail.cold+0x10f/0x159 [ 370.923159] should_failslab+0xdb/0x130 [ 370.927141] kmem_cache_alloc_node_trace+0x280/0x770 [ 370.932241] ? lock_downgrade+0x740/0x740 [ 370.936381] __get_vm_area_node+0xf0/0x340 [ 370.940622] __vmalloc_node_range+0x9f/0x6a0 [ 370.945041] ? sel_write_load+0x1a0/0x1050 [ 370.949312] vmalloc+0x46/0x50 [ 370.952526] ? sel_write_load+0x1a0/0x1050 [ 370.956751] sel_write_load+0x1a0/0x1050 [ 370.960817] ? save_trace+0x290/0x290 [ 370.964621] ? sel_read_bool+0x240/0x240 [ 370.968677] ? mark_held_locks+0xb1/0x100 [ 370.972835] ? retint_kernel+0x2d/0x2d [ 370.976731] __vfs_write+0x105/0x6b0 [ 370.980447] ? sel_read_bool+0x240/0x240 [ 370.984502] ? kernel_read+0x120/0x120 [ 370.988380] ? __lock_is_held+0xb6/0x140 [ 370.992444] ? check_preemption_disabled+0x3c/0x250 [ 370.997467] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 371.002912] ? rcu_read_lock_sched_held+0x110/0x130 [ 371.008050] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 371.012823] ? __sb_start_write+0x153/0x2f0 [ 371.017163] vfs_write+0x198/0x500 [ 371.020693] SyS_write+0xfd/0x230 [ 371.024248] ? SyS_read+0x230/0x230 [ 371.027861] ? do_syscall_64+0x53/0x640 [ 371.031827] ? SyS_read+0x230/0x230 [ 371.035461] do_syscall_64+0x1e8/0x640 [ 371.039342] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.044189] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.049379] RIP: 0033:0x45b349 [ 371.052557] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.060262] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 371.067535] RDX: 0000000000000010 RSI: 0000000020000340 RDI: 0000000000000004 [ 371.074810] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 371.082086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 371.089358] R13: 0000000000000c91 R14: 00000000004cd771 R15: 0000000000000000 [ 371.096649] CPU: 0 PID: 13809 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 371.102209] syz-executor.0: [ 371.104539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.104543] Call Trace: [ 371.104560] dump_stack+0x142/0x197 [ 371.104570] should_fail.cold+0x10f/0x159 [ 371.104582] __alloc_pages_nodemask+0x1d6/0x7a0 [ 371.107664] vmalloc: allocation failure: 16 bytes [ 371.116955] ? debug_smp_processor_id+0x1c/0x20 [ 371.116965] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 371.116974] ? __alloc_pages_slowpath+0x2930/0x2930 [ 371.116983] ? lock_downgrade+0x740/0x740 [ 371.116994] alloc_pages_current+0xec/0x1e0 [ 371.117004] __get_free_pages+0xf/0x40 [ 371.117011] __tlb_remove_page_size+0x2c5/0x4f0 [ 371.117018] unmap_page_range+0xb59/0x19f0 [ 371.117034] ? vm_normal_page_pmd+0x360/0x360 [ 371.120117] , mode:0x14000c0(GFP_KERNEL), nodemask= [ 371.123241] ? uprobe_munmap+0x94/0x210 [ 371.123251] unmap_single_vma+0x15d/0x2c0 [ 371.123260] unmap_vmas+0xac/0x170 [ 371.127489] (null) [ 371.132075] exit_mmap+0x285/0x4e0 [ 371.132083] ? SyS_munmap+0x30/0x30 [ 371.132093] ? quarantine_put+0xf9/0x1a0 [ 371.132104] ? kmem_cache_free+0x217/0x2b0 [ 371.132112] ? __khugepaged_exit+0xcf/0x3d0 [ 371.132119] ? mm_update_next_owner+0x450/0x5d0 [ 371.132128] mmput+0x114/0x440 [ 371.132138] do_exit+0x952/0x2cd0 [ 371.137461] syz-executor.0 cpuset= [ 371.141689] ? perf_trace_lock+0x500/0x500 [ 371.141700] ? mm_update_next_owner+0x5d0/0x5d0 [ 371.141707] ? lock_downgrade+0x740/0x740 [ 371.141715] ? lock_downgrade+0x740/0x740 [ 371.141722] do_group_exit+0x111/0x330 [ 371.141737] get_signal+0x381/0x1cd0 [ 371.141749] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 371.146764] syz0 [ 371.151699] do_signal+0x86/0x19a0 [ 371.156408] mems_allowed=0-1 [ 371.160167] ? sel_read_bool+0x240/0x240 [ 371.160178] ? lock_downgrade+0x740/0x740 [ 371.160187] ? setup_sigcontext+0x7d0/0x7d0 [ 371.160198] ? __mutex_unlock_slowpath+0x71/0x800 [ 371.160204] ? check_preemption_disabled+0x3c/0x250 [ 371.160217] ? wait_for_completion+0x420/0x420 [ 371.295950] ? task_work_add+0x8e/0xf0 [ 371.299830] ? fput+0xd4/0x150 [ 371.303019] ? SyS_write+0x15e/0x230 [ 371.306740] exit_to_usermode_loop+0x15c/0x220 [ 371.311328] do_syscall_64+0x4bc/0x640 [ 371.315203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.320042] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.325249] RIP: 0033:0x45b349 [ 371.328446] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.336287] RAX: fffffffffffffff4 RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 371.343551] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 371.350820] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:25:32 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$netlink(r1, &(0x7f0000000040), &(0x7f00000001c0)=0xc) write$selinux_load(r0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r4 = dup2(r3, r2) r5 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x2, 0x80040) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r5, 0x40485404, &(0x7f0000000240)={{0xffffffffffffffff, 0x2, 0x1, 0x2, 0x81}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000000000)={0xd2, 0x0, 0x101, 0x8001, 0x13, "c520ad6ce26993e4"}) 03:25:32 executing program 4 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 371.358087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 371.365352] R13: 0000000000000c91 R14: 00000000004cd771 R15: 0000000000000000 [ 371.373210] CPU: 1 PID: 13816 Comm: syz-executor.0 Not tainted 4.14.166-syzkaller #0 [ 371.381117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.390481] Call Trace: [ 371.393086] dump_stack+0x142/0x197 [ 371.396723] warn_alloc.cold+0x96/0x1af [ 371.400711] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 371.405565] ? lock_downgrade+0x740/0x740 [ 371.406402] audit: type=1400 audit(1579577132.065:58): avc: denied { getattr } for pid=13855 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 371.409726] ? __get_vm_area_node+0x27f/0x340 [ 371.409739] __vmalloc_node_range+0x3c3/0x6a0 [ 371.409752] vmalloc+0x46/0x50 [ 371.446125] ? sel_write_load+0x1a0/0x1050 [ 371.446161] FAULT_INJECTION: forcing a failure. [ 371.446161] name failslab, interval 1, probability 0, space 0, times 0 [ 371.450383] sel_write_load+0x1a0/0x1050 [ 371.465636] ? save_trace+0x290/0x290 [ 371.469450] ? sel_read_bool+0x240/0x240 [ 371.473516] ? mark_held_locks+0xb1/0x100 [ 371.477677] ? retint_kernel+0x2d/0x2d [ 371.481575] __vfs_write+0x105/0x6b0 [ 371.485296] ? sel_read_bool+0x240/0x240 [ 371.489463] ? kernel_read+0x120/0x120 [ 371.493353] ? __lock_is_held+0xb6/0x140 [ 371.497414] ? check_preemption_disabled+0x3c/0x250 [ 371.502430] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 371.507891] ? rcu_read_lock_sched_held+0x110/0x130 [ 371.512896] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 371.517772] ? __sb_start_write+0x153/0x2f0 [ 371.522085] vfs_write+0x198/0x500 [ 371.525612] SyS_write+0xfd/0x230 [ 371.529140] ? SyS_read+0x230/0x230 [ 371.532755] ? do_syscall_64+0x53/0x640 [ 371.536741] ? SyS_read+0x230/0x230 [ 371.540361] do_syscall_64+0x1e8/0x640 [ 371.544249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.549087] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.554269] RIP: 0033:0x45b349 [ 371.557460] RSP: 002b:00007f107d6d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.565170] RAX: ffffffffffffffda RBX: 00007f107d6d56d4 RCX: 000000000045b349 [ 371.572428] RDX: 0000000000000010 RSI: 0000000020000340 RDI: 0000000000000004 [ 371.579706] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 371.586979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 371.594251] R13: 0000000000000c91 R14: 00000000004cd771 R15: 0000000000000000 [ 371.601549] CPU: 0 PID: 13857 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 371.602050] Mem-Info: [ 371.609548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.609553] Call Trace: [ 371.609573] dump_stack+0x142/0x197 [ 371.609585] should_fail.cold+0x10f/0x159 [ 371.609594] ? kasan_unpoison_shadow+0x35/0x50 [ 371.609607] should_failslab+0xdb/0x130 [ 371.612123] active_anon:217078 inactive_anon:200 isolated_anon:0 [ 371.612123] active_file:8313 inactive_file:12153 isolated_file:0 [ 371.612123] unevictable:0 dirty:229 writeback:0 unstable:0 [ 371.612123] slab_reclaimable:13020 slab_unreclaimable:116316 [ 371.612123] mapped:60580 shmem:250 pagetables:1468 bounce:0 [ 371.612123] free:1164649 free_pcp:161 free_cma:0 [ 371.621383] __kmalloc+0x71/0x7a0 [ 371.621398] ? __tty_buffer_request_room+0x1a4/0x500 [ 371.621407] __tty_buffer_request_room+0x1a4/0x500 [ 371.621423] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 371.621435] pty_write+0x113/0x1d0 [ 371.621447] ? pty_unthrottle+0x50/0x50 [ 371.624119] Node 0 active_anon:868312kB inactive_anon:800kB active_file:33112kB inactive_file:48612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242320kB dirty:912kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 313344kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 371.627653] n_hdlc_send_frames+0x238/0x3e0 [ 371.627671] n_hdlc_tty_write+0x504/0x5f0 [ 371.631939] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 371.636428] ? n_hdlc_tty_poll+0x310/0x310 [ 371.636446] ? wake_up_q+0xf0/0xf0 [ 371.636461] ? _copy_from_user+0x99/0x110 [ 371.640547] Node 0 [ 371.674330] tty_write+0x3f6/0x700 [ 371.674344] ? n_hdlc_tty_poll+0x310/0x310 [ 371.674355] __vfs_write+0x105/0x6b0 [ 371.674363] ? tty_read+0x270/0x270 [ 371.674370] ? kernel_read+0x120/0x120 [ 371.674380] ? __inode_security_revalidate+0xd6/0x130 [ 371.674391] ? avc_policy_seqno+0x9/0x20 [ 371.677928] DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 371.682938] ? selinux_file_permission+0x85/0x480 [ 371.682951] ? security_file_permission+0x89/0x1f0 [ 371.682960] ? rw_verify_area+0xea/0x2b0 [ 371.682969] vfs_write+0x198/0x500 [ 371.682978] SyS_write+0xfd/0x230 [ 371.682989] ? SyS_read+0x230/0x230 [ 371.688195] lowmem_reserve[]: [ 371.693559] ? SyS_read+0x230/0x230 [ 371.693571] do_syscall_64+0x1e8/0x640 [ 371.693580] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.693594] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.693605] RIP: 0033:0x45b349 [ 371.697183] 0 [ 371.701094] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.701105] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 371.701109] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 371.701113] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 371.701118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 371.701122] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000002 [ 371.929793] 2569 2569 2569 2569 [ 