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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bind$bt_sco(r4, &(0x7f0000000080)={0x1f, {0x8, 0x2, 0x6, 0x3, 0x20}}, 0x8) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000300)=ANY=[@ANYBLOB="fd858d507cc256b7b8e3b2f468cbb3a96c0000c6923886492120cb48af92a64e63fc0a72fcf400a4ab5ef7990b085beaacea2a21539a60374b33e82c38fc2904f50dfbe93f8fa651d6c5109c1016f444043b38cdc4430023"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x19, &(0x7f0000000080), &(0x7f0000000380)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1598.714533] audit: type=1400 audit(1539520263.345:24023): avc: denied { map } for pid=22283 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1598.739365] binder_alloc: binder_alloc_mmap_handler: 22317 20002000-20006000 already mapped failed -16 12:31:05 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x1a7b, 0x0, 0x2013, r1, 0x0) [ 1598.882616] audit: type=1400 audit(1539520263.365:24024): avc: denied { map } for pid=22278 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000240)={@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x8000}, {&(0x7f0000000000)=""/60, 0x3c}, &(0x7f0000000040)}, 0xa0) preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x4e11, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1599.986483] binder_alloc: binder_alloc_mmap_handler: 22339 20002000-20006000 already mapped failed -16 12:31:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000300)="1e87730494a8b31c9c662245a25284518bbd2fe253c2f24eda0fe4d4330a81fd2a2e0f5a2dd3ced38e2035ea46639caad55f267e17b746cda2e35883917443f8e73b66084c11819c711d0d52882a2c4e0b1bfb90d6312e5656fe4fea3a4781bf70b8b7") recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:31:06 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x114b, 0x0, 0x2013, r1, 0x0) 12:31:06 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xdb11, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) eventfd2(0x3f, 0x800) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1601.045780] binder_alloc: binder_alloc_mmap_handler: 22360 20002000-20006000 already mapped failed -16 12:31:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_pts(r3, 0x400) ioctl$KDGKBENT(r4, 0x4b46, &(0x7f0000000280)={0x7, 0x0, 0x8}) 12:31:07 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x835, 0x0, 0x2013, r1, 0x0) 12:31:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x170c, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000007c0)=@nat={'nat\x00', 0x19, 0x4, 0x550, [0x20000200, 0x0, 0x0, 0x20000230, 0x200003b0], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd7465616d5f736c6176655f3100000000626f6e645f736c6176655f3100000000626f6e645f736c6176655f3000000000626f6e645f736c6176655f3000000000ffffffffffff0000000000000000000000000000000000000000e800000018010000500100006970360000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000001ff0100000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000018080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000006172707265706c790000000000000000000000f3ff00000000000000000000001000000000000000aaaaaaaaaa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff02000000090000000000000000006e7230000000000000000000000000000000000000000000000000000000000076657468305f746f5f626f6e64000000766c616e3000000000000000000000000000000000000000000000000180c2000000000000000000000000010000380100006801000064657667726f7570000000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000068656c7065720000000000000000000000000000000000000000000000000000280000000000000000000000482e32343500000000000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000900000000000000000067726574617030000000000000000000766c616e300000000000000000000000626f5f31000000006970365f767469300000000000000000ffffffffffff0000000000000180c20000000000000000000000b0000000b0000000e800000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000004ebe0ed9a16be3d5f1ec5d320000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000fcffffff010000000300000000000000000000000000000000000000000000000000697036746e6c30000000000000000000697036746e6c30000000000000000000677265300000000000000000000000000180c2000000000000000000015948c39ee6000000000000000070000000b8000000f00000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a31000000000000000000000000000000000000000000000000000000006172707265706c7900000000000000000000000000000000000000000000000010000000000000000180c200"]}, 0x5c0) preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0xaaaaaaaaaaaae4d, 0x0, &(0x7f0000000080)=[@dstype0={0x6, 0x9}, @efer={0x2, 0x8000}], 0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1602.025295] kauditd_printk_skb: 108 callbacks suppressed [ 1602.025321] audit: type=1400 audit(1539520268.185:24133): avc: denied { map } for pid=22385 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1602.148256] audit: type=1400 audit(1539520268.235:24134): avc: denied { map } for pid=22385 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1602.222142] binder_alloc: binder_alloc_mmap_handler: 22386 20002000-20006000 already mapped failed -16 [ 1602.375970] kernel msg: ebtables bug: please report to author: Wrong len argument 12:31:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, "73797a6b616c6c6572300000000000ff"}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1602.459651] audit: type=1400 audit(1539520268.235:24135): avc: denied { map } for pid=22385 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xa615, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:08 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x18d5, 0x0, 0x2013, r1, 0x0) [ 1602.522331] kernel msg: ebtables bug: please report to author: Wrong len argument 12:31:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="960000005b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f28a8ef285cc60abeb003320fd638ef080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fea6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"], &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1602.672617] audit: type=1400 audit(1539520268.275:24136): avc: denied { map } for pid=22385 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) pipe2(&(0x7f0000000000), 0x80800) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KVM_NMI(r1, 0xae9a) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/236, 0xec}, {&(0x7f0000000040)=""/36, 0x24}], 0x2, 0x1000000) poll(&(0x7f0000000000)=[{r0, 0x40}, {r1, 0x4000}, {r2, 0x100}, {r2}, {r0, 0x3}], 0x5, 0x4) [ 1602.854379] audit: type=1400 audit(1539520268.325:24137): avc: denied { map } for pid=22386 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1603.043337] audit: type=1400 audit(1539520268.365:24138): avc: denied { map } for pid=22385 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1603.203840] audit: type=1400 audit(1539520268.365:24139): avc: denied { map } for pid=22386 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1603.382252] audit: type=1400 audit(1539520268.375:24140): avc: denied { map } for pid=22385 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1603.427620] binder_alloc: binder_alloc_mmap_handler: 22415 20002000-20006000 already mapped failed -16 12:31:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x880d, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1603.607539] audit: type=1400 audit(1539520268.465:24141): avc: denied { validate_trans } for pid=22389 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 12:31:09 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x570, 0x0, 0x2013, r1, 0x0) 12:31:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0xa00, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000380)=0x68) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) exit(0x7f) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1603.808873] audit: type=1400 audit(1539520268.495:24142): avc: denied { map } for pid=22385 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) flistxattr(r1, &(0x7f0000000240)=""/145, 0x91) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept4$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000080)=0x7fffffff) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000300)={0x2, 0x9, 0x8, 0x20, 0x62b3, 0x68}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000940)=""/4096, &(0x7f0000000000)=0x1000) 12:31:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r2, 0xa3, "61db80", "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"}}, 0x110) preadv(r0, &(0x7f0000000480), 0x0, 0x1000000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000000)={0x5, 0x4, 0xfff}) 12:31:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x300e, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1604.643992] binder_alloc: binder_alloc_mmap_handler: 22440 20002000-20006000 already mapped failed -16 12:31:10 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x759, 0x0, 0x2013, r1, 0x0) 12:31:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x40008000000006, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000800)='uid_map\x00') r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmmsg$nfc_llcp(r2, &(0x7f00000009c0)=[{&(0x7f00000000c0)={0x27, 0x0, 0x2, 0x7, 0x8, 0x1, "5fe829ab25c904180efcb920100c9c1ec146e797cc1a199e38b5d6bf2bf021aa43339bc776416d089c4c290065f32a387b6bda2fbe447d146eeface37adac1", 0x37}, 0x60, &(0x7f0000000740)=[{&(0x7f0000000240)="eb1069a5ddb51be0a470073938da0c5d72a9cf5ac6afea9ddfee1b736343a538fdb4013d5aa383fb85d7fdb97ade248e47d3aed873e406d81d28fa306ad79ae2e3d26d00509c8cbb576b027d7d4769d8a65e8b8af5c94b7ebaff419b3a1b83f3bcd815ee0cffcf4588c8908b71f97ca29008b362a59daf64151e077f59fbcd795c1320a21e20039d", 0x88}, {&(0x7f0000000300)="7af82960757def8cb881b3c2e3e2815d2376f1f34ee96296520659b60c7d7ff813bceca463ca011df9e89c72492f71ce69e39093c91b38a1cfe4b3a33b692a8e446b486d06a5ecd5b46c590e5e6649a4f21c0bc973480486fd", 0x59}, {&(0x7f0000000040)="cea5c5693090e2bd72a4df1771e557dcf8ff256a3324a5668795aaa523d5992a438c38e660d86cca8d6192940ccd65d436916ab6dcbcea791928ea9d96", 0x3d}, {&(0x7f0000000380)="2b74838ad636d15dba59a437df9a5501d0c9d8c500db49c36e48fe78c6212be8d3dcea1d858bebe4843f7801e6e4c823ebb6a019754da9ec42451f76b20e519dad4c7053aa9f073561020dd686c96a11abf6a7d099de394e45bfa088aba7a0968ea6cdc2f8b6f82ac0ac1bdc03a7086da516533f38ad1284c2d037ace99a80412fe1326e761261d95082efdcec3d0bb38ea3e0f484bc93e4acf07052d6aad92e2ef1feadcc3c9bb7e006166f979b825cb1118b41e27587360c0871f787dc9502468989056f458a3e509a34dcc3f4de5a3348b2edafc4c3e64436111ca4142b5d84", 0xe1}, {&(0x7f0000000480)="ff43a195e6ac17e6ce65358253efb101ea78e66984ad719f302b8eacbbcd5d85cf7bf4a050d854dbbe416f507df2eac4f7dfd21e87bbbf98611815c1dcff871c43154a387052c3d83902f75629b2c44c992bda74d094a91edf9c00a8c75bbdda524f59075eec14793d62f8ee7d9c67e3b6ed45403316034b312a4d659683f4614b7702c795186e79fc90ae79b4b7a0fd2dd050db0e921a1b2da033c4c51019d0bc8017ea2b205bc1a1b2e6fefb2f22cda9919554962997dde9ec0d513b57336c667d383575b5a4d3f774593d444df87e07c80a1413f3", 0xd6}, {&(0x7f0000000580)="b89e1f388d6b053a0cd6fdb3fc9529793a9e79e4c8e7ac7b6139d927b33186e21caaead8b240c6aa9b6827b146540b044186758df502b3ba8fd76bb11e4ee6cb810870eb7e7ef56d33e6ec0f7083260b8a39ed12057250a2db4467e9545f51ecfc7e3df5425c1a54d99d45c267d2307db8f40ec00169bb40e97cd2ce1af7e6aed22d3be26198252406f667d56228", 0x8e}, {&(0x7f0000000640)="70363a32119a963cc9722f4989aba55a43236300263e1a884b0099d74de3e5862b1d2e6e49f53d943b71109390349b287882569fd4268919b5d51b86940000f6c31e7a652a", 0x45}, {&(0x7f00000006c0)="6c5a304a970ed0f24f944b6c82cd6db0c7f757a4ff1ea753fdb847e328cc4b9fcc7ef5153e507a980be8e4120ff134fff3cac12ed02a60972544358bcca4b34c9098cdeaa87ec4f97cce5b17365dbedc3b895b16901dc4edd0398db9a6c4823d7f15182198", 0x65}], 0x8, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0xd8, 0x2004c8d5}, {&(0x7f00000008c0)={0x27, 0x0, 0x1, 0x7, 0xb76, 0x7, "6a5aaa98801c9e216d1746ed7cf96d41f11def8aaae145a11b71485e488643cf06414934a41240f0b42f64c66fdba7483f7127d1e088b8ca1ea36e44bd92f8", 0x1e}, 0x60, &(0x7f0000000980)=[{&(0x7f0000000940)="ffa889cfb684f77fea986d0de31b67033176e959bd59f2c66dabd510446b51a004736919f7ba326a3a8d89ed67ef09080a8771cc76875a9bc6bbba1a9c64cd60", 0x40}, {&(0x7f00000013c0)="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", 0x1000}], 0x2, 0x0, 0x0, 0x20040000}], 0x2, 0x4) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f00000007c0)='syz1\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000000), 0x0, 0x1000000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000a40)={{0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x11}}, {0xa, 0x4e23, 0xd7, @empty, 0x81}, 0x5, [0x9, 0x7ff, 0x6, 0x6, 0x40, 0xcdf, 0x4, 0x1]}, 0x5c) 12:31:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x180, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000280)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1605.743797] binder_alloc: binder_alloc_mmap_handler: 22468 20002000-20006000 already mapped failed -16 12:31:12 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2068, 0x0, 0x2013, r1, 0x0) 12:31:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x214080, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x40000, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000140)=0x3) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f00000004c0)=0x4) getsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000008000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x89, 0x0, &(0x7f0000000000)=[@flags={0x3, 0x46080}], 0x10000000000000ec) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x2, 0x80) get_mempolicy(&(0x7f0000000200), &(0x7f0000000240), 0xa2a, &(0x7f0000ff9000/0x4000)=nil, 0x4) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000340)=0x8, &(0x7f0000000380)=0x4) ioctl$TIOCCONS(r6, 0x541d) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0xffffffffffffffff, r4, 0x0, 0xe, &(0x7f0000000440)='/dev/admmidi#\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x4, 0x29c, 0x80, 0xfff, 0x0, 0x80000000, 0x8000, 0x2, 0x5, 0x8d74, 0x2, 0x6, 0x100, 0x8000, 0x200, 0x8, 0x20, 0x67, 0x1406, 0x88, 0x7f, 0x8c4, 0xfffffffffffffffa, 0x1, 0xffffffffffffffff, 0x1, 0x6, 0xfffffffffffffe00, 0xfa6, 0x2, 0x101, 0x1, 0x8, 0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x5}, 0x5b119164bb4311f8, 0x0, 0x2, 0x4, 0x3aa, 0x0, 0x7}, r7, 0xb, 0xffffffffffffff9c, 0x9) 12:31:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x6310, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) sendmsg$nl_netfilter(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0xdc, 0x7, 0x3, 0x0, 0x70bd2c, 0x25dfdbfd, {0x5, 0x0, 0x3}, [@generic="ffb3", @typed={0x4, 0x11}, @typed={0x4, 0x4a}, @nested={0xbc, 0x74, [@typed={0x8, 0x4b, @u32=0x1f}, @generic="5258aad24c4e98d87ef458df670a0e7f80c70963c27fbe33f6288966410ef903a26f55154c868a0feb4cecc630aa379e3ea844fb4d951da0ba843a80031058002e446c34ed2f01edbc88efebd2875a7c9a6b4000817a1c920bf07db81f89a286e9ab9073f8a90b4405fa10646ccf87c2058f8ab8ca24361d104513", @typed={0xc, 0x64, @u64=0x1}, @generic="612b4a7a3dd32818de79199f564c6f01553a850d53622ad9715ec45f355e98fb", @typed={0x8, 0x3c, @ipv4=@rand_addr=0x948a}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r4, 0x5}, 0x8) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1607.035961] binder_alloc: binder_alloc_mmap_handler: 22492 20002000-20006000 already mapped failed -16 [ 1607.062885] kauditd_printk_skb: 126 callbacks suppressed [ 1607.062901] audit: type=1400 audit(1539520273.215:24269): avc: denied { map } for pid=22492 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:31:13 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0xae4, 0x0, 0x2013, r1, 0x0) [ 1607.247790] audit: type=1400 audit(1539520273.295:24270): avc: denied { map } for pid=22499 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xb412, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1607.433738] audit: type=1400 audit(1539520273.295:24271): avc: denied { map } for pid=22499 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1607.632690] audit: type=1400 audit(1539520273.315:24272): avc: denied { map } for pid=22499 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1607.873862] audit: type=1400 audit(1539520273.325:24273): avc: denied { map } for pid=22499 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x501040, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000240)={r0}) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000280)=""/189, &(0x7f0000000340)=0xbd) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0xa57, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0x10000, 0x114000}) 12:31:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)={0x80000}) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000040)={'sit0\x00', 0x1}) [ 1608.130823] audit: type=1400 audit(1539520273.365:24274): avc: denied { validate_trans } for pid=22498 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 12:31:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="960000005b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a9c7361c261ff4578dca1a80556f382e65803435a07a249fc"], &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1608.343352] binder_alloc: binder_alloc_mmap_handler: 22516 20002000-20006000 already mapped failed -16 [ 1608.350272] audit: type=1400 audit(1539520273.385:24275): avc: denied { map } for pid=22499 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:14 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x232, 0x0, 0x2013, r1, 0x0) [ 1608.561506] audit: type=1400 audit(1539520273.465:24276): avc: denied { map } for pid=22499 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, "73797a6b616c6c657230000000000003"}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x8813, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1608.793250] audit: type=1400 audit(1539520273.465:24277): avc: denied { map } for pid=22499 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1608.933620] audit: type=1400 audit(1539520273.505:24278): avc: denied { map } for pid=22502 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1609.372089] binder_alloc: binder_alloc_mmap_handler: 22537 20002000-20006000 already mapped failed -16 12:31:15 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e23, 0x0, @remote, 0x33d}, {0xa, 0x4e21, 0x81, @dev={0xfe, 0x80, [], 0xf}, 0x3d}, 0x0, [0x3, 0xd73, 0x8, 0x23d3, 0x75c14132, 0xbf00, 0x6, 0x1f]}, 0x5c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xac, "fc86b12d953f2e3c66d7ce43dfae92837afff8db5158782316925967faa094a6923e4d053facc843a9bd69a2a0c5d5d8f9108b4d562de99815ad82b01c7dcea9c00f72e5a0080ee6a2ea972eb8a0d9959814b2518f0a27c7c79db48368a8c5d5adaf526ce5136c80d1c54ab695988fb3b864ec6ca64a0f820a6306615f90767b4088dafa97fa7699e0b6968737a9ff996890b22c3b102127f393dc9693fc02d7d84d3c9d16dc98f6f8758a30"}, &(0x7f0000000300)=0xb4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000340)={r1, 