------------[ cut here ]------------ WARNING: CPU: 1 PID: 5697 at mm/page_alloc.c:4935 __alloc_frozen_pages_noprof+0xb7c/0x1f1c mm/page_alloc.c:4935 Modules linked in: CPU: 1 UID: 0 PID: 5697 Comm: syz.1.953 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT Hardware name: linux,dummy-virt (DT) pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __alloc_frozen_pages_noprof+0xb7c/0x1f1c mm/page_alloc.c:4935 lr : __alloc_pages_noprof+0x14/0x114 mm/page_alloc.c:4993 sp : ffff80008df470f0 x29: ffff80008df470f0 x28: 0000000000000016 x27: 00000000dffb11d1 x26: 0000000000000000 x25: 0000000049bd27bc x24: ffff000014d370c8 x23: ffff8000810acda8 x22: 1ffff00011be8e40 x21: 0000000400000000 x20: 0000000000000000 x19: 0000000000000016 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: ffff800080a7d870 x14: ffff800080a7d718 x13: 49bd27bcd5218f0e x12: db32ea23dffb11d1 x11: 00000000f204f204 x10: 00000000f200f204 x9 : 00000000f2000000 x8 : 00000000f2f2f2f2 x7 : 00000000f3f3f3f3 x6 : 0000000000000001 x5 : ffff000017689e40 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff800088b71b60 Call trace: __alloc_frozen_pages_noprof+0xb7c/0x1f1c mm/page_alloc.c:4935 (P) __alloc_pages_noprof+0x14/0x114 mm/page_alloc.c:4993 __alloc_pages_node_noprof include/linux/gfp.h:284 [inline] alloc_pages_node_noprof include/linux/gfp.h:311 [inline] ___kmalloc_large_node+0x9c/0x1d8 mm/slub.c:4272 __kmalloc_large_node_noprof+0x28/0x88 mm/slub.c:4300 __do_kmalloc_node mm/slub.c:4316 [inline] __kmalloc_noprof+0x360/0x4d0 mm/slub.c:4340 kmalloc_noprof include/linux/slab.h:909 [inline] kmalloc_array_noprof include/linux/slab.h:948 [inline] hashtab_init+0x150/0x298 security/selinux/ss/hashtab.c:43 symtab_init+0x44/0x64 security/selinux/ss/symtab.c:45 common_read+0x17c/0x318 security/selinux/ss/policydb.c:1172 policydb_read+0x60c/0x2918 security/selinux/ss/policydb.c:2578 security_load_policy+0x12c/0xd98 security/selinux/ss/services.c:2299 sel_write_load+0x2d8/0x148c security/selinux/selinuxfs.c:603 vfs_write+0x1d8/0xad4 fs/read_write.c:684 ksys_write+0xec/0x1d8 fs/read_write.c:738 __do_sys_write fs/read_write.c:749 [inline] __se_sys_write fs/read_write.c:746 [inline] __arm64_sys_write+0x6c/0x9c fs/read_write.c:746 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x6c/0x258 arch/arm64/kernel/syscall.c:49 el0_svc_common.constprop.0+0xac/0x230 arch/arm64/kernel/syscall.c:132 do_el0_svc_compat+0x40/0x68 arch/arm64/kernel/syscall.c:157 el0_svc_compat+0x4c/0x17c arch/arm64/kernel/entry-common.c:911 el0t_32_sync_handler+0x98/0x13c arch/arm64/kernel/entry-common.c:921 el0t_32_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:605 irq event stamp: 592 hardirqs last enabled at (591): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (591): [] _raw_spin_unlock_irqrestore+0x80/0xac kernel/locking/spinlock.c:194 hardirqs last disabled at (592): [] el1_dbg+0x24/0x9c arch/arm64/kernel/entry-common.c:511 softirqs last enabled at (568): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (568): [] handle_softirqs+0x88c/0xdb4 kernel/softirq.c:607 softirqs last disabled at (475): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- SELinux: failed to load policy