371.929807] Node 0 DMA32 free:862328kB min:36380kB low:45472kB high:54564kB active_anon:866244kB inactive_anon:800kB active_file:33116kB inactive_file:48612kB unevictable:0kB writepending:960kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7712kB pagetables:5724kB bounce:0kB free_pcp:948kB local_pcp:428kB free_cma:0kB [ 371.929829] lowmem_reserve[]: 0 0 0 0 0 [ 371.929844] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 371.929862] lowmem_reserve[]: 0 0 0 0 0 [ 371.929878] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 371.929898] lowmem_reserve[]: 0 0 0 0 0 [ 372.028715] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 372.043544] Node 0 DMA32: 2210*4kB (UME) 1138*8kB (UME) 784*16kB (UME) 601*32kB (UME) 547*64kB (UME) 43*128kB (UM) 2*256kB (M) 1*512kB (U) 3*1024kB (ME) 1*2048kB (M) 187*4096kB (M) = 862328kB [ 372.061348] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 372.072396] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 372.090276] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 372.099278] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 372.108007] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 372.117039] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 372.125875] 20734 total pagecache pages [ 372.129842] 0 pages in swap cache [ 372.133356] Swap cache stats: add 0, delete 0, find 0/0 [ 372.138824] Free swap = 0kB [ 372.141902] Total swap = 0kB [ 372.144921] 1965979 pages RAM [ 372.148057] 0 pages HighMem/MovableOnly [ 372.152386] 335869 pages reserved [ 372.155838] 0 pages cma reserved 03:25:32 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8dff7cf90815004c696e757800000000"], 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) connect$llc(r3, &(0x7f0000000040)={0x1a, 0x305, 0x3, 0x20, 0x67, 0x81, @dev={[], 0x28}}, 0x10) 03:25:32 executing program 4 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 372.159228] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 372.175229] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 372.185211] CPU: 1 PID: 13828 Comm: syz-executor.3 Not tainted 4.14.166-syzkaller #0 [ 372.193138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.201287] FAULT_INJECTION: forcing a failure. [ 372.201287] name failslab, interval 1, probability 0, space 0, times 0 [ 372.202500] Call Trace: [ 372.216279] dump_stack+0x142/0x197 [ 372.219907] warn_alloc.cold+0x96/0x1af [ 372.224007] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 372.228872] ? lock_downgrade+0x740/0x740 [ 372.233027] ? avc_has_perm+0x2df/0x4b0 [ 372.237006] __vmalloc_node_range+0x3c3/0x6a0 [ 372.241516] vmalloc+0x46/0x50 [ 372.244718] ? sel_write_load+0x1a0/0x1050 [ 372.248943] sel_write_load+0x1a0/0x1050 [ 372.253012] ? save_trace+0x290/0x290 [ 372.256810] ? sel_read_bool+0x240/0x240 [ 372.260875] ? trace_hardirqs_on+0x10/0x10 [ 372.265108] ? debug_smp_processor_id+0x1c/0x20 [ 372.269788] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 372.274865] __vfs_write+0x105/0x6b0 [ 372.278584] ? sel_read_bool+0x240/0x240 [ 372.282645] ? kernel_read+0x120/0x120 [ 372.286532] ? __lock_is_held+0xb6/0x140 [ 372.290586] ? check_preemption_disabled+0x3c/0x250 [ 372.295614] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 372.301076] ? rcu_read_lock_sched_held+0x110/0x130 [ 372.306100] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 372.310861] ? __sb_start_write+0x153/0x2f0 [ 372.315188] vfs_write+0x198/0x500 [ 372.318730] SyS_write+0xfd/0x230 [ 372.322185] ? SyS_read+0x230/0x230 [ 372.325816] ? do_syscall_64+0x53/0x640 [ 372.329800] ? SyS_read+0x230/0x230 [ 372.333423] do_syscall_64+0x1e8/0x640 [ 372.337318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.342163] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 372.347365] RIP: 0033:0x45b349 [ 372.350583] RSP: 002b:00007f1a0cb1cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 372.358295] RAX: ffffffffffffffda RBX: 00007f1a0cb1d6d4 RCX: 000000000045b349 [ 372.365571] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 372.372851] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 372.380176] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 372.387476] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 372.395153] CPU: 0 PID: 13865 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 372.396662] syz-executor.1: [ 372.403048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:25:33 executing program 3: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000240)={0x26, 0x15, 0x4, 0x1000, "0beca09129ecb5467e563af30bdf357e67d9444c0ccccf587679c977437bf350"}) write$selinux_load(r0, 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) setresuid(r4, r5, r6) [ 372.403052] Call Trace: [ 372.403072] dump_stack+0x142/0x197 [ 372.403084] should_fail.cold+0x10f/0x159 [ 372.403094] ? kasan_unpoison_shadow+0x35/0x50 [ 372.403104] should_failslab+0xdb/0x130 [ 372.403116] __kmalloc+0x71/0x7a0 [ 372.407554] vmalloc: allocation failure: 0 bytes [ 372.415560] ? __tty_buffer_request_room+0x1a4/0x500 [ 372.415571] __tty_buffer_request_room+0x1a4/0x500 [ 372.415583] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 372.415595] pty_write+0x113/0x1d0 [ 372.415608] ? pty_unthrottle+0x50/0x50 [ 372.434341] , mode:0x14000c0(GFP_KERNEL), nodemask= [ 372.434487] n_hdlc_send_frames+0x238/0x3e0 [ 372.439462] (null) [ 372.442683] n_hdlc_tty_write+0x504/0x5f0 [ 372.442697] ? n_hdlc_tty_poll+0x310/0x310 [ 372.442709] ? wake_up_q+0xf0/0xf0 [ 372.442722] ? _copy_from_user+0x99/0x110 [ 372.450757] syz-executor.1 cpuset= [ 372.452763] tty_write+0x3f6/0x700 [ 372.452778] ? n_hdlc_tty_poll+0x310/0x310 [ 372.458383] syz1 [ 372.461852] __vfs_write+0x105/0x6b0 [ 372.466402] mems_allowed=0-1 [ 372.470837] ? tty_read+0x270/0x270 [ 372.470848] ? kernel_read+0x120/0x120 [ 372.470859] ? __inode_security_revalidate+0xd6/0x130 [ 372.470871] ? avc_policy_seqno+0x9/0x20 [ 372.530192] ? selinux_file_permission+0x85/0x480 [ 372.535155] ? security_file_permission+0x89/0x1f0 [ 372.540088] ? rw_verify_area+0xea/0x2b0 [ 372.544155] vfs_write+0x198/0x500 [ 372.547699] SyS_write+0xfd/0x230 [ 372.551143] ? SyS_read+0x230/0x230 [ 372.554866] ? SyS_read+0x230/0x230 [ 372.558487] do_syscall_64+0x1e8/0x640 [ 372.562371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.567225] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 372.572422] RIP: 0033:0x45b349 [ 372.575598] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 372.583301] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 372.590995] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 372.598405] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 372.605666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 372.613038] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000003 [ 372.620335] CPU: 1 PID: 13836 Comm: syz-executor.1 Not tainted 4.14.166-syzkaller #0 [ 372.628226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.637586] Call Trace: [ 372.640191] dump_stack+0x142/0x197 [ 372.643838] warn_alloc.cold+0x96/0x1af [ 372.647852] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 372.652714] ? lock_downgrade+0x740/0x740 [ 372.656881] ? avc_has_perm+0x2df/0x4b0 [ 372.660872] __vmalloc_node_range+0x3c3/0x6a0 [ 372.665391] vmalloc+0x46/0x50 03:25:33 executing program 4 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 372.668682] ? sel_write_load+0x1a0/0x1050 [ 372.672936] sel_write_load+0x1a0/0x1050 [ 372.677011] ? save_trace+0x290/0x290 [ 372.680821] ? sel_read_bool+0x240/0x240 [ 372.684891] ? trace_hardirqs_on+0x10/0x10 [ 372.689139] ? debug_smp_processor_id+0x1c/0x20 [ 372.693819] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 372.698926] __vfs_write+0x105/0x6b0 [ 372.702653] ? sel_read_bool+0x240/0x240 [ 372.706734] ? kernel_read+0x120/0x120 [ 372.709869] FAULT_INJECTION: forcing a failure. [ 372.709869] name failslab, interval 1, probability 0, space 0, times 0 [ 372.710743] ? __lock_is_held+0xb6/0x140 [ 372.726006] ? check_preemption_disabled+0x3c/0x250 [ 372.731030] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 372.736519] ? rcu_read_lock_sched_held+0x110/0x130 [ 372.741557] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 372.746308] ? __sb_start_write+0x153/0x2f0 [ 372.750673] vfs_write+0x198/0x500 [ 372.754209] SyS_write+0xfd/0x230 [ 372.757768] ? SyS_read+0x230/0x230 [ 372.761418] ? do_syscall_64+0x81/0x640 [ 372.765400] ? SyS_read+0x230/0x230 [ 372.769150] do_syscall_64+0x1e8/0x640 [ 372.773041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.777894] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 372.783091] RIP: 0033:0x45b349 [ 372.786273] RSP: 002b:00007ff77f055c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 372.793985] RAX: ffffffffffffffda RBX: 00007ff77f0566d4 RCX: 000000000045b349 [ 372.801276] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 372.808705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 372.816083] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 372.823373] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 372.830674] CPU: 0 PID: 13877 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 372.832000] warn_alloc_show_mem: 1 callbacks suppressed [ 372.832004] Mem-Info: [ 372.838565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.838569] Call Trace: [ 372.838589] dump_stack+0x142/0x197 [ 372.838602] should_fail.cold+0x10f/0x159 [ 372.838611] ? kasan_unpoison_shadow+0x35/0x50 [ 372.838623] should_failslab+0xdb/0x130 [ 372.844159] active_anon:217081 inactive_anon:200 isolated_anon:0 [ 372.844159] active_file:8314 inactive_file:12164 isolated_file:0 [ 372.844159] unevictable:0 dirty:244 writeback:0 unstable:0 [ 372.844159] slab_reclaimable:13020 slab_unreclaimable:116660 [ 372.844159] mapped:60580 shmem:250 pagetables:1468 bounce:0 [ 372.844159] free:1164218 free_pcp:120 free_cma:0 [ 372.846402] __kmalloc+0x71/0x7a0 [ 372.846464] ? __tty_buffer_request_room+0x1a4/0x500 [ 372.856462] Node 0 active_anon:868324kB inactive_anon:800kB active_file:33116kB inactive_file:48656kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242320kB dirty:972kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 313344kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 372.858468] __tty_buffer_request_room+0x1a4/0x500 [ 372.858482] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 372.862225] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 372.866263] pty_write+0x113/0x1d0 [ 372.866272] ? pty_unthrottle+0x50/0x50 [ 