0x7, 0x80000000, 0x10001, 0x10000, 0x4}, 0x14) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1ac6459c14b6453, 0x2001000000) 12:31:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000680)=ANY=[@ANYBLOB="fd721788d82ce1c2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0xf, &(0x7f0000000000), 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000440)={{0xa, 0x3, 0x1000, 0x10000, 'syz1\x00', 0x7}, 0x6, 0x3, 0x6, r5, 0x1, 0x6331, 'syz0\x00', &(0x7f0000000380)=[']\x00'], 0x2, [], [0xac0, 0x0, 0x91ff]}) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f00000003c0)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0xfed1}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) syz_open_dev$vcsa(&(0x7f0000000740)='/dev/vcsa#\x00', 0x0, 0x40) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000240)={'ip_vti0\x00', {0x2, 0x4e22, @multicast2}}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000005c0)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000640)={0xf, 0x8, 0xfa00, {r6, 0xd}}, 0x10) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x4000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000006c0)={r4, 0x5049, 0x100000000, 0xdfa9, 0x7, 0x8000}, &(0x7f0000000700)=0x14) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000580)={{0x2, 0x3003}, 0x18}, 0x10) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000780)={0x7b, 0x0, [0x800, 0x5, 0xc257, 0x400]}) 12:31:15 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0xed9, 0x0, 0x2013, r1, 0x0) 12:31:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x2e1b, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r3, 0xaea2, 0x9ac) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1610.353465] binder_alloc: binder_alloc_mmap_handler: 22560 20002000-20006000 already mapped failed -16 12:31:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xd70c, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:16 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x4b0, 0x0, 0x2013, r1, 0x0) 12:31:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:17 executing program 2: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000004c0)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="0884"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000480)={0x3, 0x3}) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) r4 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@mcast1, 0x4e20, 0x0, 0x4e21, 0x7, 0x2, 0xa0, 0xa0, 0x21, 0x0, r4}, {0x9, 0x7f, 0x9, 0x3ff, 0xff, 0x7f, 0xfffffffeffffffff}, {0x1, 0xff, 0x0, 0x6}, 0xfff, 0x6e6bb4, 0x1, 0x1, 0x1}, {{@in6, 0x4d2, 0x6c}, 0xa, @in6=@local, 0x3503, 0x2, 0x3, 0x0, 0x5e6, 0x1, 0x2}}, 0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000500)=0x68) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:31:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) r5 = gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200002}, 0xc, &(0x7f0000000280)={&(0x7f00000013c0)=@bridge_setlink={0x1394, 0x13, 0x120, 0x70bd27, 0x25dfdbfb, {0x7, 0x0, 0x0, 0x0, 0x10000, 0x24000}, [@IFLA_CARRIER_CHANGES={0x8, 0x23, 0xfff}, @IFLA_PORT_SELF={0xb8, 0x19, [@generic="57372617f5b4ca45905fde2df9901eb8f07ece0e887ab0641695795e9e9d407a3132b78ea37c1bed87d8eeb27742da8abd4eb4fe8093f31c1bd940ea00e04d0cfc6296cb277db0f9d880c0cc8baa4d067e49a96fe67f1517a1e847c840adc1fe355d4d20d16b29930986f40a8a51b3455bbf51a555abd6ede03cfb7cadc7af42ce6cda34c3f335f932eb3046dcc9ec7e889c0d631d7eda15a4ba", @typed={0x8, 0x8c, @pid=r3}, @typed={0x8, 0x17, @pid=r4}, @typed={0x8, 0x22, @pid=r5}]}, @IFLA_LINKMODE={0x8, 0x11, 0x5}, @IFLA_LINKMODE={0x8, 0x11, 0x4}, @IFLA_PORT_SELF={0xe0, 0x19, [@generic="3d46caea36fbfaa80b76184addb365bf3db99ad11641102bb53544206b21a38c2fb43f1bdd49e3e5a36a627c5d3f69e35ea3b01b8e6e2d9e15920aa3c8ebad2d1efb50bf9704384136e6e840a8039618f94d414500e57cc62ede37688637bad5662c15d3215882b10e2ee08fe09077628fa678d5281cee121934864ae2ac1188f774262bde5b4ba5b06be07396d72e6dd96e2898132c1f3376bba7ce82ee1ccec38af5b3e5d4822792ab666789d867808d8653fd5cc0f989e4c94472b253354b5fcf039247957680d60866aae381b80c70afa75e0e828a070ab0bfc0"]}, @IFLA_LINKINFO={0x28, 0x12, @ip6vti={{0xc, 0x1, 'ip6vti\x00'}, {0x18, 0x2, [@IFLA_VTI_REMOTE={0x14, 0x5, @remote}]}}}, @IFLA_VFINFO_LIST={0x119c, 0x16, [{0x1198, 0x1, [@generic="60828c676fe381a783d0dc29ae51c2f42e501e2efc282f14390066d1bffda334bfe07f960c8cedb2b71b1177d4a2adf0f3551492d93e7320f70fff5ef3c57f4603ab65c5e470256cd00e5776ef178fb9ef17d677c2a535196f4886585376a7a9f0c6f88c540620a5b080f536bdea034e646d68fcbb667c1ecb3e208aac2847ad76", @generic="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", @typed={0xc, 0x46, @str='ppp0\x00'}, @nested={0x104, 0x74, [@generic="bb6b7e3d656771f8f93ea1dfc9184fc82b4cd5578abb7d955bfd70f37a38a5b6a5814f547511e74b97f742983cb7420fe5af49278f75a6148aadc589b7c0a55b96d4ba61559fe8e1003c3a14b48a3f21e56b124119c8bc2425b107e0cb5132ccb92048bdaec04c816fbb2337a8a3375420dbc8986960fac0faf696db4e1cf0622cf45bf664cd2758b5e205b799270f4b210b42042540d4331a78af5ba17288c48547a8b58dd3874b1ebe595c22ac329e192418ec748d826a1cbefa3171ba1ed8c28cd1db1b48359daa6d", @typed={0x14, 0x5d, @ipv6=@ipv4}, @typed={0x8, 0x18, @pid=r6}, @generic="a6053b", @generic="c9", @typed={0x14, 0x3c, @ipv6=@loopback}]}]}]}]}, 0x1394}, 0x1, 0x0, 0x0, 0x4}, 0x80) preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x8001, 0x3, 0x7}) [ 1611.682269] binder_alloc: binder_alloc_mmap_handler: 22588 20002000-20006000 already mapped failed -16 12:31:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x9012, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0xfd9, 0x0, 0x2013, r1, 0x0) 12:31:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, "73797a6b616c6c6572300000000000ef"}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1612.077028] kauditd_printk_skb: 135 callbacks suppressed [ 1612.077044] audit: type=1400 audit(1539520278.235:24414): avc: denied { map } for pid=22595 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:18 executing program 2: r0 = epoll_create(0x56) fcntl$notify(r0, 0x402, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 12:31:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x8041) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f0000000080)={0x0, 0xfffffffffffffbdc, 0x101}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000180)=0xfffffffffffffb75, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0xa3, "fe3c20e84373a0d5b8e9a061f42b160af4b9a7be3032dc9bbadc5c7ba37625851f0bbcc9b4f6cd7ecc12347bddef39f96d78f95aee75ec2090bccb7fb6f86ccad8b1ed4670253d9afcc579bf8738dc8df652c2de1db7fb16e72259ffee31a83dc9539b847f01d47661a43500ecb6640220699349414f5ff3c943ccc73826d15b4a6e37b55d37aa06e21a399e52b0c4f55b81f50c9ea1a70e9f1c581f80d93d20d42911"}, &(0x7f0000000300)=0xab) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e24, 0x401, @mcast1, 0x5}}}, &(0x7f0000000400)=0x84) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x121000, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000140)=0x3) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f00000000c0)={0x7, 0x5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1612.292123] audit: type=1400 audit(1539520278.395:24415): avc: denied { map } for pid=22595 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001340)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000013c0)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1612.414663] audit: type=1400 audit(1539520278.395:24416): avc: denied { map } for pid=22595 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1612.556005] audit: type=1400 audit(1539520278.475:24417): avc: denied { map } for pid=22595 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1612.673401] audit: type=1400 audit(1539520278.485:24418): avc: denied { map } for pid=22595 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1612.837680] audit: type=1400 audit(1539520278.835:24419): avc: denied { map } for pid=22612 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xb60f, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1612.991926] audit: type=1400 audit(1539520278.835:24420): avc: denied { map } for pid=22612 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1613.078445] binder_alloc: binder_alloc_mmap_handler: 22613 20002000-20006000 already mapped failed -16 [ 1613.253606] audit: type=1400 audit(1539520278.835:24421): avc: denied { map } for pid=22612 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:19 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x65c, 0x0, 0x2013, r1, 0x0) 12:31:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0xaaaaddf, 0x0, &(0x7f0000000280)=[@dstype3={0x7, 0xe}, @efer={0x2, 0x1400}], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:31:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) unshare(0x40000000) splice(r0, &(0x7f0000000000)=0x3, r1, &(0x7f0000000080), 0x4, 0x8) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400200, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000001c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000240)={r5, r6}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1613.539755] audit: type=1400 audit(1539520278.895:24422): avc: denied { map } for pid=22612 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1613.759926] audit: type=1400 audit(1539520278.995:24423): avc: denied { map } for pid=22612 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getuid() socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/raw\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1614.237136] IPVS: ftp: loaded support on port[0] = 21 12:31:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1614.537115] binder_alloc: binder_alloc_mmap_handler: 22642 20002000-20006000 already mapped failed -16 [ 1614.641154] IPVS: ftp: loaded support on port[0] = 21 12:31:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0xaee, 0x0, 0x2013, r1, 0x0) 12:31:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x390d, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000300)=ANY=[@ANYBLOB="2f9af3c348995279f2344994bb91ce9a05b343972f17d1ecefd2d861b7cd0e5a92aa32a1160fcace1097d2c2238d6dd1c4ef3e37a589cabbeceb166022283255bb65e49d3ad3f4487eeee682f67dc309abe75c7583718be1627d6d7cccedd7b535e0332a7d777a33c1160b659f270e2ab5c8a363f73bfb3059c261a9126ba2355989267ddb407d3ca082ea3c12e04a22fe62d814ea22d52dd1e4bfb022cc36836e7ea70cd0abcebd279538271bda3e5716c2691844bec3382afd8c26002ffb311caff74caf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000400)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x18e, 0x41, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r3, 0x4010ae94, &(0x7f0000000280)={0x9, 0x2, 0x7}) 12:31:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, "73797a6b616c6c6572300000000000f0"}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000100)={0x0, 'bcsf0\x00', 0x3}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040)={0x4, 0x200, 0x80000001, 0x8}, 0x8) connect$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1615.692545] binder_alloc: binder_alloc_mmap_handler: 22666 20002000-20006000 already mapped failed -16 12:31:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x17f, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0xf36, 0x0, 0x2013, r1, 0x0) 12:31:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) setsockopt$inet6_dccp_int(r3, 0x21, 0xa, &(0x7f0000000280)=0xfffffffffffffff8, 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1616.719652] binder_alloc: binder_alloc_mmap_handler: 22688 20002000-20006000 already mapped failed -16 12:31:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:23 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x84012, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x5f4166ea1e2174b, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x18f0, 0x0, 0x2013, r1, 0x0) 12:31:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000280)=0x0) ptrace$peek(0x1, r2, &(0x7f0000000300)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x2ca, 0x9, 0xfffffffffffffff7, 0x9, 0x0, 0x3ff, 0x11000, 0xf, 0x5, 0x4a4, 0x2, 0x39f, 0x3, 0x2a63, 0xffffffff80000000, 0x6, 0xfffffffffffffffc, 0x80000001, 0x2, 0x3, 0x0, 0x6, 0x4, 0x8, 0x3, 0x3, 0x2, 0x7f, 0x2, 0x52, 0x1, 0xffff, 0x7ff, 0x6ea4, 0xd0f, 0x7, 0x0, 0x6, 0x2, @perf_config_ext={0x5, 0x4}, 0x431, 0x401, 0x9, 0x7, 0x5, 0xe38, 0x1}, r2, 0x8, 0xffffffffffffffff, 0x3) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:31:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xdd03, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000180)="da5b7666ba2000b000eec4e1fd5a50ae0f01cfc4c10dfd6800c4e278f28424000000000f0826050300000066baf80cb8483ab486ef66bafc0ced0fdbc5", 0x3d}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1617.436477] kauditd_printk_skb: 108 callbacks suppressed [ 1617.436492] audit: type=1400 audit(1539520283.595:24532): avc: denied { validate_trans } for pid=22709 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 12:31:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x970a, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1617.685327] audit: type=1400 audit(1539520283.685:24533): avc: denied { map } for pid=22713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1617.865453] binder_alloc: binder_alloc_mmap_handler: 22719 20002000-20006000 already mapped failed -16 [ 1617.876025] audit: type=1400 audit(1539520283.705:24534): avc: denied { map } for pid=22714 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1618.124866] audit: type=1400 audit(1539520283.715:24535): avc: denied { map } for pid=22713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:24 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x1ed9, 0x0, 0x2013, r1, 0x0) [ 1618.381959] audit: type=1400 audit(1539520283.715:24536): avc: denied { map } for pid=22715 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1618.569682] audit: type=1400 audit(1539520283.725:24537): avc: denied { map } for pid=22714 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x2) socket$packet(0x11, 0x3, 0x300) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/icmp6\x00') accept4(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x80, 0x80000) preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1618.741479] audit: type=1400 audit(1539520283.735:24538): avc: denied { map } for pid=22713 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xa200, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1618.970459] audit: type=1400 audit(1539520283.735:24539): avc: denied { map } for pid=22715 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.253590] audit: type=1400 audit(1539520283.755:24540): avc: denied { map } for pid=22714 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00') syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000340)=[@text32={0x20, &(0x7f0000000300)="c4e3a179630800270fc72a650f01d1260f21a00fc769000f01b905000000c4c1905e5106660f38813c27b8010000000f01c1", 0x32}], 0x1, 0x17, &(0x7f0000000380)=[@cr0, @vmwrite={0x8, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x400, 0x0, 0x5}], 0x2) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000440)={r5, 0x3ff}, &(0x7f0000000480)=0x8) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000003c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1619.354419] binder_alloc: binder_alloc_mmap_handler: 22743 20002000-20006000 already mapped failed -16 [ 1619.429880] audit: type=1400 audit(1539520283.755:24541): avc: denied { map } for pid=22713 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:25 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x1101, 0x0, 0x2013, r1, 0x0) 12:31:26 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000040)) 12:31:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xee0f, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x1, 0x20000) r1 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x6, 0x101800) socketpair$inet6(0xa, 0x5, 0x9, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$vsock_stream(r0, &(0x7f0000000540)={0x28, 0x0, 0x2711, @hyper}, 0x10) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000440)={r1, r2, 0xfff, 0x1, &(0x7f00000003c0)="b6cac145a4d6ae43286dbbfb443b0393329c3d7777c0854a733c34aa32ac831cdf15ad340fae94830c1e82d83564269d8c93f656cd6f46da110e50c588c2df173fb68aec755ab1aba11692661b36660deefff09b170d2f97581898b73b831021dc", 0x6, 0x9, 0x1f, 0xcd, 0x9f, 0x9, 0x1f, "7f4814b16c46d79b673fc4621e9e51d52a76f245983db48a608550f0664c4abf459047d885e5a684a97973e3097f322fc94d748cd5083fd72d36a3a46ec134ad299aee2109764f42b53a19c43c9ef232e499512ee1b75b0845de959d8e0ecd8354df1bfd6297fa3c1063d7fed619495c8d4930d6f523df533c3c6bbe92f691c2633b788b0955ec2c1d7085f71c45cac16ba1b55ee637db175c656f9a74e88a1d083e9bd60eeee9732ca75d3412b02be3cfafa26dd76fb533947c1ce59ed3a0b29d13fdd9bae568f25fff81b35c5fea9b1c"}) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x8) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000000)) r4 = socket$packet(0x11, 0x4, 0x300) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') write$FUSE_WRITE(r3, &(0x7f0000000040)={0x18, 0x0, 0x3, {0x200}}, 0x18) preadv(r5, &(0x7f0000000100)=[{&(0x7f0000000300)=""/147, 0x93}, {&(0x7f00000000c0)=""/28, 0xffffffffffffff75}], 0x2, 0x1000000) ioctl(r4, 0x2, &(0x7f00000013c0)="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") 12:31:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, "73797a6b616c6c6572300000000000ff"}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1620.661712] binder_alloc: binder_alloc_mmap_handler: 22763 20002000-20006000 already mapped failed -16 12:31:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0xa68000, &(0x7f0000000300)="bac7c4e354c3fe91ef10c63ec620bf2eb681d964ed27e15f9147d6484bf99523513c898d258798792505c4104d07086ef3227f9976906e9336c8f55cfaed8c9a0c0ed1a08a79034361359916747ea8bbabcd899f5813cbc50e17b0ff1f817042130cd63020965ebd", &(0x7f0000000280), &(0x7f0000000380), &(0x7f00000003c0)="39e046ae49a0f317e06252fdce0bde215b4c001e84601d78a0fd724835b20a40aee8d50226f9e1c969a99952ab14fdb8c65849a09f8661651c9f9274dddc5b7a662af19a9cd97033abd73ee1494aa752eaf96f3c6eb8c26405f2d3e587172c62675be6d1993445be89d815dc56bcfedbb0a9a407a03cfce62d7232bf4ed01d2a715c30a7b4272a9c47aae715e45059183058c67a8b104b47417c6db612101d575735ee13d96b31b9399fcd00120aa3b0e76d2b5fbaf7df7ae45eecbbec8fc4bf8e1a5c9d931ece35efb9aedf6bd5bf6199e2050c0d5f7a3ac2fc81cfb1c0b9f7c48a2ec221c0") 12:31:27 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2f00, 0x0, 0x2013, r1, 0x0) 12:31:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xe119, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ppoll(&(0x7f0000000080)=[{r4, 0x2100}, {r4, 0x4400}, {r1, 0x1008}, {r1, 0x8}, {r4, 0xc000}, {r3, 