372.866284] n_hdlc_send_frames+0x238/0x3e0 [ 372.871367] Node 0 [ 372.874860] n_hdlc_tty_write+0x504/0x5f0 [ 372.874874] ? n_hdlc_tty_poll+0x310/0x310 [ 372.874899] ? wake_up_q+0xf0/0xf0 [ 372.908870] DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 372.912200] ? _copy_from_user+0x99/0x110 [ 372.912213] tty_write+0x3f6/0x700 [ 372.912227] ? n_hdlc_tty_poll+0x310/0x310 [ 372.912238] __vfs_write+0x105/0x6b0 [ 372.912246] ? tty_read+0x270/0x270 [ 372.912256] ? kernel_read+0x120/0x120 [ 372.917898] lowmem_reserve[]: [ 372.945629] ? __inode_security_revalidate+0xd6/0x130 [ 372.945638] ? avc_policy_seqno+0x9/0x20 [ 372.945647] ? selinux_file_permission+0x85/0x480 [ 372.945659] ? security_file_permission+0x89/0x1f0 [ 372.945668] ? rw_verify_area+0xea/0x2b0 [ 372.945678] vfs_write+0x198/0x500 [ 372.945691] SyS_write+0xfd/0x230 [ 372.951447] 0 [ 372.956867] ? SyS_read+0x230/0x230 [ 372.956878] ? SyS_read+0x230/0x230 [ 372.956902] do_syscall_64+0x1e8/0x640 [ 372.983092] 2569 [ 372.986204] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.986222] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 372.990307] 2569 [ 372.994522] RIP: 0033:0x45b349 [ 372.994528] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 372.994538] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 372.994546] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 372.996824] 2569 [ 373.000907] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 373.000912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 373.000916] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000004 [ 373.167952] 2569 [ 373.167960] Node 0 DMA32 free:861084kB min:36380kB low:45472kB high:54564kB active_anon:866260kB inactive_anon:800kB active_file:33116kB inactive_file:48680kB unevictable:0kB writepending:976kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7744kB pagetables:5756kB bounce:0kB free_pcp:620kB local_pcp:284kB free_cma:0kB [ 373.167981] lowmem_reserve[]: 0 0 0 0 0 [ 373.167997] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 373.168014] lowmem_reserve[]: 0 0 0 0 0 [ 373.168030] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 373.168049] lowmem_reserve[]: 0 0 0 0 0 [ 373.265633] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 373.280929] Node 0 DMA32: 2208*4kB (UME) 1212*8kB (UME) 758*16kB (UME) 602*32kB (UME) 547*64kB (UME) 43*128kB (UM) 2*256kB (M) 1*512kB (U) 3*1024kB (ME) 1*2048kB (M) 187*4096kB (M) = 862528kB [ 373.298468] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 373.309306] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 373.326788] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 373.335671] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 373.344382] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 373.353271] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 373.361888] 20749 total pagecache pages [ 373.365854] 0 pages in swap cache 03:25:34 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:34 executing program 4 (fault-call:5 fault-nth:5): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 373.369298] Swap cache stats: add 0, delete 0, find 0/0 [ 373.374751] Free swap = 0kB [ 373.377776] Total swap = 0kB [ 373.380845] 1965979 pages RAM [ 373.383950] 0 pages HighMem/MovableOnly [ 373.387914] 335869 pages reserved [ 373.391698] 0 pages cma reserved [ 373.395114] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 373.406679] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 373.414236] CPU: 1 PID: 13849 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 373.422154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.431513] Call Trace: [ 373.433231] FAULT_INJECTION: forcing a failure. [ 373.433231] name failslab, interval 1, probability 0, space 0, times 0 [ 373.434111] dump_stack+0x142/0x197 [ 373.448914] warn_alloc.cold+0x96/0x1af [ 373.452904] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 373.457735] ? lock_downgrade+0x740/0x740 [ 373.461880] ? avc_has_perm+0x2df/0x4b0 [ 373.465843] __vmalloc_node_range+0x3c3/0x6a0 [ 373.470325] vmalloc+0x46/0x50 [ 373.473502] ? sel_write_load+0x1a0/0x1050 [ 373.477721] sel_write_load+0x1a0/0x1050 [ 373.481766] ? save_trace+0x290/0x290 [ 373.485555] ? sel_read_bool+0x240/0x240 [ 373.489625] ? trace_hardirqs_on+0x10/0x10 [ 373.493858] ? debug_smp_processor_id+0x1c/0x20 [ 373.498529] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 373.503463] __vfs_write+0x105/0x6b0 [ 373.507168] ? sel_read_bool+0x240/0x240 [ 373.511237] ? kernel_read+0x120/0x120 [ 373.515110] ? __lock_is_held+0xb6/0x140 [ 373.519153] ? check_preemption_disabled+0x3c/0x250 [ 373.524158] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 373.529605] ? rcu_read_lock_sched_held+0x110/0x130 [ 373.534605] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 373.539358] ? __sb_start_write+0x153/0x2f0 [ 373.543678] vfs_write+0x198/0x500 [ 373.547202] SyS_write+0xfd/0x230 [ 373.550641] ? SyS_read+0x230/0x230 [ 373.554733] ? do_syscall_64+0x53/0x640 [ 373.558715] ? SyS_read+0x230/0x230 [ 373.562335] do_syscall_64+0x1e8/0x640 [ 373.566242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.571081] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 373.576257] RIP: 0033:0x45b349 [ 373.579436] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 373.588172] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 373.595426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 373.602691] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 373.609945] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 373.617207] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 373.624481] CPU: 0 PID: 13887 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 373.632382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.641742] Call Trace: [ 373.644334] dump_stack+0x142/0x197 [ 373.647969] should_fail.cold+0x10f/0x159 [ 373.652248] ? kasan_unpoison_shadow+0x35/0x50 [ 373.656841] should_failslab+0xdb/0x130 [ 373.660810] __kmalloc+0x71/0x7a0 [ 373.664258] ? __tty_buffer_request_room+0x1a4/0x500 [ 373.669347] __tty_buffer_request_room+0x1a4/0x500 [ 373.674266] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 373.679803] pty_write+0x113/0x1d0 [ 373.683329] ? pty_unthrottle+0x50/0x50 [ 373.687291] n_hdlc_send_frames+0x238/0x3e0 [ 373.691628] n_hdlc_tty_write+0x504/0x5f0 [ 373.695765] ? n_hdlc_tty_poll+0x310/0x310 [ 373.699985] ? _copy_from_user+0xb7/0x110 [ 373.704122] ? check_memory_region+0x8f/0x190 [ 373.708601] ? wake_up_q+0xf0/0xf0 [ 373.712129] ? kasan_check_write+0x14/0x20 [ 373.716361] ? _copy_from_user+0x99/0x110 [ 373.720495] tty_write+0x3f6/0x700 [ 373.724022] ? n_hdlc_tty_poll+0x310/0x310 [ 373.728271] __vfs_write+0x105/0x6b0 [ 373.731971] ? tty_read+0x270/0x270 [ 373.735579] ? kernel_read+0x120/0x120 [ 373.739479] ? __inode_security_revalidate+0xd6/0x130 [ 373.744684] ? avc_policy_seqno+0x9/0x20 [ 373.748751] ? selinux_file_permission+0x85/0x480 [ 373.753606] ? security_file_permission+0x89/0x1f0 [ 373.758532] ? rw_verify_area+0xea/0x2b0 [ 373.762587] vfs_write+0x198/0x500 [ 373.766129] SyS_write+0xfd/0x230 [ 373.769569] ? SyS_read+0x230/0x230 [ 373.773190] ? SyS_read+0x230/0x230 [ 373.776916] do_syscall_64+0x1e8/0x640 [ 373.780795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.785674] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 373.790863] RIP: 0033:0x45b349 [ 373.794040] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 373.801742] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 373.809012] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 373.816267] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:25:34 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8880, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x4) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000100)={r7, @in={{0x2, 0x4e22, @remote}}}, 0x84) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) write$selinux_load(r0, 0x0, 0x0) [ 373.823519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 373.830783] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000005 [ 373.838853] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 373.854480] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 373.860953] CPU: 0 PID: 13856 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 373.868858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.878244] Call Trace: [ 373.880836] dump_stack+0x142/0x197 [ 373.884468] warn_alloc.cold+0x96/0x1af [ 373.888445] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 373.893295] ? lock_downgrade+0x740/0x740 [ 373.897445] ? avc_has_perm+0x2df/0x4b0 [ 373.901428] __vmalloc_node_range+0x3c3/0x6a0 [ 373.905981] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 373.911010] vmalloc+0x46/0x50 [ 373.914199] ? sel_write_load+0x1a0/0x1050 [ 373.918467] sel_write_load+0x1a0/0x1050 [ 373.922529] ? perf_trace_lock+0x500/0x500 [ 373.926776] ? sel_read_bool+0x240/0x240 [ 373.930844] ? trace_hardirqs_on+0x10/0x10 [ 373.935081] ? debug_smp_processor_id+0x1c/0x20 [ 373.939750] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 373.944686] __vfs_write+0x105/0x6b0 [ 373.948400] ? sel_read_bool+0x240/0x240 [ 373.952459] ? kernel_read+0x120/0x120 [ 373.956355] ? lock_acquire+0x16f/0x430 [ 373.961283] ? vfs_write+0x3af/0x500 [ 373.965005] ? check_preemption_disabled+0x3c/0x250 [ 373.970028] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 373.974721] ? __sb_start_write+0x153/0x2f0 [ 373.979035] vfs_write+0x198/0x500 [ 373.982566] SyS_write+0xfd/0x230 [ 373.986010] ? SyS_read+0x230/0x230 [ 373.989720] ? SyS_read+0x230/0x230 [ 373.993408] do_syscall_64+0x1e8/0x640 [ 373.997285] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 374.002114] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 374.007283] RIP: 0033:0x45b349 [ 374.010456] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 374.018146] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 374.025396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 374.032663] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 374.039930] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 374.047187] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 374.055236] warn_alloc_show_mem: 1 callbacks suppressed [ 374.055240] Mem-Info: [ 374.063232] active_anon:217604 inactive_anon:202 isolated_anon:0 03:25:34 executing program 4 (fault-call:5 fault-nth:6): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 374.063232] active_file:8314 inactive_file:12191 