0x454c}, {r2, 0x3}, {r3, 0x200}, {r2, 0x200}, {r0}], 0xa, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000180)={0x200}, 0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1621.987417] binder_alloc: binder_alloc_mmap_handler: 22792 20002000-20006000 already mapped failed -16 12:31:28 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2005, 0x0, 0x2013, r1, 0x0) 12:31:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xaa02, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1622.447325] kauditd_printk_skb: 150 callbacks suppressed [ 1622.447342] audit: type=1400 audit(1539520288.605:24692): avc: denied { map } for pid=22800 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='attr\x00') ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000280)=0x0) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f0000000000)={0x7f, 0xffff}) ptrace$setregset(0x4205, r4, 0x203, &(0x7f0000000080)={&(0x7f0000000940)="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", 0x1000}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r5, 0xae80, 0x0) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f0000000180), &(0x7f00000000c0)=0x60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1622.767854] audit: type=1400 audit(1539520288.635:24693): avc: denied { map } for pid=22801 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, "73797a6b616c6c65723000000000008d"}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1623.044664] audit: type=1400 audit(1539520288.645:24694): avc: denied { map } for pid=22804 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1623.224400] audit: type=1400 audit(1539520288.655:24695): avc: denied { map } for pid=22800 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x200080) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1623.443939] audit: type=1400 audit(1539520288.665:24696): avc: denied { map } for pid=22801 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1623.462079] binder_alloc: binder_alloc_mmap_handler: 22820 20002000-20006000 already mapped failed -16 12:31:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x2205, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1623.674524] audit: type=1400 audit(1539520288.745:24697): avc: denied { map } for pid=22804 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:29 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x344, 0x0, 0x2013, r1, 0x0) [ 1623.926389] audit: type=1400 audit(1539520288.745:24698): avc: denied { map } for pid=22804 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1624.193299] audit: type=1400 audit(1539520288.755:24699): avc: denied { map } for pid=22800 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, "73797a6b616c6c6572300000000000ff"}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1624.436446] audit: type=1400 audit(1539520288.755:24700): avc: denied { map } for pid=22801 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x400000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x4e5}, &(0x7f00000000c0)=0x8) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000001c0)=0x3) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000180)=r4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x81) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000000c0)={0x8001, 0x0, 0x5}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x66, 0x1, 0x3, 0x1000, 0x2}, &(0x7f0000000240)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e21, 0x7, @mcast2, 0x200}}, 0x10001, 0x9, 0x0, 0x4, 0x40}, 0x98) socket$packet(0x11, 0x3, 0x300) dup(r0) fcntl$getownex(r1, 0x10, &(0x7f0000000340)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000380)="6e6574df7061636b650600") preadv(r4, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1624.623266] audit: type=1400 audit(1539520288.765:24701): avc: denied { map } for pid=22801 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xad10, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1624.990322] binder_alloc: binder_alloc_mmap_handler: 22851 20002000-20006000 already mapped failed -16 12:31:31 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x993, 0x0, 0x2013, r1, 0x0) 12:31:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0xc0c1, 0x1) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000300)=ANY=[@ANYBLOB="90227f5d3799426e0165859a8c3231e8f1e194688911a94aa0af728c1b545122b7de2d2f0a12c5ed1de1c5b96721993843de620c3ce7f6d8b090137074598aeea49180ca61cd28afacdabec5f037f990a109a38b792e649e5703d288fdf072d4b0b3aec66b72f1a398d37f30bcc4b04bfa0904aee1c3e60f9e4030707474f8824de0cbcc30debfd2a0d9d34df5a6e1e5b5b3f4c9b94d0448be91ef6716ad8a8e44c67002c4c41be4c459065faf1efaa0"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000480)={0x0, 0x100000001, 0x6a, &(0x7f0000000400)="9e2439de487d0851d774e1f575831efc0a4a39b2d2eca0898108452294b12939f3dbdf55ed3b8b05dead57f73f00a1d947eaf954bc5677df9223791274bfaeee1369ea597436be9f88ef209a3249d5bc836888e8145d10ad8b1171cbd324569cc1784aa22bd5a6bc872e"}) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000280)={r4, 0x4}, &(0x7f00000003c0)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:31:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000000)={0x8, 0x10001, 0x2, 0x200, 0xb4, 0x7}) r4 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xc77, 0x400000) getpeername$netlink(r4, &(0x7f00000000c0), &(0x7f0000000180)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000280)={r4, r3, 0x4bb8, 0x4, &(0x7f0000000240)="0af85d7333197ffc5c2b741960f118a90533e96584ab0802bafabf391ad770027bc2951452981ecd3ae60bb77ba8fdf1b0bf15cb78adad8a81d906", 0x101, 0x0, 0x7, 0x7fffffff, 0x7a0b58ae, 0x6, 0x20, "78ab24585e"}) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x70) socket$packet(0x11, 0x3, 0x300) r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00\x00\x00\x00\x00 '}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xa07, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1626.714321] binder_alloc: binder_alloc_mmap_handler: 22880 20002000-20006000 already mapped failed -16 12:31:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x180) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:33 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x946, 0x0, 0x2013, r1, 0x0) 12:31:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="96000000cf0a81ff2341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb9445b1578e36747f4f74b32885fa5fac659c4b448126d7054a897acb630998c06040c2f640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"], &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:31:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, "73797a6b616c6c657230000000000004"}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1627.504204] kauditd_printk_skb: 131 callbacks suppressed [ 1627.504221] audit: type=1400 audit(1539520293.665:24833): avc: denied { map } for pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="1b0000001a00010000000000000000001c00000000000000000200000c0001000000000000000000"], 0x28}}, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r2, 0x10000, 0x3f}, 0x8) [ 1627.745480] audit: type=1400 audit(1539520293.685:24834): avc: denied { map } for pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x7403, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1627.930501] audit: type=1400 audit(1539520293.765:24835): avc: denied { map } for pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1628.018118] binder_alloc: binder_alloc_mmap_handler: 22907 20002000-20006000 already mapped failed -16 12:31:34 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x1c39, 0x0, 0x2013, r1, 0x0) [ 1628.135312] audit: type=1400 audit(1539520293.775:24836): avc: denied { map } for pid=22894 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) setsockopt$inet6_dccp_buf(r2, 0x21, 0x0, &(0x7f0000000080)="764e6858d2a62d714d5eebcb5aae88d751f033c84efe821cb11dd555a88cbc78e962f9ccfd58509c2bd83ef1b141563a109736108a65fcc889071d147030a138c3cb57055dedb2b6786a7ef94948b9a0729add4e083f9cd537c06ebe", 0x5c) r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x121000) ioctl$BLKRRPART(r5, 0x125f, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1628.333394] audit: type=1400 audit(1539520293.835:24837): avc: denied { validate_trans } for pid=22903 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1628.413307] audit: type=1400 audit(1539520294.135:24838): avc: denied { map } for pid=22907 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:31:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x12b203, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1628.605897] audit: type=1400 audit(1539520294.165:24839): avc: denied { map } for pid=22907 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1628.839880] audit: type=1400 audit(1539520294.235:24840): avc: denied { map } for pid=22907 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:31:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x3f1f, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000000)={0x1, 0x10001, 0x15b76934, 0x102}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) process_vm_writev(r4, &(0x7f0000000180)=[{&(0x7f0000000400)=""/11, 0xb}, {&(0x7f0000000240)=""/228, 0xe4}], 0x2, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/184, 0xb8}, {&(0x7f0000000940)=""/4096, 0x1000}], 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1629.068737] audit: type=1400 audit(1539520294.645:24841): avc: denied { map } for pid=22922 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x804c0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x9, 0x6, 0x101, 0x100}, 0x6) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1629.233141] audit: type=1400 audit(1539520294.645:24842): avc: denied { map } for pid=22922 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1629.271127] binder_alloc: binder_alloc_mmap_handler: 22935 20002000-20006000 already mapped failed -16 12:31:35 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x1e46, 0x0, 0x2013, r1, 0x0) 12:31:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000300)={0x200000, 0x7fffffff, 0x908, 0x7fffffff}, 0x8) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:31:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x80001) ioctl$SG_SET_KEEP_ORPHAN(r4, 0x2287, &(0x7f0000000080)=0x4cff) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x5611, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1630.511245] binder_alloc: binder_alloc_mmap_handler: 22959 20002000-20006000 already mapped failed -16 12:31:36 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x200a, 0x0, 0x2013, r1, 0x0) 12:31:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') getsockname$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x10) preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x320f, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x20000000, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000000)={0x10000, 0x5}) 12:31:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000300)={0x10000, &(0x7f0000000280), 0x9, r3}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f0000000340)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1631.784372] binder_alloc: binder_alloc_mmap_handler: 22979 20002000-20006000 already mapped failed -16 12:31:38 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x207a, 0x0, 0x2013, r1, 0x0) 12:31:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) sync_file_range(r0, 0x1, 0x5, 0x2) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x6f1a, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1632.573716] kauditd_printk_skb: 109 callbacks suppressed [ 1632.573731] audit: type=1400 audit(1539520298.735:24952): avc: denied { map } for pid=22996 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000080)=[@cstype0={0x4, 0xe}], 0x1) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000940)={"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"}) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x202440, 0x100) r5 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x6, 0x4042) connect$pptp(r5, &(0x7f00000001c0)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x1e) syslog(0x0, &(0x7f0000000280)=""/217, 0xd9) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1632.719933] audit: type=1400 audit(1539520298.765:24953): avc: denied { map } for pid=22996 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1632.864278] audit: type=1400 audit(1539520298.765:24954): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1633.036995] audit: type=1400 audit(1539520298.765:24955): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1633.114757] binder_alloc: binder_alloc_mmap_handler: 23001 20002000-20006000 already mapped failed -16 [ 1633.227460] audit: type=1400 audit(1539520298.805:24956): avc: denied { map } for pid=22996 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:39 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x6bb, 0x0, 0x2013, r1, 0x0) [ 1633.447088] audit: type=1400 audit(1539520298.925:24957): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x2f, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1633.721876] audit: type=1400 audit(1539520298.935:24958): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) r4 = memfd_create(&(0x7f0000000000)='\x00', 0x7) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'ifb0\x00', 0x4}, 0x18) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000000)) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1634.012198] audit: type=1400 audit(1539520298.995:24959): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1634.037605] audit: type=1400 audit(1539520298.995:24960): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1634.178362] audit: type=1400 audit(1539520299.095:24961): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1634.608760] binder_alloc: binder_alloc_mmap_handler: 23026 20002000-20006000 already mapped failed -16 12:31:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000400)=ANY=[@ANYBLOB="828137b01774c28b2fe0fb5c3cd5442989938e870aafc7df8fccfede01490fbb848bc608afad652f1e340f4d20b9eeb9648383cb6c91951daa4c4ad42c8d51ae05bfb48ac49e23dc54d5d5fd06f5cca99c2b9cec461b60b972055bd088624ffb195efbf9c00eeea8a4cd15378565abeb6779b163abe059100b412890bcb281a0784b0dce17e3a646cc6b7538"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000280)=r3) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x102, &(0x7f0000000300)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:31:40 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x1707, 0x0, 0x2013, r1, 0x0) 12:31:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xcd1b, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x400000000001, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x1, 0xcaf8}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x8) 12:31:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff}) preadv(r0, &(0x7f0000000480), 0x0, 0x1000000) [ 1635.739978] binder_alloc: binder_alloc_mmap_handler: 23050 20002000-20006000 already mapped failed -16 12:31:42 executing program 2: 12:31:42 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f00000000c0)=0xfffffffffffff48a) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r5 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x73d, 0x0, 0x7, 0x2}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000280)={r6, @in={{0x2, 0x4e21, @local}}, 0x4, 0x9, 0x5, 0xffff, 0x16}, &(0x7f0000000340)=0x98) bind$bt_l2cap(r5, &(0x7f0000000380)={0x1f, 0x0, {0x92, 0x20, 0x0, 0x8, 0x0, 0x20}, 0x1f, 0x100000001}, 0xe) r7 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r7, 0x4004ae99, &(0x7f0000000140)=0x3) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'bridge_slave_0\x00', {0x2, 0x4e23}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000040)) 12:31:42 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2ee, 0x0, 0x2013, r1, 0x0) 12:31:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x3706, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00\x00\x00\x00\x00 '}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:42 executing program 2: 12:31:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x150f, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x400000001003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f00000001c0)={0x2, 0x5, 0x100}, 0xc) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = socket$inet(0x2, 0x807, 0x126b) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000280)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:43 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x800, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x80000000000000, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0x2, 0xffffffffffffffff, 0x0, 0x10, 0xfffffffffffffffc, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, r1, 0xffffffffffffffff, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1637.138844] binder_alloc: binder_alloc_mmap_handler: 23083 20002000-20006000 already mapped failed -16 12:31:43 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x11d0, 0x0, 0x2013, r1, 0x0) [ 1637.655160] kauditd_printk_skb: 108 callbacks suppressed [ 1637.655185] audit: type=1400 audit(1539520303.815:25070): avc: denied { map } for pid=23088 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:44 executing program 2: [ 1637.854804] audit: type=1400 audit(1539520303.835:25071): avc: denied { map } for pid=23088 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1637.995684] audit: type=1400 audit(1539520303.845:25072): avc: denied { map } for pid=23087 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xa304, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, "73797a6b616c6c65723000000000007f"}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1638.263298] audit: type=1400 audit(1539520303.895:25073): avc: denied { map } for pid=23087 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1638.463297] audit: type=1400 audit(1539520303.895:25074): avc: denied { map } for pid=23088 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1638.633914] audit: type=1400 audit(1539520303.905:25075): avc: denied { map } for pid=23088 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x38, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xe}, 0x100000001}, @in6={0xa, 0x4e23, 0x6, @local, 0x7}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x8, 0xffffffff, 0x1, 0x45, 0x10}, 0x98) [ 1638.769201] binder_alloc: binder_alloc_mmap_handler: 23106 20002000-20006000 already mapped failed -16 [ 1638.831899] audit: type=1400 audit(1539520303.905:25076): avc: denied { map } for pid=23090 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:45 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x1991, 0x0, 0x2013, r1, 0x0) 12:31:45 