isolated_file:0 [ 374.063232] unevictable:0 dirty:272 writeback:0 unstable:0 [ 374.063232] slab_reclaimable:13012 slab_unreclaimable:116871 [ 374.063232] mapped:60580 shmem:250 pagetables:1461 bounce:0 [ 374.063232] free:1163535 free_pcp:214 free_cma:0 [ 374.104821] Node 0 active_anon:868316kB inactive_anon:800kB active_file:33116kB inactive_file:48780kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242320kB dirty:1088kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 315392kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 374.134168] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 374.160150] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 374.185698] FAULT_INJECTION: forcing a failure. [ 374.185698] name failslab, interval 1, probability 0, space 0, times 0 [ 374.187064] lowmem_reserve[]: [ 374.197920] CPU: 1 PID: 13897 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 374.197928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.197931] Call Trace: [ 374.197952] dump_stack+0x142/0x197 [ 374.197968] should_fail.cold+0x10f/0x159 [ 374.197982] should_failslab+0xdb/0x130 [ 374.197989] __kmalloc+0x71/0x7a0 [ 374.198001] ? __tty_buffer_request_room+0x1a4/0x500 [ 374.198013] __tty_buffer_request_room+0x1a4/0x500 [ 374.201232] 0 [ 374.209027] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 374.209043] pty_write+0x113/0x1d0 [ 374.209053] ? pty_unthrottle+0x50/0x50 [ 374.209067] n_hdlc_send_frames+0x238/0x3e0 [ 374.218583] 2569 [ 374.221035] n_hdlc_tty_write+0x504/0x5f0 03:25:34 executing program 4 (fault-call:5 fault-nth:7): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 374.221048] ? n_hdlc_tty_poll+0x310/0x310 [ 374.221060] ? wake_up_q+0xf0/0xf0 [ 374.221071] ? _copy_from_user+0x99/0x110 [ 374.221083] tty_write+0x3f6/0x700 [ 374.224784] 2569 [ 374.228858] ? n_hdlc_tty_poll+0x310/0x310 [ 374.228870] __vfs_write+0x105/0x6b0 [ 374.228883] ? tty_read+0x270/0x270 [ 374.232934] 2569 [ 374.236294] ? kernel_read+0x120/0x120 [ 374.236306] ? __inode_security_revalidate+0xd6/0x130 [ 374.236314] ? avc_policy_seqno+0x9/0x20 [ 374.236323] ? selinux_file_permission+0x85/0x480 [ 374.236337] ? security_file_permission+0x89/0x1f0 [ 374.241680] 2569 [ 374.246389] ? rw_verify_area+0xea/0x2b0 [ 374.246403] vfs_write+0x198/0x500 [ 374.253856] SyS_write+0xfd/0x230 [ 374.253867] ? SyS_read+0x230/0x230 [ 374.253875] ? SyS_read+0x230/0x230 [ 374.253886] do_syscall_64+0x1e8/0x640 [ 374.253894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 374.253907] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 374.253914] RIP: 0033:0x45b349 [ 374.253918] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 374.257574] Node 0 [ 374.261537] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 374.261542] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 374.261547] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 374.261551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 374.261555] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000006 [ 374.315084] FAULT_INJECTION: forcing a failure. [ 374.315084] name failslab, interval 1, probability 0, space 0, times 0 [ 374.326859] DMA32 free:856748kB min:36380kB low:45472kB high:54564kB active_anon:870496kB inactive_anon:800kB active_file:33116kB inactive_file:48780kB unevictable:0kB writepending:1088kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7904kB pagetables:5728kB bounce:0kB free_pcp:748kB local_pcp:244kB free_cma:0kB [ 374.328576] CPU: 1 PID: 13901 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 374.330766] lowmem_reserve[]: [ 374.334761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.338282] 0 03:25:35 executing program 4 (fault-call:5 fault-nth:8): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 374.341716] Call Trace: [ 374.341740] dump_stack+0x142/0x197 [ 374.341753] should_fail.cold+0x10f/0x159 [ 374.341763] ? kasan_unpoison_shadow+0x35/0x50 [ 374.341776] should_failslab+0xdb/0x130 [ 374.341784] __kmalloc+0x71/0x7a0 [ 374.341796] ? __tty_buffer_request_room+0x1a4/0x500 [ 374.341806] __tty_buffer_request_room+0x1a4/0x500 [ 374.341818] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 374.345721] 0 [ 374.349134] pty_write+0x113/0x1d0 [ 374.353041] 0 [ 374.357827] ? pty_unthrottle+0x50/0x50 [ 374.363023] 0 [ 374.366183] n_hdlc_send_frames+0x238/0x3e0 [ 374.373891] 0 [ 374.376092] n_hdlc_tty_write+0x504/0x5f0 [ 374.390598] ? n_hdlc_tty_poll+0x310/0x310 [ 374.390611] ? wake_up_q+0xf0/0xf0 [ 374.390624] ? _copy_from_user+0x99/0x110 [ 374.397869] Node 0 [ 374.405136] tty_write+0x3f6/0x700 [ 374.405148] ? n_hdlc_tty_poll+0x310/0x310 [ 374.405158] __vfs_write+0x105/0x6b0 [ 374.405165] ? tty_read+0x270/0x270 [ 374.405174] ? kernel_read+0x120/0x120 [ 374.413172] Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 374.423614] ? __inode_security_revalidate+0xd6/0x130 [ 374.423623] ? avc_policy_seqno+0x9/0x20 [ 374.423631] ? selinux_file_permission+0x85/0x480 [ 374.423644] ? security_file_permission+0x89/0x1f0 [ 374.454013] lowmem_reserve[]: [ 374.460580] ? rw_verify_area+0xea/0x2b0 [ 374.460590] vfs_write+0x198/0x500 [ 374.460599] SyS_write+0xfd/0x230 [ 374.460607] ? SyS_read+0x230/0x230 [ 374.460616] ? SyS_read+0x230/0x230 [ 374.485020] 0 [ 374.485315] do_syscall_64+0x1e8/0x640 [ 374.489877] 0 [ 374.493856] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 374.493872] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 374.493878] RIP: 0033:0x45b349 [ 374.493883] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 374.493892] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 374.493897] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 374.493901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 374.493906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 374.493910] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000007 [ 374.538165] FAULT_INJECTION: forcing a failure. [ 374.538165] name failslab, interval 1, probability 0, space 0, times 0 [ 374.544986] 0 [ 374.548631] CPU: 1 PID: 13904 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 374.548638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.548644] Call Trace: [ 374.550949] 0 [ 374.554404] dump_stack+0x142/0x197 [ 374.554419] should_fail.cold+0x10f/0x159 [ 374.558769] 0 [ 374.562457] ? kasan_unpoison_shadow+0x35/0x50 [ 374.562470] should_failslab+0xdb/0x130 [ 374.562479] __kmalloc+0x71/0x7a0 [ 374.562491] ? __tty_buffer_request_room+0x1a4/0x500 [ 374.562502] __tty_buffer_request_room+0x1a4/0x500 [ 374.562516] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 374.569993] pty_write+0x113/0x1d0 [ 374.570007] ? pty_unthrottle+0x50/0x50 [ 374.603585] Node 1 [ 374.603895] n_hdlc_send_frames+0x238/0x3e0 [ 374.608784] Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 374.613639] n_hdlc_tty_write+0x504/0x5f0 [ 374.613651] ? n_hdlc_tty_poll+0x310/0x310 [ 374.613664] ? wake_up_q+0xf0/0xf0 [ 374.613675] ? _copy_from_user+0x99/0x110 [ 374.613686] tty_write+0x3f6/0x700 [ 374.613697] ? n_hdlc_tty_poll+0x310/0x310 [ 374.616808] lowmem_reserve[]: [ 374.620840] __vfs_write+0x105/0x6b0 [ 374.620849] ? tty_read+0x270/0x270 [ 374.620857] ? kernel_read+0x120/0x120 [ 374.620867] ? __inode_security_revalidate+0xd6/0x130 [ 374.620876] ? avc_policy_seqno+0x9/0x20 [ 374.620886] ? selinux_file_permission+0x85/0x480 [ 374.625271] 0 [ 374.628540] ? security_file_permission+0x89/0x1f0 [ 374.628551] ? rw_verify_area+0xea/0x2b0 [ 374.632220] 0 [ 374.635773] vfs_write+0x198/0x500 [ 374.635784] SyS_write+0xfd/0x230 [ 374.637585] 0 [ 374.641442] ? SyS_read+0x230/0x230 [ 374.641450] ? SyS_read+0x230/0x230 [ 374.641462] do_syscall_64+0x1e8/0x640 [ 374.641470] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 374.641483] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 374.641489] RIP: 0033:0x45b349 [ 374.641493] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 374.641503] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 374.641508] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 374.641512] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 374.641517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 374.641522] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000008 [ 374.958646] 0 0 [ 374.960803] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 374.974542] Node 0 DMA32: 2171*4kB (UME) 1398*8kB (UME) 779*16kB (UME) 578*32kB (UME) 531*64kB (UME) 41*128kB (M) 3*256kB (UM) 0*512kB 3*1024kB (ME) 2*2048kB (M) 186*4096kB (M) = 859852kB [ 374.991537] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 375.002287] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 375.020712] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 375.029569] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 375.038192] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 375.047694] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 375.056327] 20758 total pagecache pages [ 375.060377] 0 pages in swap cache [ 375.063821] Swap cache stats: add 0, delete 0, find 0/0 [ 375.069178] Free swap = 0kB [ 375.072229] Total swap = 0kB [ 375.075258] 1965979 pages RAM 03:25:35 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000080)) 03:25:35 executing program 4 (fault-call:5 fault-nth:9): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 375.078341] 0 pages HighMem/MovableOnly [ 375.082336] 335869 pages reserved [ 375.085793] 0 pages cma reserved [ 375.089553] SELinux: policydb magic number 0xf97cff8d does not match expected magic number 0xf97cff8c [ 375.099983] sel_write_load: 29 callbacks suppressed [ 375.099986] SELinux: failed to load policy [ 375.117910] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 375.133767] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 375.138321] FAULT_INJECTION: forcing a failure. [ 375.138321] name failslab, interval 1, probability 0, space 0, times 0 [ 375.139241] CPU: 1 PID: 13867 Comm: syz-executor.3 Not tainted 4.14.166-syzkaller #0 [ 375.158263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.167752] Call Trace: [ 375.170335] dump_stack+0x142/0x197 [ 375.173946] warn_alloc.cold+0x96/0x1af [ 375.177904] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 375.183288] ? lock_downgrade+0x740/0x740 [ 375.187424] ? avc_has_perm+0x2df/0x4b0 [ 375.191383] __vmalloc_node_range+0x3c3/0x6a0 [ 375.195870] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 375.200870] vmalloc+0x46/0x50 [ 375.204054] ? sel_write_load+0x1a0/0x1050 [ 375.208270] sel_write_load+0x1a0/0x1050 [ 375.212410] ? perf_trace_lock+0x500/0x500 [ 375.216625] ? kasan_check_read+0x11/0x20 [ 375.220758] ? _copy_to_user+0x87/0xd0 [ 375.224629] ? sel_read_bool+0x240/0x240 [ 375.228672] ? trace_hardirqs_on+0x10/0x10 [ 375.232888] ? debug_smp_processor_id+0x1c/0x20 [ 375.237537] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 375.242451] __vfs_write+0x105/0x6b0 [ 375.246165] ? sel_read_bool+0x240/0x240 [ 375.250209] ? kernel_read+0x120/0x120 [ 375.254083] ? lock_acquire+0x16f/0x430 [ 375.258039] ? vfs_write+0x3af/0x500 [ 375.261741] ? check_preemption_disabled+0x3c/0x250 [ 375.266746] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 375.271407] ? __sb_start_write+0x153/0x2f0 [ 375.275713] vfs_write+0x198/0x500 [ 375.279238] SyS_write+0xfd/0x230 [ 375.282676] ? SyS_read+0x230/0x230 [ 375.286308] ? SyS_ioctl+0x67/0xc0 [ 375.289831] ? SyS_read+0x230/0x230 [ 375.293444] do_syscall_64+0x1e8/0x640 [ 375.297316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 375.302158] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 375.307329] RIP: 0033:0x45b349 [ 375.310502] RSP: 002b:00007f1a0cb1cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 375.318194] RAX: ffffffffffffffda RBX: 00007f1a0cb1d6d4 RCX: 000000000045b349 [ 375.325446] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 375.332700] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 375.339952] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 375.347205] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 375.354486] CPU: 0 PID: 13913 Comm: syz-executor.4 Not tainted 4.14.166-syzkaller #0 [ 375.355150] Mem-Info: [ 375.362371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.362375] Call Trace: [ 375.362393] dump_stack+0x142/0x197 [ 375.362404] should_fail.cold+0x10f/0x159 [ 375.362416] ? kasan_unpoison_shadow+0x35/0x50 [ 375.366220] active_anon:217618 inactive_anon:198 isolated_anon:0 [ 375.366220] active_file:8314 inactive_file:12208 isolated_file:0 [ 375.366220] unevictable:0 dirty:286 writeback:0 unstable:0 [ 375.366220] slab_reclaimable:13013 slab_unreclaimable:116227 [ 375.366220] mapped:60584 shmem:250 pagetables:1464 bounce:0 [ 375.366220] free:1164248 free_pcp:156 free_cma:0 [ 375.374167] should_failslab+0xdb/0x130 [ 375.374175] __kmalloc+0x71/0x7a0 [ 375.374187] ? __tty_buffer_request_room+0x1a4/0x500 [ 375.374198] __tty_buffer_request_room+0x1a4/0x500 [ 375.376828] Node 0 active_anon:870472kB inactive_anon:792kB active_file:33116kB inactive_file:48832kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242336kB dirty:1140kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 317440kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 375.380390] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 375.380403] pty_write+0x113/0x1d0 [ 375.380410] ? pty_unthrottle+0x50/0x50 [ 375.380421] n_hdlc_send_frames+0x238/0x3e0 [ 375.384604] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 375.389126] n_hdlc_tty_write+0x504/0x5f0 [ 375.389150] ? n_hdlc_tty_poll+0x310/0x310 [ 375.423063] Node 0 [ 375.426942] ? wake_up_q+0xf0/0xf0 [ 375.426953] ? kasan_check_write+0x14/0x20 [ 375.426965] ? _copy_from_user+0x99/0x110 [ 375.430464] DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 375.435506] tty_write+0x3f6/0x700 [ 375.435522] ? n_hdlc_tty_poll+0x310/0x310 [ 375.440483] lowmem_reserve[]: [ 375.468703] __vfs_write+0x105/0x6b0 [ 375.468714] ? tty_read+0x270/0x270 [ 375.468721] ? kernel_read+0x120/0x120 [ 375.468731] ? __inode_security_revalidate+0xd6/0x130 [ 375.468741] ? avc_policy_seqno+0x9/0x20 [ 375.474347] 0 [ 375.477819] ? selinux_file_permission+0x85/0x480 [ 375.477831] ? security_file_permission+0x89/0x1f0 [ 375.477841] ? rw_verify_area+0xea/0x2b0 [ 375.481847] 2569 [ 375.486105] vfs_write+0x198/0x500 [ 375.486116] SyS_write+0xfd/0x230 [ 375.486126] ? SyS_read+0x230/0x230 [ 375.512144] 2569 [ 375.516157] ? SyS_read+0x230/0x230 [ 375.516169] do_syscall_64+0x1e8/0x640 [ 375.516182] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 375.520669] 2569 [ 375.522838] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 375.522845] RIP: 0033:0x45b349 [ 375.522852] RSP: 002b:00007f424e43dc78 EFLAGS: 00000246 [ 375.526412] 2569 [ 375.530681] ORIG_RAX: 0000000000000001 [ 375.530687] RAX: ffffffffffffffda RBX: 00007f424e43e6d4 RCX: 000000000045b349 [ 375.530692] RDX: 00000000fffffe00 RSI: 0000000020000040 RDI: 0000000000000004 [ 375.530697] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 375.530701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 375.530706] R13: 0000000000000be9 R14: 00000000004c8999 R15: 0000000000000009 [ 375.693855] Node 0 DMA32 free:860968kB min:36380kB low:45472kB high:54564kB active_anon:868348kB inactive_anon:792kB active_file:33116kB inactive_file:48864kB unevictable:0kB writepending:1172kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7680kB pagetables:5752kB bounce:0kB free_pcp:860kB local_pcp:432kB free_cma:0kB [ 375.693877] lowmem_reserve[]: 0 0 0 0 0 [ 375.693892] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 375.693910] lowmem_reserve[]: 0 0 0 0 0 [ 375.693926] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 375.693944] lowmem_reserve[]: 0 0 0 0 0 [ 375.693959] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 375.803268] Node 0 DMA32: 2138*4kB (UME) 1571*8kB (UME) 757*16kB (UME) 586*32kB (UME) 531*64kB (UME) 42*128kB (UM) 2*256kB (M) 0*512kB 3*1024kB (ME) 2*2048kB (M) 186*4096kB (M) = 860880kB [ 375.820555] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 375.831357] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 375.849235] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 375.858167] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 375.866801] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 375.875694] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 375.884388] 20780 total pagecache pages [ 375.888351] 0 pages in swap cache [ 375.891843] Swap cache stats: add 0, delete 0, find 0/0 [ 375.898392] Free swap = 0kB [ 375.901452] Total swap = 0kB [ 375.904466] 1965979 pages RAM [ 375.907655] 0 pages HighMem/MovableOnly [ 375.911662] 335869 pages reserved [ 375.915125] 0 pages cma reserved [ 375.918862] SELinux: policydb magic number 0xf97cff8d does not match expected magic number 0xf97cff8c [ 375.929249] SELinux: failed to load policy 03:25:36 executing program 4 (fault-call:5 fault-nth:10): perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) 03:25:36 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x15000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r2 = dup3(0xffffffffffffffff, r1, 0x80000) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) r6 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r8 = dup2(r7, r6) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r8, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$KDGETKEYCODE(r8, 0x4b4c, &(0x7f0000000200)={0x0, 0x6}) r9 = accept4$alg(r5, 0x0, 0x0, 0xc00) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r9, 0x8982, &(0x7f00000001c0)) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, 0x0, 0x40004) r10 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r11 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r12 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r12, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) flock(r12, 0x0) r13 = dup2(r11, r10) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r13, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$VIDIOC_G_EXT_CTRLS(r13, 0xc0205647, &(0x7f00000000c0)={0x9d0000, 0x800, 0x588c, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0xa2090b, 0x2, [], @p_u8=&(0x7f0000000040)=0xff}}) write$eventfd(r14, &(0x7f0000000100)=0x1, 0x8) [ 375.933612] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 375.946379] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 375.953278] CPU: 1 PID: 13871 Comm: syz-executor.3 Not tainted 4.14.166-syzkaller #0 [ 375.961190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.970554] Call Trace: [ 375.973151] dump_stack+0x142/0x197 [ 375.976915] warn_alloc.cold+0x96/0x1af [ 375.980916] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 375.985875] ? lock_downgrade+0x740/0x740 [ 375.990182] ? avc_has_perm+0x2df/0x4b0 [ 375.994315] __vmalloc_node_range+0x3c3/0x6a0 [ 375.998834] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 376.003861] vmalloc+0x46/0x50 [ 376.007054] ? sel_write_load+0x1a0/0x1050 [ 376.011344] sel_write_load+0x1a0/0x1050 [ 376.015408] ? perf_trace_lock+0x500/0x500 [ 376.019646] ? kasan_check_read+0x11/0x20 [ 376.023793] ? _copy_to_user+0x87/0xd0 [ 376.027848] ? sel_read_bool+0x240/0x240 [ 376.031914] ? trace_hardirqs_on+0x10/0x10 [ 376.036138] ? debug_smp_processor_id+0x1c/0x20 [ 376.040895] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 376.045871] __vfs_write+0x105/0x6b0 [ 376.049583] ? sel_read_bool+0x240/0x240 [ 376.053684] ? kernel_read+0x120/0x120 [ 376.057568] ? lock_acquire+0x16f/0x430 [ 376.061541] ? vfs_write+0x3af/0x500 [ 376.065393] ? check_preemption_disabled+0x3c/0x250 [ 376.070447] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 376.075103] ? __sb_start_write+0x153/0x2f0 [ 376.079412] vfs_write+0x198/0x500 [ 376.083036] SyS_write+0xfd/0x230 [ 376.086472] ? SyS_read+0x230/0x230 [ 376.090084] ? SyS_ioctl+0x67/0xc0 [ 376.094003] ? SyS_read+0x230/0x230 [ 376.097872] do_syscall_64+0x1e8/0x640 [ 376.101743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.106598] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.111773] RIP: 0033:0x45b349 [ 376.114949] RSP: 002b:00007f1a0cafbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.122645] RAX: ffffffffffffffda RBX: 00007f1a0cafc6d4 RCX: 000000000045b349 [ 376.129918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 376.137180] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 376.144492] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 376.151753] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bfd4 [ 376.160153] Mem-Info: [ 376.162755] active_anon:217076 inactive_anon:198 isolated_anon:0 [ 376.162755] active_file:8314 inactive_file:12218 isolated_file:0 [ 376.162755] unevictable:0 dirty:298 writeback:0 unstable:0 [ 376.162755] slab_reclaimable:13014 slab_unreclaimable:116094 [ 376.162755] mapped:60580 shmem:250 pagetables:1446 bounce:0 [ 376.162755] free:1164822 free_pcp:189 free_cma:0 [ 376.196800] Node 0 active_anon:868352kB inactive_anon:800kB active_file:33116kB