executing program 2: [ 1639.050862] audit: type=1400 audit(1539520303.915:25077): avc: denied { map } for pid=23087 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x1a9, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1639.264702] audit: type=1400 audit(1539520303.925:25078): avc: denied { map } for pid=23090 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = getpgid(0x0) ptrace$setopts(0x4206, r3, 0x2, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:31:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x25, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1639.453316] audit: type=1400 audit(1539520303.965:25079): avc: denied { map } for pid=23090 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.782333] binder_alloc: binder_alloc_mmap_handler: 23122 20002000-20006000 already mapped failed -16 12:31:46 executing program 2: 12:31:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0xe83, 0x0, 0x2013, r1, 0x0) 12:31:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x780d, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:46 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f00000000c0)={0x0, 0xcea5, 0x4, 0x34, &(0x7f0000ffa000/0x3000)=nil, 0x3}) 12:31:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x7fffc000, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1640.898527] binder_alloc: binder_alloc_mmap_handler: 23144 20002000-20006000 already mapped failed -16 12:31:47 executing program 2: 12:31:47 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x19ab, 0x0, 0x2013, r1, 0x0) 12:31:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000000)='./file0/file0\x00', 0x80) ioctl$KDSETLED(r0, 0x4b32, 0x8) creat(&(0x7f0000000040)='./file0/file0\x00', 0x100) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) r3 = syz_open_procfs(r2, &(0x7f0000000240)='attr\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x8d09, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f00000002c0)=""/112) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) r6 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r6, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}]}, 0x20}}, 0x20000001) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000280)={0x3}) 12:31:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x804c0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x9, 0x6, 0x101, 0x100}, 0x6) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1642.353291] binder_alloc: binder_alloc_mmap_handler: 23165 20002000-20006000 already mapped failed -16 12:31:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2500, 0x0, 0x2013, r1, 0x0) [ 1642.684193] kauditd_printk_skb: 134 callbacks suppressed [ 1642.684209] audit: type=1400 audit(1539520308.845:25214): avc: denied { map } for pid=23172 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1642.856506] QAT: Invalid ioctl 12:31:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x820c, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1642.886751] audit: type=1400 audit(1539520308.845:25215): avc: denied { map } for pid=23169 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1643.019400] QAT: Invalid ioctl 12:31:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x10000000000001f5, 0x0) creat(&(0x7f0000000380)='./file0\x00', 0x7f) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x44) preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) setsockopt$inet6_dccp_int(r1, 0x21, 0x10, &(0x7f0000000040)=0xff, 0x4) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000000c0)=0xff41) [ 1643.141066] audit: type=1400 audit(1539520308.875:25216): avc: denied { map } for pid=23172 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = fcntl$dupfd(r2, 0x406, r4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0x4058534c, &(0x7f0000000080)={0x4, 0x619, 0x2, 0x0, 0x1ff, 0x80000001}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1643.294639] audit: type=1400 audit(1539520308.905:25217): avc: denied { map } for pid=23169 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00') syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000340)=[@text32={0x20, &(0x7f0000000300)="c4e3a179630800270fc72a650f01d1260f21a00fc769000f01b905000000c4c1905e5106660f38813c27b8010000000f01c1", 0x32}], 0x1, 0x17, &(0x7f0000000380)=[@cr0, @vmwrite={0x8, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x400, 0x0, 0x5}], 0x2) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000440)={r5, 0x3ff}, &(0x7f0000000480)=0x8) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000003c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1643.425529] audit: type=1400 audit(1539520308.925:25218): avc: denied { validate_trans } for pid=23173 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1643.539896] binder_alloc: binder_alloc_mmap_handler: 23188 20002000-20006000 already mapped failed -16 [ 1643.573660] audit: type=1400 audit(1539520308.955:25219): avc: denied { map } for pid=23172 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1643.739842] audit: type=1400 audit(1539520308.985:25220): avc: denied { map } for pid=23169 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1643.938651] audit: type=1400 audit(1539520308.985:25221): avc: denied { map } for pid=23172 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1644.124584] audit: type=1400 audit(1539520308.995:25222): avc: denied { map } for pid=23169 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1644.339360] audit: type=1400 audit(1539520309.065:25223): avc: denied { create } for pid=23174 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:31:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x8, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:50 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x20e4, 0x0, 0x2013, r1, 0x0) 12:31:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x619, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000014c0), 0x10000064, 0x200000000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000001c0)) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003cc0)={0xffffffffffffffff, r2, 0x0, 0x6, &(0x7f0000003c80)='--$)+\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003d40)={0xffffffffffffffff, r1, 0x0, 0x7, &(0x7f0000003d00)='vmnet0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0xffffffffffffffff, r0, 0x0, 0x22, &(0x7f0000003d80)='/proc/sys/net/ipv4/vs/drop_packet\x00'}, 0x30) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000003e00)=0x0) r4 = getpgid(r3) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000003e40)={0x1000, 0xfffffffffffffff8}) fcntl$lock(r0, 0x5, &(0x7f0000000200)={0x1, 0x0, 0x52, 0x5, r4}) process_vm_writev(r4, &(0x7f0000002680)=[{&(0x7f0000001340)=""/243, 0xf3}, {&(0x7f0000001440)=""/41, 0x29}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/128, 0x80}, {&(0x7f0000002500)=""/191, 0xbf}, {&(0x7f00000025c0)=""/80, 0x50}, {&(0x7f0000002640)=""/45, 0x2d}], 0x7, &(0x7f0000003bc0)=[{&(0x7f0000002700)=""/89, 0x59}, {&(0x7f0000002780)=""/115, 0x73}, {&(0x7f0000002800)=""/56, 0x38}, {&(0x7f0000002840)=""/80, 0x50}, {&(0x7f00000028c0)=""/133, 0x85}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/198, 0xc6}, {&(0x7f0000003a80)=""/247, 0xf7}, {&(0x7f0000003b80)=""/29, 0x1d}], 0x9, 0x0) r5 = socket$packet(0x11, 0x2000003, 0x300) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') ioctl$KVM_IRQ_LINE(r6, 0x4008ae61, &(0x7f00000000c0)={0x5, 0x7a49d13a}) preadv(r5, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000000)=""/109, 0x6d}, {&(0x7f0000001240)=""/198, 0xc6}], 0x11b6, 0xfffffc) ioctl$KDDISABIO(r6, 0x4b37) 12:31:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = dup(r0) openat$cgroup(r3, 0xfffffffffffffffe, 0x200002, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1645.128104] binder_alloc: binder_alloc_mmap_handler: 23212 20002000-20006000 already mapped failed -16 12:31:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x10000000000001f5, 0x0) creat(&(0x7f0000000380)='./file0\x00', 0x7f) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x44) preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) setsockopt$inet6_dccp_int(r1, 0x21, 0x10, &(0x7f0000000040)=0xff, 0x4) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000000c0)=0xff41) 12:31:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x2809, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:51 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2074, 0x0, 0x2013, r1, 0x0) 12:31:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000000)=0x3) 12:31:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet(0x2, 0x7, 0x7a, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x38, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x4000000000000000, @loopback, 0xe}, @in6={0xa, 0x4e24, 0x8, @local, 0x9}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e22, 0xffffffff, @remote, 0x4}}}, 0x84) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000080)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000040)) [ 1646.537531] binder_alloc: binder_alloc_mmap_handler: 23233 20002000-20006000 already mapped failed -16 12:31:52 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x1868, 0x0, 0x2013, r1, 0x0) 12:31:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x1b1b, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x20005740, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:53 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10100, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/23, 0x17}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x2}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r2, &(0x7f0000000a80)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000880)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000300)={'broute\x00', 0x0, 0x3, 0x7, [], 0x1, &(0x7f0000000240)=[{}], &(0x7f00000002c0)=""/7}, &(0x7f0000000380)=0x78) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r2) preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x1, 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x1b1f, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1647.709470] kauditd_printk_skb: 142 callbacks suppressed [ 1647.709486] audit: type=1400 audit(1539520313.855:25366): avc: denied { map } for pid=23259 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1647.721517] binder_alloc: binder_alloc_mmap_handler: 23259 20002000-20006000 already mapped failed -16 12:31:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000180)=""/119) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8000, 0x0) ioctl$RTC_PIE_OFF(r4, 0x7006) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000080)=0x7, &(0x7f00000000c0)=0x4) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1647.959889] audit: type=1400 audit(1539520313.935:25367): avc: denied { map } for pid=23257 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x20005980, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1648.192333] audit: type=1400 audit(1539520313.945:25368): avc: denied { map } for pid=23257 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:54 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x933, 0x0, 0x2013, r1, 0x0) [ 1648.443427] audit: type=1400 audit(1539520313.945:25369): avc: denied { map } for pid=23260 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:54 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10100, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/23, 0x17}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x2}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r2, &(0x7f0000000a80)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000880)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000300)={'broute\x00', 0x0, 0x3, 0x7, [], 0x1, &(0x7f0000000240)=[{}], &(0x7f00000002c0)=""/7}, &(0x7f0000000380)=0x78) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r2) preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1648.601601] audit: type=1400 audit(1539520313.945:25370): avc: denied { map } for pid=23260 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x185, 0xd) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000000), 0x100000000000018a, 0x1000000) [ 1648.764695] audit: type=1400 audit(1539520313.985:25371): avc: denied { map } for pid=23266 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x707, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1648.899301] audit: type=1400 audit(1539520313.995:25372): avc: denied { map } for pid=23266 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1649.067619] audit: type=1400 audit(1539520314.035:25373): avc: denied { map_create } for pid=23262 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1649.142504] binder_alloc: binder_alloc_mmap_handler: 23290 20002000-20006000 already mapped failed -16 [ 1649.257614] audit: type=1400 audit(1539520314.035:25374): avc: denied { map } for pid=23266 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:55 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x61c, 0x0, 0x2013, r1, 0x0) [ 1649.633319] audit: type=1400 audit(1539520314.035:25375): avc: denied { map } for pid=23260 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000001c0)) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) syz_kvm_setup_cpu$x86(r3, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000080)="41a50f01c80f20c035010000000f22c0c4a230f7e10f07430f00590cc7442400f8000000c744240208000000ff2c24f2440f220066b8ac008ed00f20e035080000000f22e0", 0x45}], 0x1, 0x60, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) fchmod(r3, 0x2) 12:31:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x1, 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x116) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x1108, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1650.681926] binder_alloc: binder_alloc_mmap_handler: 23318 20002000-20006000 already mapped failed -16 12:31:57 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x2013, r1, 0x0) 12:31:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x7, 0x200) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = dup(r4) ioctl$EVIOCSABS0(r5, 0x401845c0, &(0x7f0000000280)={0x6, 0x1, 0x7, 0x5, 0x1ff, 0x1000}) ioctl$KVM_S390_INTERRUPT_CPU(r4, 0x4010ae94, &(0x7f0000000000)={0x4, 0xe3df, 0xffff}) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x2, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f000000a000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000080)="0f0766d09e7210ba4100b029ee660f62db2ef3360f30ba2000b0fcee66b8b22a31290f23c00f21f8663501000d000f23f8440f20c0663504000000440f22c0ba6100b85891ef660f383e35", 0x4b}], 0x1, 0x4, &(0x7f00000001c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1651.858665] binder_alloc: binder_alloc_mmap_handler: 23340 20002000-20006000 already mapped failed -16 12:31:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000000)=0x3) 12:31:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x720c, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:31:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x84f9f8d877fa1c5, 0x1000000) 12:31:58 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0xc3d, 0x0, 0x2013, r1, 0x0) 12:31:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xcb1b, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1652.744350] kauditd_printk_skb: 153 callbacks suppressed [ 1652.744366] audit: type=1400 audit(1539520318.905:25523): avc: denied { map } for pid=23348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1652.959640] audit: type=1400 audit(1539520318.925:25524): avc: denied { map } for pid=23352 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:59 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10100, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/23, 0x17}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x2}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r2, &(0x7f0000000a80)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000880)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000300)={'broute\x00', 0x0, 0x3, 0x7, [], 0x1, &(0x7f0000000240)=[{}], &(0x7f00000002c0)=""/7}, &(0x7f0000000380)=0x78) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r2) preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1653.029969] binder_alloc: binder_alloc_mmap_handler: 23358 20002000-20006000 already mapped failed -16 12:31:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000001c0)={0x8001}, 0x4) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000040)={0xfffffffffffefffe, 0x7}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x90041000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x54, r6, 0x304, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffffff1b}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000044) 12:31:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:31:59 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x100, &(0x7f0000000040)=""/28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:31:59 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x994, 0x0, 0x2013, r1, 0x0) [ 1653.219875] audit: type=1400 audit(1539520318.945:25525): avc: denied { map } for pid=23352 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1653.391175] audit: type=1400 audit(1539520318.955:25526): avc: denied { map } for pid=23348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:31:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x9e14, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1653.572913] audit: type=1400 audit(1539520319.015:25527): avc: denied { map } for pid=23352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1653.711862] audit: type=1400 audit(1539520319.045:25528): avc: denied { map } for pid=23352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1653.932434] audit: type=1400 audit(1539520319.145:25529): avc: denied { map } for pid=23358 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:32:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1654.241057] audit: type=1400 audit(1539520319.165:25530): avc: denied { map } for pid=23352 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:00 executing program 5: syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000440)=[{&(0x7f0000000180)="7a21d355ff82c5a2c39897b3000561f9815a0a3571d54f46af1ba2dacca4b46253282cece1f166d87e7a1e02376d3876c0e9804ed10ebdada65d1439f68879a92fe113fd9a3b54b31c0b19b19e1794b3e6767efd736c5bc8cc1daaf149ec", 0x5e, 0x5}, {&(0x7f0000000240)="aeda3d33676fe64a2c0163b4a717e6f023c0f06265ebf435eef76b2406725e66ec25f850a34ac1003f4d9cfc667f14f18b9303589f5237cecd72037331d4dd97884b3150c77a2f2684fe84bb723e27170d306cee0eb1127a68f2f675569351ddecf7384004c25823593903893ba604838fea4c26c415e3e9c34e020307a715d2bedda05dc533214ef5e69c5513cbdfdca26188336bddd2f3110e077096072f973255e568ccc78881009f1afb133587c7b2c8721999ab9605487e9134c858211491c1d64fe493d60185533556aa8a5ca36463a1858fb96b7eb693f3512d9bf5f080fe26f02cb52ae8b275f80cf5e7cc", 