inactive_file:48884kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242320kB dirty:1200kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 315392kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 376.225398] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 376.251355] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 376.277551] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 376.282647] Node 0 DMA32 free:860484kB min:36380kB low:45472kB high:54564kB active_anon:868352kB inactive_anon:800kB active_file:33116kB inactive_file:48884kB unevictable:0kB writepending:1204kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:7776kB pagetables:5728kB bounce:0kB free_pcp:1116kB local_pcp:468kB free_cma:0kB [ 376.312688] lowmem_reserve[]: 0 0 0 0 0 [ 376.316916] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 376.342209] lowmem_reserve[]: 0 0 0 0 0 [ 376.346207] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 376.374009] lowmem_reserve[]: 0 0 0 0 0 [ 376.378001] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 376.391632] Node 0 DMA32: 2138*4kB (UME) 1487*8kB (UME) 788*16kB (UME) 585*32kB (UME) 532*64kB (UME) 41*128kB (M) 2*256kB (M) 0*512kB 3*1024kB (ME) 2*2048kB (M) 186*4096kB (M) = 860608kB [ 376.408741] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 376.419514] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 376.437476] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 376.446382] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 376.455005] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 376.464065] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 376.472796] 20787 total pagecache pages [ 376.476814] 0 pages in swap cache [ 376.480415] Swap cache stats: add 0, delete 0, find 0/0 [ 376.485779] Free swap = 0kB 03:25:37 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x8001, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000080), 0x4) write$selinux_load(r1, 0x0, 0x0) 03:25:37 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7ff}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xec, 0x400000) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @empty}, 0x124, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000080)='geneve1\x00', 0x1000, 0x8, 0x100}) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 376.488781] Total swap = 0kB [ 376.491838] 1965979 pages RAM [ 376.495374] 0 pages HighMem/MovableOnly [ 376.499404] 335869 pages reserved [ 376.502888] 0 pages cma reserved [ 376.506284] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 376.531913] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 376.537486] CPU: 0 PID: 13889 Comm: syz-executor.1 Not tainted 4.14.166-syzkaller #0 [ 376.545390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.554754] Call Trace: [ 376.557362] dump_stack+0x142/0x197 [ 376.561007] warn_alloc.cold+0x96/0x1af [ 376.564990] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 376.569957] ? lock_downgrade+0x740/0x740 [ 376.574124] ? avc_has_perm+0x2df/0x4b0 [ 376.578095] __vmalloc_node_range+0x3c3/0x6a0 [ 376.582589] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 376.587609] vmalloc+0x46/0x50 [ 376.590795] ? sel_write_load+0x1a0/0x1050 [ 376.595337] sel_write_load+0x1a0/0x1050 [ 376.599387] ? perf_trace_lock+0x500/0x500 [ 376.603623] ? sel_read_bool+0x240/0x240 [ 376.607674] ? trace_hardirqs_on+0x10/0x10 [ 376.611907] ? debug_smp_processor_id+0x1c/0x20 [ 376.616579] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 376.621528] __vfs_write+0x105/0x6b0 [ 376.625430] ? sel_read_bool+0x240/0x240 [ 376.629493] ? kernel_read+0x120/0x120 [ 376.633373] ? lock_acquire+0x16f/0x430 [ 376.637339] ? vfs_write+0x3af/0x500 [ 376.641044] ? check_preemption_disabled+0x3c/0x250 [ 376.646053] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 376.650885] ? __sb_start_write+0x153/0x2f0 [ 376.655248] vfs_write+0x198/0x500 [ 376.658889] SyS_write+0xfd/0x230 [ 376.662349] ? SyS_read+0x230/0x230 [ 376.665974] ? SyS_read+0x230/0x230 [ 376.669611] do_syscall_64+0x1e8/0x640 [ 376.673495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.678513] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.683878] RIP: 0033:0x45b349 [ 376.687140] RSP: 002b:00007ff77f034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.694840] RAX: ffffffffffffffda RBX: 00007ff77f0356d4 RCX: 000000000045b349 [ 376.702180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 376.709503] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 376.716773] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 376.724070] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bfd4 03:25:37 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:37 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x6000, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x7) memfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x0, 0x8, 0x4, 0x4, 0x3e417f17, {r2, r3/1000+30000}, {0x5, 0x2, 0x5, 0x1, 0x1, 0xfb, "f990b50b"}, 0x81, 0x3, @fd, 0x486a, 0x0, r0}) ioctl$TIOCL_SCROLLCONSOLE(r4, 0x541c, &(0x7f0000000100)={0xd, 0xd36}) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 376.735535] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 376.750502] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 376.760686] CPU: 1 PID: 13894 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 376.768629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.777994] Call Trace: [ 376.780600] dump_stack+0x142/0x197 [ 376.784234] warn_alloc.cold+0x96/0x1af 03:25:37 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x80000000, 0x5, &(0x7f0000000440)=[{&(0x7f00000000c0)="a2cefd800b87c7a6f45aa7dc7d526d5f22b3f346e1461dc55a8d32bcedc9a38fed5f0163adb09abbe53687b798ba3d3fbfca7196764f7964688c9870dc91da66f6a73e64b850397fced1515424dfb1f5ff29486136328c3baf64a441bfebfad6708433006d54bff23464f5df34cb2c25e6a509e5ff78d23643d0b5c6a474cbce63f26ee77644207b8681b58069849ee52506038e562f9352f9d36ff8929c5d8708a01ccb233ec1f8", 0xa8, 0xc7d5}, {&(0x7f0000000180)="7da6d49b0c21fc7ae8ef11140de75e70a0bbce9268e6e9edb8688ba15b87c3f7a0d9be87554e0c08ed109872e57cd25d7a603cf90dcf5ae1db93592b45657e9f3840af8dd449af888ab6a0e281b237de8d09904595081d42432d3562f91ec323d3f5b0d637e4a9004a4112a89aad3a103e918fdc39f37bcaaa20ccb1ba7dc93707c92fe426cb22f32091838fd99d3b4529f19492fc57ee1533c3df27962190bbbe9f13b3f51ecf94257ae6f8791c464bb76992714afa88e96a24d4a53cc431b513e3b8c169", 0xc5}, {&(0x7f0000000280)="87d474660c577984b180a59ad50b0828b1fbdc946d591a302b65f0b691c41b99a5cd16bd45a655901a4c8d8ad06f101add204ea963f4d131af19f768cd", 0x3d, 0x80000001}, {&(0x7f00000002c0)="af51077a3141f747ce94dfd7e6c3b3d5de9dd4c5577e28469f3462223a8033281737789941741d1bd1bc852bf07f12c631c67a2e05edf19121e4d2e2fca9aea0626cda302e98368e590b2d6b0e60f10fbbb05ee1d8d736b6a7", 0x59, 0x800}, {&(0x7f0000000340)="ec0de0637629b41f48e2d379270d23da39974b6a452eb6af74bdbb5abcf9788e58d8ffe71fffb029112e719cbd31831688a65746f66e8c87ca641e10c74666baa84fc5ac1178e8461b2d108d2dfe8657cbd82d45d733c864929bc59463c37e73a7a03fc2848ed951fd52460add5bd0ddec3e19167766e56e1f5839404dbe939afefcb645da70761098cf1677f47833913f7ef1cf49bb6ae78b61534e17b8b4c465130fd69d99bed875829b1c9c692ce694d730f8e56c139df8d145cd39f7f55923567ad8e7ace584596825c8d663bb6a304c093a06b97959c52548bba250872a", 0xe0, 0x1ff}], 0x1002000, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6f64656c616c6c6f632c6175746f5f64615f616c6c6f632c6572726f72733d72656d6f756e742d726f2c6e6f722c6e6f6a6f75726e616c5f636865636b73756d2c62736467726f7570732c726f6f74636f6e746578743d756e636f6e66000000000a000000000000000000001b3f4dd9640631a9937827fe9e59fc15f35cf49b6b874cd80761899ec0e231dc490dff9b742bd086a68d88f206771d9e9e525010ed232082f4553d4f1ebddabf4b46a3d7"]) write$selinux_load(r0, 0x0, 0x0) 03:25:37 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x800) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = dup2(r1, r2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) 03:25:37 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8cffb072631d6bf27cd90800000053ff"], 0x10) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000040)=0x9, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r6, 0x84, 0x4, &(0x7f0000000080)=0x646, 0x4) [ 376.788218] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 376.793071] ? lock_downgrade+0x740/0x740 [ 376.797232] ? avc_has_perm+0x2df/0x4b0 [ 376.801225] __vmalloc_node_range+0x3c3/0x6a0 [ 376.805759] ? drop_futex_key_refs.isra.0+0x56/0xb0 03:25:37 executing program 2: write$selinux_load(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) 03:25:37 executing program 3: setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) dup2(r0, r1) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$KVM_ASSIGN_DEV_IRQ(r5, 0x4040ae70, &(0x7f0000000040)={0x3, 0x8}) write$selinux_load(r2, 0x0, 0x0) [ 376.805775] vmalloc+0x46/0x50 [ 376.805785] ? sel_write_load+0x1a0/0x1050 [ 376.805792] sel_write_load+0x1a0/0x1050 [ 376.805802] ? perf_trace_lock+0x500/0x500 [ 376.805811] ? trace_hardirqs_on+0x10/0x10 [ 376.805821] ? sel_read_bool+0x240/0x240 [ 376.805830] ? trace_hardirqs_on+0x10/0x10 [ 376.805840] ? debug_smp_processor_id+0x1c/0x20 [ 376.805849] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 376.805859] __vfs_write+0x105/0x6b0 [ 376.805868] ? sel_read_bool+0x240/0x240 [ 376.805877] ? kernel_read+0x120/0x120 [ 376.805887] ? lock_acquire+0x16f/0x430 03:25:37 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000500000007000000"}, 0x20) write$selinux_load(r0, 0x0, 0x0) 03:25:37 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) [ 376.805894] ? vfs_write+0x3af/0x500 [ 376.805902] ? check_preemption_disabled+0x3c/0x250 [ 376.805915] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 376.805924] ? __sb_start_write+0x153/0x2f0 [ 376.805933] vfs_write+0x198/0x500 [ 376.805943] SyS_write+0xfd/0x230 [ 376.805952] ? SyS_read+0x230/0x230 [ 376.805962] ? SyS_ioctl+0x67/0xc0 [ 376.805969] ? SyS_read+0x230/0x230 [ 376.805980] do_syscall_64+0x1e8/0x640 [ 376.805989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.806001] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.806008] RIP: 0033:0x45b349 [ 376.806013] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.806022] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 376.806027] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 376.806031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.806036] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 376.806041] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 