0xef, 0x2978}, {&(0x7f0000000340)="3c396684ef05fc51161f05b1dba35680fcf1603fbadad676305a5c9432d5b73ccea1b7065f4c7a1df49c00a5c116b363ce25ff44aed171a3dc0d1ccc334c32fa63ca08b4babe072c5283e2d6a1e54ea3e95c4e23807619801f14c5164ceb1206ee4614a3a2c9e734ce7a95c6235797c3f036c05146470b42639fbde9d40be8cfe4f43174602d", 0x86, 0xfc4d}, {&(0x7f0000000400)="ca26abf70fad0c0e183b7fad471a4c2ef0fcf385b22349", 0x17, 0xb2}], 0x1, &(0x7f00000004c0)='/dev/kvm\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) r4 = dup(r1) write$P9_ROPEN(r4, &(0x7f0000000000)={0x18, 0x71, 0x1, {{0xb0, 0x4, 0x6}, 0x481d}}, 0x18) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1654.437562] binder_alloc: binder_alloc_mmap_handler: 23386 20002000-20006000 already mapped failed -16 [ 1654.548248] audit: type=1400 audit(1539520319.175:25531): avc: denied { map } for pid=23352 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:00 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x4a9, 0x0, 0x2013, r1, 0x0) 12:32:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)=0x5400) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1654.698152] audit: audit_backlog=65 > audit_backlog_limit=64 12:32:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x4712, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:01 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x100, &(0x7f0000000040)=""/28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1655.662102] binder_alloc: binder_alloc_mmap_handler: 23407 20002000-20006000 already mapped failed -16 12:32:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendto(r2, &(0x7f0000000240)="6d6d81f5ee6b36c60e79dc8331ee4ca065706ba69b635b29845c51dbc4a7add0f1ae9a381d37feb5669b9a6ff574f77611ef19e04ae74f5e3b26016e8d3e7737600897439cf5c455430131c2e07e7f57b8d3241e4d21ac41aff5ab795fcba00e2efcb82105d86d0927c351b13a9b49905c92b038fcdeea2625c0e727cd6b4ae0e6e1d94905282719d0f86f2dd3208e8f4294b106ed132f5157b48784ac6178", 0x9f, 0x5, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x20121021, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:32:02 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0xdbe, 0x0, 0x2013, r1, 0x0) 12:32:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendto$llc(r0, &(0x7f0000000000)="54ef4c3bc73e2457341c5a3a28d3dfd1ba0b5b6c445a86fc321a5ac197ffd964d6da6b3a5b635cbb1c4a049f9eebb75a0b", 0x31, 0x10, &(0x7f0000000040)={0x1a, 0x205, 0x8, 0x5000000000000, 0x6, 0xf0, @dev={[], 0x10}}, 0x10) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x2111, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000400)=ANY=[@ANYBLOB="fdc2701b769e4ca5f36dc43bf57cbcd0ecaf3fe3aa0cdae49329eb0fdae83b1b3069135e808d7f6d88290214520ff0bb9319dbe9dc7e4764b959bd0e4930871154308ea05c6153dab80ef6ca03fe8eafc8cb4601ac4498748991e84fed7d91ffa1837d638fe9c834299046ee18c05225cf76d25bc5db500326987be97611f3c1da89"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7ff, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) bind$inet6(r6, &(0x7f0000000300)={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) clone(0x10062100, &(0x7f0000000500), &(0x7f00000002c0), &(0x7f0000000000), &(0x7f00000002c0)) kcmp(0x0, 0x0, 0x5, r5, 0xffffffffffffffff) r7 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x300) ioctl$KVM_SET_SIGNAL_MASK(r7, 0x4004ae8b, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000300)={r4, 0xdc, "8070c948229b013dfb1bd5aae0f1095be36e075247753358fc23f704260682f9a006a25f9946f8e581636ee179cc017301419ec491789aa6ff182ad040a6017871b552bffedb6965e81359e4950d09b89787cd97b7c16035c378046d926f90511f15e95a4014790ce251fdfcf6e6af18b2494ece147c15fdf745164f516e90dae09d4e00cf6a340995996a9acd8816cbfdfae03a12691d3901bcd3be52818a435389bfda77ae4ac9fc99848011a4207617db1accc451ba529069d3ab8bf9d562280e59b5437f0444c60f7e449ff7081e6296b20d23751b1ad3fbb355"}, &(0x7f0000000280)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:32:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x2403, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1657.000783] binder_alloc: binder_alloc_mmap_handler: 23428 20002000-20006000 already mapped failed -16 12:32:03 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x1bbe, 0x0, 0x2013, r1, 0x0) [ 1657.849300] kauditd_printk_skb: 153 callbacks suppressed [ 1657.849316] audit: type=1400 audit(1539520324.005:25668): avc: denied { map } for pid=23440 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0xfffffffe, 0x8}) 12:32:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x8000000) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000100)=0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) r3 = getpgid(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x14, "6679e4a5e65822da0fce96618412f4ff8e2217a9"}, &(0x7f0000000280)=0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r4, @in={{0x2, 0x4e24, @remote}}, 0x81, 0xff}, 0x90) r5 = syz_open_procfs(r3, &(0x7f00000000c0)="00e022ab2c431a13e91c4f469db7d2a7909e00d49c21") preadv(r5, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000400)=ANY=[@ANYBLOB="fdc2701b769e4ca5f36dc43bf57cbcd0ecaf3fe3aa0cdae49329eb0fdae83b1b3069135e808d7f6d88290214520ff0bb9319dbe9dc7e4764b959bd0e4930871154308ea05c6153dab80ef6ca03fe8eafc8cb4601ac4498748991e84fed7d91ffa1837d638fe9c834299046ee18c05225cf76d25bc5db500326987be97611f3c1da89"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7ff, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) bind$inet6(r6, &(0x7f0000000300)={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) clone(0x10062100, &(0x7f0000000500), &(0x7f00000002c0), &(0x7f0000000000), &(0x7f00000002c0)) kcmp(0x0, 0x0, 0x5, r5, 0xffffffffffffffff) r7 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x300) ioctl$KVM_SET_SIGNAL_MASK(r7, 0x4004ae8b, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000300)={r4, 0xdc, "8070c948229b013dfb1bd5aae0f1095be36e075247753358fc23f704260682f9a006a25f9946f8e581636ee179cc017301419ec491789aa6ff182ad040a6017871b552bffedb6965e81359e4950d09b89787cd97b7c16035c378046d926f90511f15e95a4014790ce251fdfcf6e6af18b2494ece147c15fdf745164f516e90dae09d4e00cf6a340995996a9acd8816cbfdfae03a12691d3901bcd3be52818a435389bfda77ae4ac9fc99848011a4207617db1accc451ba529069d3ab8bf9d562280e59b5437f0444c60f7e449ff7081e6296b20d23751b1ad3fbb355"}, &(0x7f0000000280)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1658.214700] audit: type=1400 audit(1539520324.065:25669): avc: denied { map } for pid=23440 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x7e18, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1658.409509] audit: type=1400 audit(1539520324.075:25670): avc: denied { sys_admin } for pid=23443 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1658.479062] binder_alloc: binder_alloc_mmap_handler: 23454 20002000-20006000 already mapped failed -16 12:32:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:04 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2004, 0x0, 0x2013, r1, 0x0) [ 1658.605817] audit: type=1400 audit(1539520324.165:25671): avc: denied { validate_trans } for pid=23446 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1658.788232] audit: type=1400 audit(1539520324.595:25672): avc: denied { map } for pid=23454 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1658.927795] audit: type=1400 audit(1539520324.615:25673): avc: denied { map } for pid=23454 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1659.114818] audit: type=1400 audit(1539520324.715:25674): avc: denied { map } for pid=23454 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:32:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xaf1f, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000400)=ANY=[@ANYBLOB="fdc2701b769e4ca5f36dc43bf57cbcd0ecaf3fe3aa0cdae49329eb0fdae83b1b3069135e808d7f6d88290214520ff0bb9319dbe9dc7e4764b959bd0e4930871154308ea05c6153dab80ef6ca03fe8eafc8cb4601ac4498748991e84fed7d91ffa1837d638fe9c834299046ee18c05225cf76d25bc5db500326987be97611f3c1da89"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7ff, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) bind$inet6(r6, &(0x7f0000000300)={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) clone(0x10062100, &(0x7f0000000500), &(0x7f00000002c0), &(0x7f0000000000), &(0x7f00000002c0)) kcmp(0x0, 0x0, 0x5, r5, 0xffffffffffffffff) r7 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x300) ioctl$KVM_SET_SIGNAL_MASK(r7, 0x4004ae8b, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000300)={r4, 0xdc, "8070c948229b013dfb1bd5aae0f1095be36e075247753358fc23f704260682f9a006a25f9946f8e581636ee179cc017301419ec491789aa6ff182ad040a6017871b552bffedb6965e81359e4950d09b89787cd97b7c16035c378046d926f90511f15e95a4014790ce251fdfcf6e6af18b2494ece147c15fdf745164f516e90dae09d4e00cf6a340995996a9acd8816cbfdfae03a12691d3901bcd3be52818a435389bfda77ae4ac9fc99848011a4207617db1accc451ba529069d3ab8bf9d562280e59b5437f0444c60f7e449ff7081e6296b20d23751b1ad3fbb355"}, &(0x7f0000000280)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1659.395450] audit: type=1400 audit(1539520324.895:25675): avc: denied { map } for pid=23461 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1659.609759] audit: type=1400 audit(1539520324.895:25676): avc: denied { map } for pid=23461 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1659.639006] binder_alloc: binder_alloc_mmap_handler: 23475 20002000-20006000 already mapped failed -16 12:32:06 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x8004000000000000, 0x2013, r1, 0x0) 12:32:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1659.872152] audit: type=1400 audit(1539520324.895:25677): avc: denied { map } for pid=23461 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) recvmmsg(r2, &(0x7f0000006480)=[{{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000240)=""/152, 0x98}, {&(0x7f0000000300)=""/211, 0xd3}, {&(0x7f0000000180)=""/125, 0x7d}], 0x4}, 0x8001}, {{&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000880)=[{&(0x7f0000000580)=""/240, 0xf0}, {&(0x7f0000000480)=""/34, 0x22}, {&(0x7f0000000680)=""/136, 0x88}, {&(0x7f0000000740)=""/151, 0x97}, {&(0x7f0000000800)=""/118, 0x76}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/153, 0x99}, {&(0x7f0000002a00)=""/209, 0xd1}], 0x8, &(0x7f0000002b00)=""/93, 0x5d, 0x6}, 0x2a}, {{&(0x7f0000002b80)=@generic, 0x80, &(0x7f00000004c0)=[{&(0x7f0000002c00)=""/129, 0x81}], 0x1, &(0x7f0000002cc0)=""/4096, 0x1000, 0xc1b}, 0x10001}, {{&(0x7f0000003cc0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000003d40)=""/240, 0xf0}, {&(0x7f0000003e40)=""/72, 0x48}], 0x2, &(0x7f0000003f00)=""/29, 0x1d}, 0x9}, {{&(0x7f0000003f40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003fc0)=""/132, 0x84}, {&(0x7f0000004080)=""/15, 0xf}], 0x2, &(0x7f0000004100)=""/4096, 0x1000, 0xffffffff}, 0x17b}, {{&(0x7f0000005100)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000063c0)=[{&(0x7f0000005180)=""/4096, 0x1000}, {&(0x7f0000006180)=""/141, 0x8d}, {&(0x7f0000006240)=""/250, 0xfa}, {&(0x7f0000006340)=""/38, 0x26}, {&(0x7f0000006380)}], 0x5, &(0x7f0000006440)=""/51, 0x33, 0x8}, 0x8}], 0x6, 0x40, &(0x7f0000006600)) sendmsg$xdp(r1, &(0x7f0000006980)={&(0x7f0000006640)={0x2c, 0x7, r5, 0x10}, 0x10, &(0x7f0000006940)=[{&(0x7f0000006680)="1a6e37227fa7bebcec9a30612db876bc389b4eace4db31f4c6751b3a5be05c17", 0x20}, {&(0x7f00000066c0)="0fc84abad744a3e60133284f8c9c5601ad632b88112532f563498abf5b9c7795ff081516b4e5826943f9b51912d6190b6b3410490c92ad72e19cb9478a15abc007ca87e57bd3985faea24ad27e54f3b173916b276411da33dab563e453fd61687961b3de9e89cf2fe2b05142136e09999a2c2c6fe7579047b2733979742b5136a7cf26d17470310c07cd61e31a42174f9630387d3e68ac04f09699da28551d", 0x9f}, {&(0x7f0000006780)="be66ac72a1c7cfc2168f7f4ecbb4b50279ce4e58432ef3c84418d99777c95de47056c017dc7ed9f193b7de918304388190b294d838e36ab5977280940fe7d7e9c3acf70a96145bcf0a9c64a0754e94f8131264ed313938025bdb814f1a2b86abc7111422cf28f20f72af517a9e8c15ceb81d2fa7c9d2e2a77b481e5bbbe78e060ae53b", 0x83}, {&(0x7f0000006840)="65d972958085b0de003e17ba979818bf24c7303b911792ccc23364be01c54e85d5263d21fdf469468f6f2b7f5df06b296bb2f0b2e4196cc406333e70baeb06a3c8aba5c895d9848dfb5e274bc0a25c5c3e605fcc32997decce1f91114d688a92c7dcc7516fce96814e98d602f4c32fba758f646678918ea64c3056d121113aca2339f4d2e64ece4d2e0ea3c7dd23812cfac4b3d85769f44d67c61e3050670dfe466665015fe77bf43ef4bd97f7708cf9a6c12deba80867cb15e855ae7eb1e7f5333fb5c676eeac23776a75a7bd7c46a723fe3b2a", 0xd4}], 0x4}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) lstat(&(0x7f0000006380)='./file0\x00', &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000006a40)={{{@in6=@mcast2, @in, 0x4e23, 0x0, 0x4e24, 0x8, 0xa, 0x20, 0x20, 0x29, r5, r6}, {0x7, 0x7, 0x6, 0x10001, 0x7fffffff, 0xa65, 0xfff, 0x7}, {0x7, 0x3ff, 0x8, 0x7ff}, 0x8, 0x6e6bbf, 0x2, 0x0, 0x1, 0x3}, {{@in=@multicast2, 0x4d6, 0xff}, 0x2, @in6=@loopback, 0x3500, 0x3, 0x3, 0x0, 0x4, 0x99, 0x8}}, 0xe8) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:32:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000001280)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000000)=""/92, 0x5c}, {&(0x7f00000000c0)=""/118, 0x76}], 0x3, 0x0) 12:32:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x2418, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:32:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1661.041907] binder_alloc: binder_alloc_mmap_handler: 23502 20002000-20006000 already mapped failed -16 12:32:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x115000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) pread64(r0, &(0x7f0000000240)=""/212, 0xd4, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x5, 0x2, 0xff, 0x0, 0xffffffff00000001, 0xffff, 0x1}, &(0x7f0000000100)=0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:07 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xb00000000000000, 0x2013, r1, 0x0) 12:32:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0xcf06, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1661.676043] SELinux: failed to load policy 12:32:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:32:08 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000080)=0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$P9_RATTACH(r0, &(0x7f0000000180)={0x14, 0x69, 0x1, {0x26, 0x7ff, 0x6}}, 0x14) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000400)=0x7, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r3, r1) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000001c0)={0x3, [0x0, 0x0, 0x0]}) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000240)={0x100000000, {{0xa, 0x4e23, 0x101, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, 0x40}}}, 0x88) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1, @in=@local}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000440)) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000040)) [ 1662.053161] binder_alloc: binder_alloc_mmap_handler: 23525 20002000-20006000 already mapped failed -16 12:32:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:08 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xb000000, 0x2013, r1, 0x0) 12:32:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="eb37c2ae30b1d1bffc3b001562b008f3", 0x10) socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000b, 0x203) 12:32:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x4915, 'system_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1662.731112] SELinux: failed to load policy [ 1662.864608] kauditd_printk_skb: 125 callbacks suppressed [ 1662.864623] audit: type=1400 audit(1539520329.025:25803): avc: denied { map } for pid=23543 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1663.061183] audit: type=1400 audit(1539520329.065:25804): avc: denied { map } for pid=23543 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1663.202655] binder_alloc: binder_alloc_mmap_handler: 23546 20002000-20006000 already mapped failed -16 [ 1663.286105] audit: type=1400 audit(1539520329.065:25805): avc: denied { map } for pid=23543 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:09 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x3000000, 0x2013, r1, 0x0) [ 1663.478911] audit: type=1400 audit(1539520329.145:25806): avc: denied { map } for pid=23543 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) dup2(r0, r0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) [ 1663.661587] audit: type=1400 audit(1539520329.145:25807): avc: denied { map } for pid=23543 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1663.848642] audit: type=1400 audit(1539520329.275:25808): avc: denied { map } for pid=23543 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'lystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1664.094625] SELinux: failed to load policy [ 1664.102413] audit: type=1400 audit(1539520329.285:25809): avc: denied { map } for pid=23543 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1664.153117] binder_alloc: binder_alloc_mmap_handler: 23564 20002000-20006000 already mapped failed -16 12:32:10 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6b6b6b, 0x2013, r1, 0x0) [ 1664.352800] audit: type=1400 audit(1539520329.315:25810): avc: denied { map } for pid=23546 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:32:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 1664.579114] audit: type=1400 audit(1539520329.335:25811): avc: denied { map } for pid=23546 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:32:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1664.803101] audit: type=1400 audit(1539520329.375:25812): avc: denied { map } for pid=23546 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:32:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80800, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00') ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x40800, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 12:32:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'dystem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1665.283592] binder_alloc: binder_alloc_mmap_handler: 23588 20002000-20006000 already mapped failed -16 12:32:11 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x8004, 0x2013, r1, 0x0) 12:32:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x4e22, 0x200, @local, 0x81}, {0xa, 0x4e24, 0x7, @loopback, 0x51}, 0x7, [0x3, 0x81, 0x4, 0x92, 0x20, 0xffffffffffffffff, 0x8, 0x5]}, 0x5c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x1a, &(0x7f0000000000)=0x8, 0x4) gettid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000240)=0xc) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000000280)='net/ip_mr_vif\x00') ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x81, 0x4) preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1665.626239] SELinux: failed to load policy 12:32:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:32:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r2, r2, 0x80000) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000040)=0x5) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x183, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)={0x6, 0x6}) 12:32:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, '+ystem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1666.534358] binder_alloc: binder_alloc_mmap_handler: 23605 20002000-20006000 already mapped failed -16 12:32:12 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xa, 0x2013, r1, 0x0) 12:32:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCFLSH(r0, 0x540b, 0x9) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1667.154839] SELinux: failed to load policy 12:32:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'iystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) [ 1667.796673] binder_alloc: binder_alloc_mmap_handler: 23628 20002000-20006000 already mapped failed -16 12:32:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1667.886250] kauditd_printk_skb: 123 callbacks suppressed [ 1667.886304] audit: type=1400 audit(1539520334.045:25936): avc: denied { map } for pid=23637 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:14 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x5, 0x2013, r1, 0x0) [ 1668.105390] audit: type=1400 audit(1539520334.045:25937): avc: denied { map } for pid=23634 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1668.150540] SELinux: failed to load policy 12:32:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) [ 1668.308420] audit: type=1400 audit(1539520334.045:25938): avc: denied { map } for pid=23634 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x1, 0x2, 0x200, 0x5, 0x82, 0x7, 0x8000, 0x975f, r1}, &(0x7f0000000100)=0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'oystem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1668.513274] audit: type=1400 audit(1539520334.085:25939): avc: denied { map } for pid=23637 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1668.636965] audit: type=1400 audit(1539520334.115:25940): avc: denied { map } for pid=23634 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1668.812896] audit: type=1400 audit(1539520334.115:25941): avc: denied { map } for pid=23637 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1669.051477] audit: type=1400 audit(1539520334.125:25942): avc: denied { map } for pid=23634 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:15 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x0) [ 1669.208337] binder_alloc: binder_alloc_mmap_handler: 23657 20002000-20006000 already mapped failed -16 [ 1669.289111] audit: type=1400 audit(1539520334.135:25943): avc: denied { map } for pid=23637 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:15 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xff03, 0x2013, r1, 0x0) [ 1669.385802] SELinux: failed to load policy [ 1669.527965] audit: type=1400 audit(1539520334.195:25944): avc: denied { map } for pid=23634 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000d40)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) 12:32:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'pystem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1669.843317] audit: type=1400 audit(1539520334.235:25945): avc: denied { map } for pid=23637 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000240)) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000000)={0x2b7, 0xfffffffffffffffd, 0x6, 0x7}) preadv(r2, &(0x7f0000000480), 0x100000d3, 0x0) [ 1670.209049] binder_alloc: binder_alloc_mmap_handler: 23674 20002000-20006000 already mapped failed -16 [ 1670.286178] FAULT_INJECTION: forcing a failure. [ 1670.286178] name failslab, interval 1, probability 0, space 0, times 0 [ 1670.375302] CPU: 1 PID: 23679 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #62 [ 1670.382643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1670.392032] Call Trace: [ 1670.394666] dump_stack+0x1c4/0x2b4 [ 1670.398322] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1670.403529] ? mark_held_locks+0x130/0x130 [ 1670.407798] should_fail.cold.4+0xa/0x17 [ 1670.411877] ? flex_array_get_ptr+0x49/0x60 [ 1670.416215] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1670.421335] ? context_struct_compute_av+0x1600/0x1600 [ 1670.426627] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1670.431675] ? ebitmap_contains+0x233/0x520 [ 1670.436017] ? graph_lock+0x170/0x170 [ 1670.439833] ? constraint_expr_eval.isra.6+0x2d7/0x1560 [ 1670.445215] ? flex_array_get_ptr+0x49/0x60 [ 1670.449560] ? graph_lock+0x170/0x170 [ 1670.453373] ? find_held_lock+0x36/0x1c0 [ 1670.457456] ? find_held_lock+0x36/0x1c0 [ 1670.461544] __should_failslab+0x124/0x180 [ 1670.465809] should_failslab+0x9/0x14 [ 1670.469623] kmem_cache_alloc+0x47/0x730 [ 1670.473701] ? trace_hardirqs_on+0xbd/0x310 [ 1670.478028] ? kasan_check_read+0x11/0x20 [ 1670.482190] ? avc_compute_av+0x2c5/0x800 [ 1670.486349] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1670.491821] avc_alloc_node+0x2a/0x5e0 [ 1670.495730] avc_compute_av+0x2d1/0x800 [ 1670.499710] ? avc_has_perm+0xe4/0x7e0 [ 1670.503608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1670.509161] ? avc_alloc_node+0x5e0/0x5e0 [ 1670.513322] ? kasan_check_read+0x11/0x20 [ 1670.517484] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1670.522786] ? rcu_bh_qs+0xc0/0xc0 [ 1670.526344] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1670.531896] ? _kstrtoull+0x188/0x250 [ 1670.535719] avc_has_perm+0x3c9/0x7e0 [ 1670.539542] ? avc_has_perm_noaudit+0x630/0x630 [ 1670.544231] ? graph_lock+0x170/0x170 [ 1670.548051] ? get_pid_task+0xd6/0x1a0 [ 1670.551953] ? lock_downgrade+0x900/0x900 [ 1670.556119] ? find_held_lock+0x36/0x1c0 [ 1670.560205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1670.565808] inode_has_perm.isra.58+0x173/0x210 [ 1670.570505] selinux_mmap_file+0x14f/0x240 [ 1670.574753] ? rcu_bh_qs+0xc0/0xc0 [ 1670.578326] ? selinux_file_ioctl+0x730/0x730 [ 1670.582845] ? __fget+0x4d1/0x740 [ 1670.586322] ? selinux_file_ioctl+0x730/0x730 [ 1670.590849] security_mmap_file+0x12b/0x1b0 [ 1670.595192] vm_mmap_pgoff+0x135/0x2c0 [ 1670.599101] ? vma_is_stack_for_current+0xd0/0xd0 [ 1670.603956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1670.609510] ? check_preemption_disabled+0x48/0x200 [ 1670.614557] ksys_mmap_pgoff+0x4da/0x660 [ 1670.618628] ? do_syscall_64+0x9a/0x820 [ 1670.622627] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1670.627417] ? trace_hardirqs_on+0xbd/0x310 [ 1670.631750] ? __ia32_sys_read+0xb0/0xb0 [ 1670.635837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.641217] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1670.646692] __x64_sys_mmap+0xe9/0x1b0 [ 1670.650602] do_syscall_64+0x1b9/0x820 [ 1670.654510] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1670.659895] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1670.664843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1670.669704] ? trace_hardirqs_on_caller+0x310/0x310 [ 1670.674740] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1670.679793] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1670.684832] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1670.689705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.694901] RIP: 0033:0x457569 [ 1670.698104] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1670.717084] RSP: 002b:00007f318a06fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 12:32:16 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4603, 0x2013, r1, 0x0) [ 1670.724842] RAX: ffffffffffffffda RBX: 00007f318a06fc90 RCX: 0000000000457569 [ 1670.732127] RDX: 0000000000000009 RSI: 0000000000003000 RDI: 0000000020003000 [ 1670.739415] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 [ 1670.746699] R10: 0000000000002013 R11: 0000000000000246 R12: 00007f318a0706d4 [ 1670.754010] R13: 00000000004c283b R14: 00000000004d3be8 R15: 0000000000000004 [ 1670.818472] SELinux: failed to load policy 12:32:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) 12:32:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, '.ystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:17 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/sockstat6\x00') getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x6f, "c974c359c68bbb9f8d071beec504d674ec86f7191cddab29737362d049fecfbef9451b395e9dbc3ea884074a73610eaea441cf6aec288ffaa4844f66776b81dd1b55be2bbf4daeaad930b8262794069aedd624a654a1df82c97cc69489f605f09d7d3dff3a6c634af693272f5c329d"}, &(0x7f00000002c0)=0x77) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000300)={r1, 0x1000, 0x1ba, 0x7, 0x7, 0xa9}, 0x14) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) socket$packet(0x11, 0x3, 0x300) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1671.639696] SELinux: failed to load policy 12:32:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') 12:32:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1671.828257] binder_alloc: binder_alloc_mmap_handler: 23698 20002000-20006000 already mapped failed -16 12:32:18 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x0) 12:32:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x48, 0x2013, r1, 0x0) 12:32:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, ':ystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) unlink(&(0x7f0000000280)='./file0\x00') [ 1672.905922] binder_alloc: binder_alloc_mmap_handler: 23718 20002000-20006000 already mapped failed -16 [ 1672.907597] kauditd_printk_skb: 112 callbacks suppressed [ 1672.907613] audit: type=1400 audit(1539520339.045:26058): avc: denied { map } for pid=23718 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:32:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'cystem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1673.173464] audit: type=1400 audit(1539520339.075:26059): avc: denied { map } for pid=23714 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1673.197841] audit: type=1400 audit(1539520339.085:26060): avc: denied { map } for pid=23714 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1673.222203] audit: type=1400 audit(1539520339.195:26061): avc: denied { map } for pid=23718 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1673.250722] audit: type=1400 audit(1539520339.205:26062): avc: denied { map } for pid=23714 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:19 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7400000000000000, 0x2013, r1, 0x0) [ 1673.415835] audit: type=1400 audit(1539520339.255:26063): avc: denied { map } for pid=23714 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1673.595535] audit: type=1400 audit(1539520339.505:26064): avc: denied { map } for pid=23724 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1673.788478] audit: type=1400 audit(1539520339.515:26065): avc: denied { map } for pid=23724 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3007, 0x9, 0x2013, r0, 0x0) [ 1673.902464] SELinux: failed to load policy [ 1674.032210] audit: type=1400 audit(1539520339.535:26066): avc: denied { map } for pid=23724 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0x8) 12:32:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, '[ystem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1674.243327] audit: type=1400 audit(1539520339.545:26067): avc: denied { map } for pid=23724 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000040)=0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1674.363342] binder_alloc: binder_alloc_mmap_handler: 23739 20002000-20006000 already mapped failed -16 12:32:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x400000000000, 0x2013, r1, 0x0) [ 1674.857419] SELinux: failed to load policy 12:32:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) socket$nl_route(0x10, 0x3, 0x0) 12:32:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x2000, 0x9, 0x2013, r0, 0x0) 12:32:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'xystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f, 0x7, &(0x7f00000015c0)=[{&(0x7f0000000180)="69ebcf8a8a8dc800215faf16d885fbe9796de2ec9c9545342597d8daf8398fb1eb21f878a37bd6f7d0a523b9e232ff66", 0x30, 0x10001}, {&(0x7f00000001c0)="3689a651ba434d6cab7df2f6469ed3dc43a80cfc05ceb8619234c72a37d04e829c0239761307f1ca7b0747b85f2346e23bb5cfd2c4bb2575a82095ceb842e60e12e914d5532484723f0d36bdcac68c1258736f20c8c7dfc00bc446834d41c8d2b8d223822bccaec9fbccc2cceb3dc011627a32fc6f9ccb122e3c8ab7f862c38e6f9d130748fc9f662099dc8e5e1a8d6219b1699889ad6ae65ca56ee9956d315d8a0dcbfb6a600345b546623f7124239fe3f676fc6d10ff0e0235f666184b60eef425f34270e206ace4e3bea8d00dea6285694b10562b7bf0", 0xd8, 0x800}, {&(0x7f00000002c0)="1816587e95be667ef1006ca08bf9cdab3654c948b78c7dcd8e8c99b23d55624edaba098653e1a6aa783d957c8543e7a5583704b14195f1052045e166101297350934c79c93d6d44f57389e9f2357", 0x4e, 0x49}, {&(0x7f0000000340)="9ac50616775868611b9a528c116d3f2cbf1c81a47c5c84b678ff12a4d0f8a8d3d8b779b79ae61c4a3e18c01ecaa2f797e633584d1d3a18ed790d740205f449755e85c3c7bc89bbfd119de69546652ff2428b6e27", 0x54, 0x3c4cda6d}, {&(0x7f00000003c0)="53ff2891e3a678a89cd684c24d26373f6f9a9cc996f0609a81480d9b6086e17c3019dcb859bee94af5cfc6a4d92398d0df51285cd5cc50ccc2e3a061d4c7fd17d948253f761b71766ae05c66de2bdcaa527df4ac9c95562db968c3b45e9a9d5fe96cc16e833d674675507362f90a2502b1f2a46d4d304eb7cc7385b27c1fd96fe561d3fa984a5c706b6349c36110e1ab80c08faad3aa663272474ce2b9c2860c44b63bf4cde3d449ef1e75b2197451729c4c136881ec6e290e85d47c858b776c55264743d7fc3a34bb401f51cce81e655451cbadc0566ec25ff34a14c6ed82038accae5d901d6cbc", 0xe8, 0x1a}, {&(0x7f00000004c0)="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", 0x1000, 0xb7}, {&(0x7f00000014c0)="958a7113bebbbbd2ac8daf55aed15a5b593eec5dd94f5de6bbc9236c42221580b069ff99f9be76937a1d6e52eae257869d2d602cf98a853ae483e8a23d4969796b8826e3b6521eee77bb307e4bfb54f43000cc85d7b6386f4fe04de7c4cd9e9ebeb6d73df0ef939aa8555591d7e2ebcb481a5a917ab8b4490174febc26b241e86850c45ff5b4b50e10c26911f62d6c8384865799a4d349426a68c1949bbb64ddaa7bf8cd339592f648850c7230a3a10cd21c016558cbcad4e95cfff8fce1b1f44435120b4f4a", 0xc6, 0x7}], 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1675.736883] binder_alloc: binder_alloc_mmap_handler: 23761 20002000-20006000 already mapped failed -16 12:32:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4703000000000000, 0x2013, r1, 0x0) [ 1676.068656] SELinux: failed to load policy 12:32:22 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x2d00, 0x9, 0x2013, r0, 0x0) 12:32:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x96, "5b1225a52341463bb754aa594c790960d491a045fa888c1bd13880c3ddce3f6a172e6e31ce8d74436c7fd73023341a3894f080bc9072f99ec390331c5a664baf4bdb33956fe406bf3163a483716551ebc65177030fee6a165c98e514cb8e36747f4f74b32885fa5fac659c4b8126d7054a897acb630998c06040c2d640beb8bdeffe5ba084f78086cbf6f4ddf3ba02495ba0cfd98d7a"}, &(0x7f00000000c0)=0x9e) 12:32:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'uystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x0, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000002b80)=[{&(0x7f0000001680)=""/59, 0x3b}, {&(0x7f00000016c0)=""/97, 0x61}, {&(0x7f0000001740)=""/138, 0x8a}, {&(0x7f0000001800)=""/57, 0x39}, {&(0x7f0000001840)=""/106, 0x6a}, {&(0x7f00000018c0)=""/137, 0x89}, {&(0x7f0000001980)=""/235, 0xeb}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002c40)=""/221, 0xdd}], 0x9, 0x1000000) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000100)={0x6, &(0x7f0000000240)=""/150, &(0x7f00000015c0)=[{0x6, 0x79, 0x6, &(0x7f0000000000)=""/121}, {0x8000, 0x23, 0x2, &(0x7f00000000c0)=""/35}, {0x1, 0x1000, 0xfffffffffffffffc, &(0x7f0000000300)=""/4096}, {0x7, 0xf1, 0x11, &(0x7f00000013c0)=""/241}, {0x9, 0x59, 0x5, &(0x7f0000001300)=""/89}, {0x3f, 0xc4, 0x9, &(0x7f00000014c0)=""/196}]}) [ 1676.965440] binder_alloc: binder_alloc_mmap_handler: 23782 20002000-20006000 already mapped failed -16 12:32:23 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x7f01, 0x9, 0x2013, r0, 0x0) 12:32:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6c00000000000000, 0x2013, r1, 0x0) [ 1677.200834] SELinux: failed to load policy 12:32:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x220000) 12:32:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, '0ystem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1677.917917] kauditd_printk_skb: 129 callbacks suppressed [ 1677.917933] audit: type=1400 audit(1539520344.075:26197): avc: denied { map } for pid=23800 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1677.986091] binder_alloc: binder_alloc_mmap_handler: 23800 20002000-20006000 already mapped failed -16 12:32:24 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3074, 0x9, 0x2013, r0, 0x0) 12:32:24 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xa00000000000000, 0x2013, r1, 0x0) [ 1678.249018] audit: type=1400 audit(1539520344.125:26198): avc: denied { map } for pid=23801 comm="syz-executor5" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1678.311632] SELinux: failed to load policy 12:32:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)=0x3ff) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1678.554736] audit: type=1400 audit(1539520344.125:26199): avc: denied { map } for pid=23800 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:32:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, '"ystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1678.788713] audit: type=1400 audit(1539520344.155:26200): avc: denied { map } for pid=23804 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1678.974241] audit: type=1400 audit(1539520344.165:26201): avc: denied { map } for pid=23800 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1679.113364] audit: type=1400 audit(1539520344.165:26202): avc: denied { map } for pid=23804 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1679.175177] binder_alloc: binder_alloc_mmap_handler: 23819 20002000-20006000 already mapped failed -16 [ 1679.254568] audit: type=1400 audit(1539520344.185:26203): avc: denied { map } for pid=23798 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:25 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xe4000000, 0x2013, r1, 0x0) 12:32:25 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3009, 0x9, 0x2013, r0, 0x0) [ 1679.411837] SELinux: failed to load policy [ 1679.488765] audit: type=1400 audit(1539520344.195:26204): avc: denied { map } for pid=23798 