376.820064] syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 376.820088] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 376.820111] CPU: 0 PID: 13914 Comm: syz-executor.2 Not tainted 4.14.166-syzkaller #0 [ 376.820117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.820121] Call Trace: [ 376.820138] dump_stack+0x142/0x197 [ 376.820152] warn_alloc.cold+0x96/0x1af [ 376.820162] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 376.820174] ? lock_downgrade+0x740/0x740 [ 376.820187] ? avc_has_perm+0x2df/0x4b0 [ 376.820199] __vmalloc_node_range+0x3c3/0x6a0 [ 376.820209] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 376.820221] vmalloc+0x46/0x50 [ 376.820229] ? sel_write_load+0x1a0/0x1050 [ 376.820235] sel_write_load+0x1a0/0x1050 [ 376.820242] ? perf_trace_lock+0x500/0x500 [ 376.820251] ? sel_read_bool+0x240/0x240 [ 376.820259] ? trace_hardirqs_on+0x10/0x10 [ 376.820267] ? debug_smp_processor_id+0x1c/0x20 [ 376.820274] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 376.820281] __vfs_write+0x105/0x6b0 [ 376.820288] ? sel_read_bool+0x240/0x240 [ 376.820294] ? kernel_read+0x120/0x120 [ 376.820302] ? lock_acquire+0x16f/0x430 [ 376.820308] ? vfs_write+0x3af/0x500 [ 376.820314] ? check_preemption_disabled+0x3c/0x250 [ 376.820324] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 376.820331] ? __sb_start_write+0x153/0x2f0 [ 376.820337] vfs_write+0x198/0x500 [ 376.820345] SyS_write+0xfd/0x230 [ 376.820352] ? SyS_read+0x230/0x230 [ 376.820359] ? SyS_read+0x230/0x230 [ 376.820367] do_syscall_64+0x1e8/0x640 [ 376.820374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.820384] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.820390] RIP: 0033:0x45b349 [ 376.820393] RSP: 002b:00007fd6569fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.820403] RAX: ffffffffffffffda RBX: 00007fd6569fd6d4 RCX: 000000000045b349 [ 376.820408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 376.820412] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.820417] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 376.820423] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 376.825146] SELinux: failed to load policy [ 376.825553] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 376.825697] SELinux: failed to load policy [ 376.826005] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 376.826144] SELinux: failed to load policy [ 376.826176] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 376.826195] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 376.826217] CPU: 1 PID: 13932 Comm: syz-executor.3 Not tainted 4.14.166-syzkaller #0 [ 376.826223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.826226] Call Trace: [ 376.826243] dump_stack+0x142/0x197 [ 376.826260] warn_alloc.cold+0x96/0x1af [ 376.826269] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 376.826282] ? lock_downgrade+0x740/0x740 [ 376.826296] ? avc_has_perm+0x2df/0x4b0 [ 376.826309] __vmalloc_node_range+0x3c3/0x6a0 [ 376.826320] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 376.826331] vmalloc+0x46/0x50 [ 376.826341] ? sel_write_load+0x1a0/0x1050 [ 376.826349] sel_write_load+0x1a0/0x1050 [ 376.826357] ? perf_trace_lock+0x500/0x500 [ 376.826366] ? trace_hardirqs_on+0x10/0x10 [ 376.826376] ? sel_read_bool+0x240/0x240 [ 376.826385] ? trace_hardirqs_on+0x10/0x10 [ 376.826395] ? debug_smp_processor_id+0x1c/0x20 [ 376.826403] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 376.826413] __vfs_write+0x105/0x6b0 [ 376.826430] ? sel_read_bool+0x240/0x240 [ 376.826440] ? kernel_read+0x120/0x120 [ 376.826453] ? lock_acquire+0x16f/0x430 [ 376.826461] ? vfs_write+0x3af/0x500 [ 376.826469] ? check_preemption_disabled+0x3c/0x250 [ 376.826494] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 376.826503] ? __sb_start_write+0x153/0x2f0 [ 376.826511] vfs_write+0x198/0x500 [ 376.826520] SyS_write+0xfd/0x230 [ 376.826528] ? SyS_read+0x230/0x230 [ 376.826537] ? SyS_ioctl+0x67/0xc0 [ 376.826544] ? SyS_read+0x230/0x230 [ 376.826553] do_syscall_64+0x1e8/0x640 [ 376.826563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.826575] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.826581] RIP: 0033:0x45b349 [ 376.826586] RSP: 002b:00007f1a0cb1cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.826596] RAX: ffffffffffffffda RBX: 00007f1a0cb1d6d4 RCX: 000000000045b349 [ 376.826601] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 376.826605] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.826610] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 376.826615] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 376.827289] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 376.827361] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 376.827413] CPU: 0 PID: 13939 Comm: syz-executor.1 Not tainted 4.14.166-syzkaller #0 [ 376.827419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.827422] Call Trace: [ 376.827436] dump_stack+0x142/0x197 [ 376.827450] warn_alloc.cold+0x96/0x1af [ 376.827459] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 376.827471] ? lock_downgrade+0x740/0x740 [ 376.827482] ? avc_has_perm+0x2df/0x4b0 [ 376.827496] __vmalloc_node_range+0x3c3/0x6a0 [ 376.827507] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 376.827519] vmalloc+0x46/0x50 [ 376.827526] ? sel_write_load+0x1a0/0x1050 [ 376.827533] sel_write_load+0x1a0/0x1050 [ 376.827543] ? perf_trace_lock+0x500/0x500 [ 376.827554] ? sel_read_bool+0x240/0x240 [ 376.827563] ? trace_hardirqs_on+0x10/0x10 [ 376.827574] ? debug_smp_processor_id+0x1c/0x20 [ 376.827582] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 376.827591] __vfs_write+0x105/0x6b0 [ 376.827599] ? sel_read_bool+0x240/0x240 [ 376.827606] ? kernel_read+0x120/0x120 [ 376.827617] ? lock_acquire+0x16f/0x430 [ 376.827624] ? vfs_write+0x3af/0x500 [ 376.827632] ? check_preemption_disabled+0x3c/0x250 [ 376.827643] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 376.827651] ? __sb_start_write+0x153/0x2f0 [ 376.827659] vfs_write+0x198/0x500 [ 376.827668] SyS_write+0xfd/0x230 [ 376.827676] ? SyS_read+0x230/0x230 [ 376.827686] ? SyS_read+0x230/0x230 [ 376.827696] do_syscall_64+0x1e8/0x640 [ 376.827704] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.827716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.827723] RIP: 0033:0x45b349 [ 376.827727] RSP: 002b:00007ff77f055c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.827736] RAX: ffffffffffffffda RBX: 00007ff77f0566d4 RCX: 000000000045b349 [ 376.827740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 376.827745] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.827749] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 376.827754] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 376.828168] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 376.828332] SELinux: failed to load policy [ 376.828797] SELinux: failed to load policy [ 376.829105] SELinux: policydb table sizes (5,7) do not match mine (6,7) [ 376.829367] SELinux: failed to load policy [ 376.856791] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 376.856809] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 376.856827] CPU: 1 PID: 13945 Comm: syz-executor.3 Not tainted 4.14.166-syzkaller #0 [ 376.856833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.856836] Call Trace: [ 376.856851] dump_stack+0x142/0x197 [ 376.856865] warn_alloc.cold+0x96/0x1af [ 376.856875] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 376.856887] ? lock_downgrade+0x740/0x740 [ 376.856900] ? avc_has_perm+0x2df/0x4b0 [ 376.856912] __vmalloc_node_range+0x3c3/0x6a0 [ 376.856924] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 376.856933] ? trace_hardirqs_on+0x10/0x10 [ 376.856943] vmalloc+0x46/0x50 [ 376.856951] ? sel_write_load+0x1a0/0x1050 [ 376.856958] sel_write_load+0x1a0/0x1050 [ 376.856966] ? perf_trace_lock+0x500/0x500 [ 376.856973] ? kasan_check_read+0x11/0x20 [ 376.856983] ? _copy_to_user+0x87/0xd0 [ 376.856993] ? sel_read_bool+0x240/0x240 [ 376.857002] ? trace_hardirqs_on+0x10/0x10 [ 376.857012] ? debug_smp_processor_id+0x1c/0x20 [ 376.857020] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 376.857029] __vfs_write+0x105/0x6b0 [ 376.857038] ? sel_read_bool+0x240/0x240 [ 376.857045] ? kernel_read+0x120/0x120 [ 376.857056] ? lock_acquire+0x16f/0x430 [ 376.857062] ? vfs_write+0x3af/0x500 [ 376.857069] ? check_preemption_disabled+0x3c/0x250 [ 376.857080] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 376.857088] ? __sb_start_write+0x153/0x2f0 [ 376.857096] vfs_write+0x198/0x500 [ 376.857105] SyS_write+0xfd/0x230 [ 376.857113] ? SyS_read+0x230/0x230 [ 376.857124] ? SyS_ioctl+0x67/0xc0 [ 376.857140] ? SyS_read+0x230/0x230 [ 376.857153] do_syscall_64+0x1e8/0x640 [ 376.857162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.857177] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.857183] RIP: 0033:0x45b349 [ 376.857188] RSP: 002b:00007f1a0cafbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.857198] RAX: ffffffffffffffda RBX: 00007f1a0cafc6d4 RCX: 000000000045b349 [ 376.857203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 376.857208] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 376.857212] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 376.857217] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bfd4 [ 376.901047] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 376.901067] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 376.901088] CPU: 1 PID: 13948 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 376.901094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.901110] Call Trace: [ 376.901126] dump_stack+0x142/0x197 [ 376.901139] warn_alloc.cold+0x96/0x1af [ 376.901148] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 376.901160] ? lock_downgrade+0x740/0x740 [ 376.901174] ? avc_has_perm+0x2df/0x4b0 [ 376.901187] __vmalloc_node_range+0x3c3/0x6a0 [ 376.901198] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 376.901209] ? trace_hardirqs_on+0x10/0x10 [ 376.901221] vmalloc+0x46/0x50 [ 376.901230] ? sel_write_load+0x1a0/0x1050 [ 376.901239] sel_write_load+0x1a0/0x1050 [ 376.901248] ? perf_trace_lock+0x500/0x500 [ 376.901258] ? trace_hardirqs_on+0x10/0x10 [ 376.901271] ? sel_read_bool+0x240/0x240 [ 376.901281] ? trace_hardirqs_on+0x10/0x10 [ 376.901292] ? debug_smp_processor_id+0x1c/0x20 [ 376.901302] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 376.901312] __vfs_write+0x105/0x6b0 [ 376.901321] ? sel_read_bool+0x240/0x240 [ 376.901330] ? kernel_read+0x120/0x120 [ 376.901342] ? lock_acquire+0x16f/0x430 [ 376.901350] ? vfs_write+0x3af/0x500 [ 376.901359] ? check_preemption_disabled+0x3c/0x250 [ 376.901372] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 376.901381] ? __sb_start_write+0x153/0x2f0 [ 376.901390] vfs_write+0x198/0x500 [ 376.901401] SyS_write+0xfd/0x230 [ 376.901410] ? SyS_read+0x230/0x230 [ 376.901429] ? exit_to_usermode_loop+0x10d/0x220 [ 376.901438] ? SyS_read+0x230/0x230 [ 376.901450] do_syscall_64+0x1e8/0x640 [ 376.901460] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.901474] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.901481] RIP: 0033:0x45b349 [ 376.901486] RSP: 002b:00007f2886861c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.901497] RAX: ffffffffffffffda RBX: 00007f28868626d4 RCX: 000000000045b349 [ 376.901502] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 376.901507] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.901512] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 376.901517] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 376.912341] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 376.912363] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 376.912384] CPU: 0 PID: 13960 Comm: syz-executor.5 Not tainted 4.14.166-syzkaller #0 [ 376.912391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.912395] Call Trace: [ 376.912413] dump_stack+0x142/0x197 [ 376.912427] warn_alloc.cold+0x96/0x1af [ 376.912438] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 376.912451] ? lock_downgrade+0x740/0x740 [ 376.912465] ? avc_has_perm+0x2df/0x4b0 [ 376.912479] __vmalloc_node_range+0x3c3/0x6a0 [ 376.912491] ? trace_hardirqs_on+0x10/0x10 [ 376.912504] vmalloc+0x46/0x50 [ 376.912514] ? sel_write_load+0x1a0/0x1050 [ 376.912523] sel_write_load+0x1a0/0x1050 [ 376.912533] ? perf_trace_lock+0x500/0x500 [ 376.912547] ? sel_read_bool+0x240/0x240 [ 376.912559] ? trace_hardirqs_on+0x10/0x10 [ 376.912571] ? debug_smp_processor_id+0x1c/0x20 [ 376.912579] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 376.912589] __vfs_write+0x105/0x6b0 [ 376.912597] ? sel_read_bool+0x240/0x240 [ 376.912606] ? kernel_read+0x120/0x120 [ 376.912617] ? lock_acquire+0x16f/0x430 [ 376.912624] ? vfs_write+0x3af/0x500 [ 376.912633] ? check_preemption_disabled+0x3c/0x250 [ 376.912644] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 376.912653] ? __sb_start_write+0x153/0x2f0 [ 376.912662] vfs_write+0x198/0x500 [ 376.912671] SyS_write+0xfd/0x230 [ 376.912680] ? SyS_read+0x230/0x230 [ 376.912690] ? SyS_ioctl+0x67/0xc0 [ 376.912697] ? SyS_read+0x230/0x230 [ 376.912708] do_syscall_64+0x1e8/0x640 [ 376.912716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.912729] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.912736] RIP: 0033:0x45b349 [ 376.912741] RSP: 002b:00007f2886840c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.912753] RAX: ffffffffffffffda RBX: 00007f28868416d4 RCX: 000000000045b349 [ 376.912758] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 376.912764] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 376.912771] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 03:25:39 executing program 4: syz_open_dev$sndmidi(&(0x7f00000002c0)='/dev/snd/midiC#D#\x00', 0x65e, 0x10001) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x6, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x1c5001, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1a, &(0x7f00000001c0)="2f3da917bd504a2b4d8eadd6c8daea02812fcba2ee8d3b977b59a968134ffabd17489718a4a3c484f35b68b9506a0c0196b8e7209ea0a586ab3714746680b095d7e1b86ea377f7fac1df920038372fcad7cb82cbf0aa1b5bf262eddebc7e9dc6d187490087b2b5e6c7dd400f04a4cb7b16deca0bba34ef574efeab87b19eb9259d308c607a092e85eeb338ead52e3bb7db6bb55f57ef486e256d392c9de3355cc0d4a9d1b0ff76e3e309bfdc3451ca995f0bed0a4e2da2ece0788620030e9ad32b3e2023fe3e4203b7534d102523db1a78bf23a3f52569d2166baf6a20134ca53a583f2ccc433272f8", 0xe9) write(r1, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0xfffffff, 0x7, 0x8001, r0, 0x0, &(0x7f0000000080)={0x990a90, 0xf3, [], @string=&(0x7f0000000000)=0x5}}) ioctl$VIDIOC_SUBDEV_S_CROP(r3, 0xc038563c, &(0x7f0000000100)={0x0, 0x0, {0x7, 0x0, 0x4, 0x1}}) ioctl$KDDELIO(r1, 0x4b35, 0x8) [ 376.912777] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bfd4 [ 376.936096] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 378.485232] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 378.497451] CPU: 0 PID: 13953 Comm: syz-executor.1 Not tainted 4.14.166-syzkaller #0 [ 378.505390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.514752] Call Trace: [ 378.517361] dump_stack+0x142/0x197 [ 378.521032] warn_alloc.cold+0x96/0x1af [ 378.525068] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 378.529925] ? lock_downgrade+0x740/0x740 [ 378.534086] ? avc_has_perm+0x2df/0x4b0 [ 378.538186] __vmalloc_node_range+0x3c3/0x6a0 [ 378.542693] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 378.547848] ? trace_hardirqs_on+0x10/0x10 [ 378.552229] vmalloc+0x46/0x50 [ 378.555437] ? sel_write_load+0x1a0/0x1050 [ 378.559770] sel_write_load+0x1a0/0x1050 [ 378.563939] ? perf_trace_lock+0x500/0x500 [ 378.568194] ? switch_mm_irqs_off+0x5e1/0xec0 [ 378.572708] ? sel_read_bool+0x240/0x240 [ 378.576782] ? trace_hardirqs_on+0x10/0x10 [ 378.581029] ? debug_smp_processor_id+0x1c/0x20 03:25:39 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x41bd, 0x808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) write(r1, &(0x7f0000000040)="e0", 0x1) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 378.585707] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 378.590654] __vfs_write+0x105/0x6b0 [ 378.594394] ? sel_read_bool+0x240/0x240 [ 378.598469] ? kernel_read+0x120/0x120 [ 378.602377] ? retint_kernel+0x2d/0x2d [ 378.606284] ? check_preemption_disabled+0x3c/0x250 [ 378.611485] ? __sb_start_write+0x21a/0x2f0 [ 378.615828] ? __sb_start_write+0x153/0x2f0 [ 378.620179] vfs_write+0x198/0x500 [ 378.623740] SyS_write+0xfd/0x230 [ 378.627225] ? SyS_read+0x230/0x230 [ 378.630871] ? SyS_read+0x230/0x230 03:25:39 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 'client1\x00', 0x0, "66c5fbe757368fbe", "f023c164de274064eeacee4bed97346e20bead121ab53e98f094f1b25ef26857"}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000000c0)={0x100, 0x81, 0x3f, 0x2f8a, 0xd, "145499c064c6eb41"}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x11) setsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000080)=0x43d, 0x4) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0xd) memfd_create(0x0, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r3, 0x4b35, 0x8) [ 378.634513] do_syscall_64+0x1e8/0x640 [ 378.638421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.643291] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 378.648610] RIP: 0033:0x45b349 [ 378.651832] RSP: 002b:00007ff77f055c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 378.659671] RAX: ffffffffffffffda RBX: 00007ff77f0566d4 RCX: 000000000045b349 [ 378.667146] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 378.674433] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 378.681889] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 378.689169] R13: 0000000000000c91 R14: 00000000004cd771 R15: 000000000075bf2c [ 378.699687] warn_alloc_show_mem: 8 callbacks suppressed [ 378.699690] Mem-Info: [ 378.707620] active_anon:217342 inactive_anon:208 isolated_anon:0 [ 378.707620] active_file:8314 inactive_file:12248 isolated_file:0 [ 378.707620] unevictable:0 dirty:330 writeback:0 unstable:0 [ 378.707620] slab_reclaimable:13005 slab_unreclaimable:116501 03:25:39 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x5, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x36703, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000480)=0x20) r2 = inotify_init1(0x80000) readv(r2, &(0x7f0000000400)=[{&(0x7f0000000080)=""/57, 0x39}, {&(0x7f00000000c0)=""/2, 0x2}, {&(0x7f0000000100)=""/215, 0xd7}, {&(0x7f0000000200)=""/253, 0xfd}, {&(0x7f0000000340)=""/48, 0x30}], 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$KDDELIO(r0, 0x4b35, 0x8) [ 378.707620] mapped:60583 shmem:260 pagetables:1463 bounce:0 [ 378.707620] free:1163655 free_pcp:336 free_cma:0 [ 378.742099] Node 0 active_anon:869468kB inactive_anon:832kB active_file:33116kB inactive_file:48992kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242332kB dirty:1316kB writeback:0kB shmem:1040kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 325632kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 378.771708] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 378.797791] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 378.824524] lowmem_reserve[]: 0 2569 2569 2569 2569 [ 378.829549] Node 0 DMA32 free:858712kB min:36380kB low:45472kB high:54564kB active_anon:869384kB inactive_anon:832kB active_file:33116kB inactive_file:48992kB unevictable:0kB writepending:1324kB present:3129332kB managed:2634340kB mlocked:0kB kernel_stack:8032kB pagetables:5792kB bounce:0kB free_pcp:1256kB local_pcp:632kB free_cma:0kB [ 378.859394] lowmem_reserve[]: 0 0 0 0 0 [ 378.863439] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 378.888982] lowmem_reserve[]: 0 0 0 0 0 [ 378.893186] Node 1 Normal free:3782468kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 378.921094] lowmem_reserve[]: 0 0 0 0 0 [ 378.925084] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 378.938867] Node 0 DMA32: 3081*4kB (UME) 1463*8kB (UME) 809*16kB (ME) 621*32kB (UME) 563*64kB (UME) 46*128kB (M) 3*256kB (UM) 1*512kB (U) 4*1024kB (UME) 2*2048kB (UM) 183*4096kB (M) = 857804kB [ 378.956744] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 378.967606] Node 1 Normal: 55*4kB (UME) 371*8kB (UME) 289*16kB (UME) 56*32kB (UME) 17*64kB (UME) 15*128kB (UME) 4*256kB (UE) 3*512kB (UE) 3*1024kB (UME) 4*2048kB (UM) 917*4096kB (M) = 3782468kB [ 378.985257] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 378.994144] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 379.002820] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 379.011712] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 379.020425] 20821 total pagecache pages [ 379.024411] 0 pages in swap cache [ 379.027860] Swap cache stats: add 0, delete 0, find 0/0 [ 379.034041] Free swap = 0kB 03:25:39 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(0x0, 0x84000) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) r1 = openat$selinux