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1679.713026] audit: type=1400 audit(1539520344.215:26205): avc: denied { map } for pid=23804 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'nystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') r1 = semget$private(0x0, 0x3, 0x1) semctl$SETVAL(r1, 0x40000003, 0x10, &(0x7f0000000700)=0xfffffffffffffff7) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) process_vm_writev(r2, &(0x7f0000000400)=[{&(0x7f0000000240)=""/161, 0xa1}, {&(0x7f00000000c0)=""/121, 0x79}, {&(0x7f0000000300)=""/212, 0xd4}], 0x3, &(0x7f0000000680)=[{&(0x7f0000000440)=""/233, 0xe9}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/19, 0x13}, {&(0x7f0000000580)=""/75, 0x4b}, {&(0x7f0000000600)=""/99, 0x63}], 0x6, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1679.936062] audit: type=1400 audit(1539520344.225:26206): avc: denied { map } for pid=23804 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:26 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x304c, 0x9, 0x2013, r0, 0x0) [ 1680.571957] binder_alloc: binder_alloc_mmap_handler: 23842 20003000-20006000 already mapped failed -16 12:32:26 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2000000, 0x2013, r1, 0x0) 12:32:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:32:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, '*ystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000340)='net/ipx\x00') getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x15, 0x7f, 0xa0acba5, 0x0, 0x80000000, 0x40, 0x2, 0xfffffffffffffff9, 0xb2, 0x2, 0x4, 0x5, 0x7f3e, 0x0, 0x8, 0x8, 0x1000, 0x10000, 0x4281, 0x6, 0x7fff, 0x1, 0x3, 0xfffffffffffff000, 0x200, 0x2, 0x5, 0xffffffffffffffd5, 0xfd35, 0x4, 0x1, 0x1000, 0x1, 0xb86, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x8001, 0x2}, 0x440, 0x4, 0xeeb, 0x7, 0x100000001, 0x5, 0x3}, r3, 0xd, r0, 0x2) preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3068, 0x9, 0x2013, r0, 0x0) 12:32:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1681.695758] binder_alloc: binder_alloc_mmap_handler: 23866 20002000-20006000 already mapped failed -16 12:32:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, '%ystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:28 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xb, 0x2013, r1, 0x0) 12:32:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x306c, 0x9, 0x2013, r0, 0x0) 12:32:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fdc2"]) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:32:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'zystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0x6073) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1682.887113] binder_alloc: binder_alloc_mmap_handler: 23891 20002000-20006000 already mapped failed -16 12:32:29 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x17f, 0x2013, r1, 0x0) [ 1682.951787] kauditd_printk_skb: 138 callbacks suppressed [ 1682.951803] audit: type=1400 audit(1539520349.105:26345): avc: denied { map } for pid=23886 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1683.112509] audit: type=1400 audit(1539520349.125:26346): avc: denied { map } for pid=23886 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1683.581098] SELinux: failed to load policy [ 1683.672159] audit: type=1400 audit(1539520349.825:26347): avc: denied { map } for pid=23908 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:32:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x30e4, 0x9, 0x2013, r0, 0x0) 12:32:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, '-ystem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1683.888855] audit: type=1400 audit(1539520349.825:26348): avc: denied { map } for pid=23908 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1684.029673] binder_alloc: binder_alloc_mmap_handler: 23906 20002000-20006000 already mapped failed -16 [ 1684.153734] audit: type=1400 audit(1539520349.825:26349): avc: denied { map } for pid=23908 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:30 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4800, 0x2013, r1, 0x0) 12:32:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1684.375397] audit: type=1400 audit(1539520349.825:26350): avc: denied { map } for pid=23908 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000240)={0x60, 0x0, 0x6, {{0x0, 0x9, 0x4, 0xd6, 0x2, 0xffff, 0x8001, 0xfffffffeffffffff}}}, 0x60) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8001, 0x1000000000002) write$selinux_access(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7379731be21dbd6e7d2c326a6563745f723a73797374656d645f706173739677645f766172756e5d743a7330202ffcff722f7362696e2f6e74706420303030303030307c11c5348a23c8943030303036000041f8fcccae7410d341ed59040fc1a8a1c7a3c1c7868c9bdeea70c1a2ab6946592f13cad346d6bd0f6af304b8df0e3bac41be6fa0c132e9663828a41372f3acff8bad98f0c5a6bc7c77eccdb2d669514ce1d56d8ddb6aa300e13a95ead44af352d291d14f438377e7d0c3c73d529370226daa159ba154bd547c61a76af3b36a9cf79ecd"], 0x52) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1684.595245] audit: type=1400 audit(1539520349.855:26351): avc: denied { map } for pid=23908 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1684.762461] audit: type=1400 audit(1539520349.865:26352): avc: denied { map } for pid=23908 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1684.903646] SELinux: failed to load policy 12:32:31 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1684.976048] audit: type=1400 audit(1539520349.865:26353): avc: denied { map } for pid=23908 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'hystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3048, 0x9, 0x2013, r0, 0x0) [ 1685.163688] audit: type=1400 audit(1539520349.875:26354): avc: denied { map } for pid=23908 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.343299] binder_alloc: binder_alloc_mmap_handler: 23932 20002000-20006000 already mapped failed -16 12:32:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:31 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6000000, 0x2013, r1, 0x0) [ 1685.783760] SELinux: failed to load policy 12:32:32 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:32:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000000)={0x1000, &(0x7f0000000240)=""/4096}) 12:32:32 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x7fffdfffc000, 0x9, 0x2013, r0, 0x0) 12:32:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'Xystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1686.483510] binder_alloc: binder_alloc_mmap_handler: 23950 20002000-20006000 already mapped failed -16 12:32:32 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x700, 0x2013, r1, 0x0) [ 1686.658342] SELinux: failed to load policy 12:32:32 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:32:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, '#ystem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:33 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x8004, 0x9, 0x2013, r0, 0x0) 12:32:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$pptp(0x18, 0x1, 0x2) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1687.636990] binder_alloc: binder_alloc_mmap_handler: 23973 20002000-20006000 already mapped failed -16 12:32:33 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:32:34 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x300000000000000, 0x2013, r1, 0x0) [ 1687.980006] kauditd_printk_skb: 140 callbacks suppressed [ 1687.980022] audit: type=1400 audit(1539520354.135:26495): avc: denied { validate_trans } for pid=23980 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 12:32:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 's"stem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1688.187670] audit: type=1400 audit(1539520354.175:26496): avc: denied { map } for pid=23977 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x2b00, 0x9, 0x2013, r0, 0x0) [ 1688.385459] audit: type=1400 audit(1539520354.195:26497): avc: denied { map } for pid=23977 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1688.564725] audit: type=1400 audit(1539520354.205:26498): avc: denied { validate_trans } for pid=23980 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1688.765413] audit: type=1400 audit(1539520354.265:26499): avc: denied { map } for pid=23981 comm="syz-executor5" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:32:35 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:32:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000000c0)=0x3) socket$packet(0x11, 0x3, 0x300) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r3 = dup2(r2, r1) write$P9_RSTAT(r3, &(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESDEC=r1, @ANYBLOB="ca26763d9a3052de1abc82b3c3159e5fc737e42ebe60bec4655bc014af0a50528bb9e9cf0c20ceef5c1fd860f18a73c24074c71502ec3144f81463df1b7be5c882e07345c3a56781d9ccacd6d09152c200f3e5e4e1baba3db4a04616443b26cad642c087026ec5b1e01b8fe86c733761f46938d88ac9256c033fa8436923a33e932479d6"]], 0x8) r4 = getpid() r5 = socket$bt_bnep(0x1f, 0x3, 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0xff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000740)={'veth1_to_bridge\x00', {0x2, 0x4e20, @loopback}}) r6 = syz_open_procfs(r4, &(0x7f0000000000)='net/l2cap\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f0000000040)={0x7f2}) sendmsg$kcm(r6, &(0x7f0000000b80)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x1, 0x1}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000440)="cb7501746695aeb461351eca8fab0f9e7883e5f5c4d3ade893fa168c060f0b07fb874890a63f22f58eb40642ec8017110044c50c36adfe54a52698655d861c7d5938b351a73e313419afa657feb76771f1998627b235478e882c9812a7202cbefda1558a24c9744b500389cc145c276b600ef42b9d32a48b12d38ae28a21b0509d4f466bd653ee7f7bd4168c5cae31d01a04579b44c92216eb9ed53ad71118014b0645021aeb6a95704f3ea6aaa996969b65b50396653f2e47f42bb64752b14347a867a4d4a84804eaac", 0xca}, {&(0x7f0000000280)="0a1f", 0x2}, {&(0x7f0000000540)="5d66db5ded7fdb98efa3a1ddd4e422259243de624bcd532ea5c6214da9129d18ef4f869a8cf6ebb6f137c7dd022f72c7743bb24916716c520f5bd2491b0ba18b7afc34b0fd35e0ce83b82c6358892e854224494052bbdcac86751ba8395acbac2c74a0ee423d50fba2ac6d367c0117db76bf1c2e39", 0x75}, {&(0x7f00000005c0)="b9152561aed0b74813ae21712fa4b037d50b0d6d1c2082a0869cc431d63eec35246b716e5c4566cc15aa46e02f833e20fd5ee49ab0d33fa79de5ad7aebfd71a1c7bfb226a57b77148ce19b2831", 0x4d}, {&(0x7f0000000640)="88daa2fb0ef807ff3315fb028d8871abb284452864a4ba34d65122e8dac6b448b030301e6bd70b637ab8f0c8aa3742aad447322c1b3323baee2a4a3b2a22d19682d0bf54cc1fbbeb5a3f20959ba11f21ae33dfc7a7ab27e2ad94b2a3142be9e317123a58af9e7cd5f17918ab078f3693fa5a5b6a1b9553ec9e1db085545d99fbc2814eec6748cf41a656840d460ee34cb7b3dd78172afb21dfc1b394d7d7ecf1fba81019f8b5df7f8867c6f3f17c906dd743a805c171e8e9641dcaff68b11798050d3c862b7a45b9bc7a43d02590dace0164b71c0b94a367964b6f71196a3903c12a7b7c7657ccae5cbce969d6be374563eadffbacb11705b3d393acce", 0xfd}, {&(0x7f0000000740)}, {&(0x7f0000000780)="cea3ffb32a65341fcc5c4ab7e2558691096c00918d27e64b439115b40abe5aa471e7614610bffa1b97332bca3d14c48d5789cce5008e17ea9454bc0acd8d5f68e27db8836a", 0x45}, {&(0x7f0000000800)="38bba5f6e823de7ff025e72412869e0943ac8640f45c8645f8c8f3b26ce5c8801c38847b2789c2bbd0ef4a0332d987df57d94e84624a41ad0cad623eba9172c5f98a3f099928c58c6db46dbd2da782b4718c21a7d3f05991b25d39508d65bd24fe612b0592b71cf5ba2b96cecfce0f0153eadc3382a59e20aa3434385d", 0x7d}, {&(0x7f0000000880)}], 0x9, &(0x7f0000000980)=[{0xc8, 0x102, 0x100000000, "f12a4106065f5d872ec80fa5391ae68bdf8cc22df616bf78dcd2b4d74203f823fdaa2ba726b9d9f2d0205bfdc38c8ec5cf02cc0b42dfdd1f2c86f39e5b47c6d887a54e710c828dee62f4ad2aeea1182aeb1721817e4ad87630c800b64d2d5bba06db4b1a724cc89cf95e3d2bc97383e53c92d691c55dd28c3f850e5df4cd0f4bc2edaf41f7a37ec2c5da8de92ce6572782a097cb1e32f378a1afa99d832888be08b15be2eccc2b58b9e027a7fbad7eeaca50898f1c"}, {0xf8, 0x11e, 0x5, "dbaeef1b5bd68b69e81a588d6f59176dc8184f13ac435606d020395d841cfe221761382a4b0e1ca4f174a458a86cbf49e7ba09e321702ddd00083c408720d67ad59cbc3e0bcfc6a942c5be9f610eac1639ff7150e953161164a6df3aa15bfaa83f7463991ae8116789f6cb6ab7c18c5fe9f09ba83893901d9ad5e2cde6acf0ac90cf6a7e22dbe5ea5bb2b26de41403401c58cbdf4bdb84f2a67fff42ce563864995d318bba810c03f1ac3f5783fc8a17a46fb20952b7afb27bf40aee43cf275778e86068b5cf64f7d10e290d111f32446b8e4afaf9daf80553cf468e7bba0e3e73c632ac80"}, {0x40, 0x19f, 0x0, "e1f0e5116af38dfb3c96d55ea44699e986b8125feb82c33b44f163146a951243fa6ae8d83f40b181e0b5"}], 0x200}, 0x40800) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) preadv(r7, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1688.944673] binder_alloc: binder_alloc_mmap_handler: 23993 20002000-20006000 already mapped failed -16 [ 1689.017793] audit: type=1400 audit(1539520354.275:26500): avc: denied { map } for pid=23977 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:35 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x8000a0ffffffff, 0x2013, r1, 0x0) [ 1689.178615] audit: type=1400 audit(1539520354.305:26501): avc: denied { map } for pid=23977 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 's:stem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1689.328766] audit: type=1400 audit(1539520354.775:26502): avc: denied { map } for pid=23991 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0xe80f, 0x9, 0x2013, r0, 0x0) [ 1689.514363] audit: type=1400 audit(1539520354.795:26503): avc: denied { map } for pid=23991 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1689.653257] audit: type=1400 audit(1539520354.835:26504): avc: denied { map } for pid=23991 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:35 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[], 0x0) [ 1690.205440] binder_alloc: binder_alloc_mmap_handler: 24013 20002000-20006000 already mapped failed -16 12:32:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy#tem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:36 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6c000000, 0x2013, r1, 0x0) 12:32:36 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x2200, 0x9, 0x2013, r0, 0x0) 12:32:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1690.920254] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1690.996664] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1691.029243] CPU: 0 PID: 24034 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #62 [ 1691.036572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1691.045933] Call Trace: [ 1691.045967] dump_stack+0x1c4/0x2b4 [ 1691.045992] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1691.046013] ? kasan_check_read+0x11/0x20 [ 1691.061613] warn_alloc.cold.119+0xb7/0x1bd [ 1691.065955] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1691.070820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1691.076398] __vmalloc_node_range+0x472/0x750 [ 1691.080908] ? graph_lock+0x170/0x170 [ 1691.084720] ? sel_write_load+0x1d1/0x460 [ 1691.088885] vmalloc+0x6f/0x80 [ 1691.092087] ? sel_write_load+0x1d1/0x460 [ 1691.096243] sel_write_load+0x1d1/0x460 [ 1691.100232] __vfs_write+0x119/0x9f0 [ 1691.104315] ? check_preemption_disabled+0x48/0x200 [ 1691.109348] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1691.114293] ? kernel_read+0x120/0x120 [ 1691.118199] ? __lock_is_held+0xb5/0x140 [ 1691.122282] ? rcu_read_lock_sched_held+0x108/0x120 [ 1691.127314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1691.132862] ? __sb_start_write+0x1b2/0x370 [ 1691.137202] vfs_write+0x1fc/0x560 [ 1691.140760] ksys_write+0x101/0x260 [ 1691.144412] ? __ia32_sys_read+0xb0/0xb0 [ 1691.148488] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1691.153955] __x64_sys_write+0x73/0xb0 [ 1691.157851] do_syscall_64+0x1b9/0x820 [ 1691.161750] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1691.167134] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1691.172081] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1691.176940] ? trace_hardirqs_on_caller+0x310/0x310 [ 1691.181969] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1691.186997] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1691.192033] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1691.196896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1691.202096] RIP: 0033:0x457569 [ 1691.205296] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1691.224208] RSP: 002b:00007f40361a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1691.231934] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1691.239217] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1691.246494] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1691.253770] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40361a56d4 [ 1691.261057] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff 12:32:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000000)={0xff, 0xffffffffffffeab9, 0xf2a}) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x0, 0x1000003) flistxattr(r0, &(0x7f0000000240)=""/248, 0xf8) 12:32:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syptem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3003, 0x9, 0x2013, r0, 0x0) [ 1691.668894] binder_alloc: binder_alloc_mmap_handler: 24040 20002000-20006000 already mapped failed -16 12:32:38 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x8000a0, 0x2013, r1, 0x0) [ 1692.413562] Mem-Info: [ 1692.416063] active_anon:219707 inactive_anon:2997 isolated_anon:0 [ 1692.416063] active_file:9553 inactive_file:45224 isolated_file:0 [ 1692.416063] unevictable:9453 dirty:90 writeback:0 unstable:0 [ 1692.416063] slab_reclaimable:19469 slab_unreclaimable:105782 [ 1692.416063] mapped:62751 shmem:3091 pagetables:5752 bounce:0 [ 1692.416063] free:1060885 free_pcp:919 free_cma:0 [ 1692.450481] Node 0 active_anon:878928kB inactive_anon:11988kB active_file:38212kB inactive_file:180896kB unevictable:37812kB isolated(anon):0kB isolated(file):0kB mapped:251004kB dirty:360kB writeback:0kB shmem:12364kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 462848kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1692.687647] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 12:32:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syotem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:39 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x7ffffffff000, 0x9, 0x2013, r0, 0x0) 12:32:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1692.915053] lowmem_reserve[]: 0 2819 6323 6323 [ 1692.952303] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1693.034995] kauditd_printk_skb: 119 callbacks suppressed [ 1693.035010] audit: type=1400 audit(1539520359.195:26624): avc: denied { map } for pid=24057 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1693.179263] binder_alloc: binder_alloc_mmap_handler: 24061 20002000-20006000 already mapped failed -16 [ 1693.195742] lowmem_reserve[]: 0 0 3503 3503 [ 1693.222785] audit: type=1400 audit(1539520359.245:26625): avc: denied { map } for pid=24057 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1693.259405] Node 0 Normal free:1337980kB min:37352kB low:46688kB high:56024kB active_anon:878784kB inactive_anon:11976kB active_file:38224kB inactive_file:180900kB unevictable:37812kB writepending:384kB present:4718592kB managed:3588044kB mlocked:37812kB kernel_stack:12256kB pagetables:22884kB bounce:0kB free_pcp:2816kB local_pcp:1316kB free_cma:0kB [ 1693.413275] audit: type=1400 audit(1539520359.285:26626): avc: denied { map } for pid=24057 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1693.455496] lowmem_reserve[]: 0 0 0 0 [ 1693.469226] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1693.546841] audit: type=1400 audit(1539520359.295:26627): avc: denied { map } for pid=24057 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1693.583873] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1693.662205] Node 0 Normal: 798*4kB (UME) 158*8kB (UME) 2347*16kB (UME) 1342*32kB (ME) 869*64kB (UME) 242*128kB (UME) 96*256kB (UME) 41*512kB (UM) 8*1024kB (UME) 2*2048kB (ME) 270*4096kB (UM) = 1335320kB [ 1693.726526] audit: type=1400 audit(1539520359.305:26628): avc: denied { map } for pid=24061 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1693.851850] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1693.903252] audit: type=1400 audit(1539520359.325:26629): avc: denied { map } for pid=24061 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1693.933654] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1693.942260] 62744 total pagecache pages [ 1693.993235] 0 pages in swap cache [ 1693.996736] Swap cache stats: add 0, delete 0, find 0/0 [ 1694.002102] Free swap = 0kB [ 1694.044034] Total swap = 0kB [ 1694.047102] 1965979 pages RAM [ 1694.050212] 0 pages HighMem/MovableOnly [ 1694.055675] audit: type=1400 audit(1539520359.425:26630): avc: denied { map } for pid=24061 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1694.123580] 342307 pages reserved [ 1694.127077] 0 pages cma reserved 12:32:40 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[], 0x0) 12:32:40 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x400000, 0x2013, r1, 0x0) 12:32:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00\x00\x00\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) ioperm(0xef3, 0x8000, 0xe15) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000240)=""/180) 12:32:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x2300, 0x9, 0x2013, r0, 0x0) 12:32:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy:tem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1694.257167] audit: type=1400 audit(1539520359.705:26631): avc: denied { map } for pid=24064 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1694.455687] audit: type=1400 audit(1539520359.755:26632): avc: denied { map } for pid=24064 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1694.620423] audit: type=1400 audit(1539520359.775:26633): avc: denied { map } for pid=24064 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1694.676021] binder_alloc: binder_alloc_mmap_handler: 24074 20002000-20006000 already mapped failed -16 12:32:41 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x300a, 0x9, 0x2013, r0, 0x0) [ 1694.826185] binder_alloc: binder_alloc_mmap_handler: 24074 20002000-20006000 already mapped failed -16 12:32:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0x1000, "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"}, &(0x7f0000001300)=0x1008) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001340)={r2, 0x58, &(0x7f00000013c0)=[@in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, @in6={0xa, 0x4e23, 0x7, @mcast2, 0x3}, @in6={0xa, 0x4e21, 0x4, @local, 0x7}]}, &(0x7f0000001440)=0x10) fstatfs(r1, &(0x7f0000000080)=""/45) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000240)=0x8) name_to_handle_at(r3, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x2d, 0x80000000, "ba57d375c6db4f233d336710e17828abf06aa46c75c63d20bddf4fd38706df135661389105"}, &(0x7f00000000c0), 0x1000) preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) 12:32:41 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x500000000000000, 0x2013, r1, 0x0) 12:32:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1695.174683] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1695.249180] syz-executor2 cpuset=syz2 mems_allowed=0 12:32:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syitem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1695.333308] CPU: 1 PID: 24093 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #62 [ 1695.340643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1695.350020] Call Trace: [ 1695.352635] dump_stack+0x1c4/0x2b4 [ 1695.356288] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1695.361497] ? kasan_check_read+0x11/0x20 [ 1695.365680] warn_alloc.cold.119+0xb7/0x1bd [ 1695.370026] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1695.374894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1695.380484] __vmalloc_node_range+0x472/0x750 [ 1695.385007] ? graph_lock+0x170/0x170 [ 1695.388835] ? sel_write_load+0x1d1/0x460 [ 1695.393011] vmalloc+0x6f/0x80 [ 1695.396229] ? sel_write_load+0x1d1/0x460 [ 1695.400394] sel_write_load+0x1d1/0x460 [ 1695.404397] __vfs_write+0x119/0x9f0 [ 1695.408134] ? check_preemption_disabled+0x48/0x200 [ 1695.413163] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1695.418110] ? kernel_read+0x120/0x120 [ 1695.422018] ? __lock_is_held+0xb5/0x140 [ 1695.426114] ? rcu_read_lock_sched_held+0x108/0x120 [ 1695.431148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1695.436705] ? __sb_start_write+0x1b2/0x370 [ 1695.441055] vfs_write+0x1fc/0x560 [ 1695.444634] ksys_write+0x101/0x260 [ 1695.448289] ? __ia32_sys_read+0xb0/0xb0 [ 1695.452367] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1695.457844] __x64_sys_write+0x73/0xb0 [ 1695.461748] do_syscall_64+0x1b9/0x820 [ 1695.465662] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1695.471043] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1695.475986] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1695.480886] ? trace_hardirqs_on_caller+0x310/0x310 [ 1695.485919] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1695.490951] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1695.496007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1695.500882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1695.506086] RIP: 0033:0x457569 [ 1695.509293] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1695.528213] RSP: 002b:00007f40361a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1695.535944] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1695.543235] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1695.550564] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1695.557846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40361a56d4 [ 1695.565128] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff 12:32:42 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3004, 0x9, 0x2013, r0, 0x0) [ 1695.883320] binder_alloc: binder_alloc_mmap_handler: 24098 20002000-20006000 already mapped failed -16 12:32:42 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x700000000000000, 0x2013, r1, 0x0) [ 1696.683812] binder_alloc: binder_alloc_mmap_handler: 24115 20002000-20006000 already mapped failed -16 [ 1696.722957] Mem-Info: [ 1696.737839] active_anon:219167 inactive_anon:2997 isolated_anon:0 [ 1696.737839] active_file:9556 inactive_file:45236 isolated_file:0 [ 1696.737839] unevictable:9453 dirty:105 writeback:0 unstable:0 [ 1696.737839] slab_reclaimable:19419 slab_unreclaimable:106196 [ 1696.737839] mapped:62769 shmem:3090 pagetables:5741 bounce:0 [ 1696.737839] free:1061184 free_pcp:872 free_cma:0 [ 1696.883476] Node 0 active_anon:876768kB inactive_anon:11988kB active_file:38224kB inactive_file:180944kB unevictable:37812kB isolated(anon):0kB isolated(file):0kB mapped:251076kB dirty:420kB writeback:0kB shmem:12360kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 464896kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1696.953741] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1697.013317] lowmem_reserve[]: 0 2819 6323 6323 [ 1697.017982] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1697.125689] lowmem_reserve[]: 0 0 3503 3503 [ 1697.137959] Node 0 Normal free:1338992kB min:37352kB low:46688kB high:56024kB active_anon:876768kB inactive_anon:11988kB active_file:38224kB inactive_file:180944kB unevictable:37812kB writepending:420kB present:4718592kB managed:3588044kB mlocked:37812kB kernel_stack:12192kB pagetables:22816kB bounce:0kB free_pcp:2020kB local_pcp:768kB free_cma:0kB [ 1697.205223] lowmem_reserve[]: 0 0 0 0 [ 1697.214587] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1697.245632] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1697.279067] Node 0 Normal: 943*4kB (UME) 250*8kB (UME) 2354*16kB (UME) 1343*32kB (UME) 824*64kB (UME) 248*128kB (UME) 99*256kB (UME) 41*512kB (UM) 8*1024kB (UME) 2*2048kB (ME) 271*4096kB (UM) = 1339532kB [ 1697.308134] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1697.327545] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1697.347893] 62751 total pagecache pages [ 1697.363791] 0 pages in swap cache [ 1697.367297] Swap cache stats: add 0, delete 0, find 0/0 [ 1697.372669] Free swap = 0kB [ 1697.383302] Total swap = 0kB [ 1697.386353] 1965979 pages RAM [ 1697.389462] 0 pages HighMem/MovableOnly 12:32:43 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[], 0x0) [ 1697.410510] 342307 pages reserved [ 1697.415946] 0 pages cma reserved 12:32:43 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4000000, 0x2013, r1, 0x0) 12:32:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') fstat(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x80, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap='mmap'}, {@access_client='access=client'}, {@access_client='access=client'}, {@access_user='access=user'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r4}}, {@cache_loose='cache=loose'}], [{@uid_lt={'uid<', r5}}]}}) preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy.tem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:43 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3002, 0x9, 0x2013, r0, 0x0) 12:32:43 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x400000, 0x9, 0x2013, r0, 0x0) [ 1697.610041] 9pnet: Insufficient options for proto=fd [ 1697.731728] binder_alloc: binder_alloc_mmap_handler: 24120 20002000-20006000 already mapped failed -16 [ 1697.762301] 9pnet: Insufficient options for proto=fd 12:32:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syXtem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:44 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xa000000, 0x2013, r1, 0x0) 12:32:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x6, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1698.102223] kauditd_printk_skb: 129 callbacks suppressed [ 1698.102238] audit: type=1400 audit(1539520364.255:26763): avc: denied { map } for pid=24136 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1698.199063] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1698.262721] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1698.291119] audit: type=1400 audit(1539520364.305:26764): avc: denied { map } for pid=24136 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1698.323824] CPU: 1 PID: 24138 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #62 [ 1698.331143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1698.340511] Call Trace: [ 1698.343120] dump_stack+0x1c4/0x2b4 [ 1698.346767] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1698.351985] ? kasan_check_read+0x11/0x20 [ 1698.356155] warn_alloc.cold.119+0xb7/0x1bd [ 1698.360494] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1698.365356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1698.370937] __vmalloc_node_range+0x472/0x750 [ 1698.375452] ? graph_lock+0x170/0x170 [ 1698.379270] ? sel_write_load+0x1d1/0x460 [ 1698.383443] vmalloc+0x6f/0x80 [ 1698.386648] ? sel_write_load+0x1d1/0x460 [ 1698.390909] sel_write_load+0x1d1/0x460 [ 1698.394900] __vfs_write+0x119/0x9f0 [ 1698.398631] ? check_preemption_disabled+0x48/0x200 [ 1698.403669] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1698.408613] ? kernel_read+0x120/0x120 [ 1698.412516] ? __lock_is_held+0xb5/0x140 [ 1698.416605] ? rcu_read_lock_sched_held+0x108/0x120 [ 1698.421637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1698.427192] ? __sb_start_write+0x1b2/0x370 [ 1698.431535] vfs_write+0x1fc/0x560 [ 1698.435094] ksys_write+0x101/0x260 [ 1698.438742] ? __ia32_sys_read+0xb0/0xb0 [ 1698.442831] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1698.448306] __x64_sys_write+0x73/0xb0 [ 1698.452215] do_syscall_64+0x1b9/0x820 [ 1698.456114] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1698.461493] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1698.466437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1698.471293] ? trace_hardirqs_on_caller+0x310/0x310 [ 1698.476326] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1698.481357] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1698.486393] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1698.491260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1698.496465] RIP: 0033:0x457569 [ 1698.499675] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1698.518589] RSP: 002b:00007f40361a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1698.526313] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1698.533615] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1698.540898] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1698.548174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40361a56d4 [ 1698.555455] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1698.659284] audit: type=1400 audit(1539520364.325:26765): avc: denied { map } for pid=24136 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:45 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x2, 0x9, 0x2013, r0, 0x0) [ 1698.838112] audit: type=1400 audit(1539520364.385:26766): avc: denied { map } for pid=24136 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1698.951124] binder_alloc: binder_alloc_mmap_handler: 24144 20002000-20006000 already mapped failed -16 [ 1698.991100] audit: type=1400 audit(1539520364.415:26767): avc: denied { map } for pid=24136 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1699.197207] audit: type=1400 audit(1539520364.425:26768): avc: denied { map } for pid=24136 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1699.379861] audit: type=1400 audit(1539520364.445:26769): avc: denied { map } for pid=24139 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1699.517885] audit: type=1400 audit(1539520364.445:26770): avc: denied { map } for pid=24139 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1699.622360] audit: type=1400 audit(1539520364.475:26771): avc: denied { map } for pid=24136 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1699.713554] audit: type=1400 audit(1539520364.485:26772): avc: denied { map } for pid=24139 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1699.863673] Mem-Info: [ 1699.871854] active_anon:219171 inactive_anon:2997 isolated_anon:0 [ 1699.871854] active_file:9559 inactive_file:45246 isolated_file:0 [ 1699.871854] unevictable:9453 dirty:119 writeback:0 unstable:0 [ 1699.871854] slab_reclaimable:19340 slab_unreclaimable:105926 [ 1699.871854] mapped:62755 shmem:3091 pagetables:5707 bounce:0 [ 1699.871854] free:1061537 free_pcp:937 free_cma:0 [ 1699.994307] Node 0 active_anon:876684kB inactive_anon:11988kB active_file:38236kB inactive_file:180984kB unevictable:37812kB isolated(anon):0kB isolated(file):0kB mapped:251020kB dirty:476kB writeback:0kB shmem:12364kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 462848kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1700.029622] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1700.057982] lowmem_reserve[]: 0 2819 6323 6323 [ 1700.062709] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1700.096686] lowmem_reserve[]: 0 0 3503 3503 [ 1700.101171] Node 0 Normal free:1341492kB min:37352kB low:46688kB high:56024kB active_anon:876684kB inactive_anon:11988kB active_file:38236kB inactive_file:180984kB unevictable:37812kB writepending:476kB present:4718592kB managed:3588044kB mlocked:37812kB kernel_stack:12192kB pagetables:22828kB bounce:0kB free_pcp:2284kB local_pcp:1080kB free_cma:0kB [ 1700.133027] lowmem_reserve[]: 0 0 0 0 [ 1700.137258] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1700.151494] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1700.167041] Node 0 Normal: 963*4kB (UME) 314*8kB (UME) 2346*16kB (UME) 1349*32kB (UME) 790*64kB (UME) 248*128kB (UME) 94*256kB (UME) 40*512kB (UM) 11*1024kB (UME) 3*2048kB (UME) 271*4096kB (UM) = 1341340kB [ 1700.187221] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 12:32:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) [ 1700.196227] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1700.205681] 62765 total pagecache pages [ 1700.209787] 0 pages in swap cache [ 1700.213718] Swap cache stats: add 0, delete 0, find 0/0 [ 1700.219438] Free swap = 0kB [ 1700.222539] Total swap = 0kB [ 1700.226038] 1965979 pages RAM [ 1700.229467] 0 pages HighMem/MovableOnly [ 1700.233988] 342307 pages reserved [ 1700.237808] 0 pages cma reserved 12:32:46 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3005, 0x9, 0x2013, r0, 0x0) 12:32:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7f010000, 0x2013, r1, 0x0) 12:32:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy%tem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11084, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xd5, "d5b72b419ad9b939da9d070a1a3b3a51ef85f483e7a444f7390332612a350a9454b940e1de5c6e509c0e04bf605b857c0989ece61fcc63a3de1282fd08b67a35b69db1bb16fd0bdf8ab6add4408b4115210b08db85db007bec2bc5f233ecc66e0a68a85f16c13c410ac053eee7f44e09fd765ba495edea89186d6ec1d7da145abd7bf1bf710f9a987612d62147e5e4a9d9ca42c7f1547c36b769ae780ba7986d6d05836fdd7547b0e711f6cf10334f8c1e09612ddfe36b538e349d056337758ec4f60fd2a58111ae87e975602a54d3af2b1bd1ef90"}, &(0x7f0000000000)=0xdd) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x5b4, 0x2, 0x1, 0xffffffffffffffc0, r1}, 0x10) creat(&(0x7f00000000c0)='./file0\x00', 0x90) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:46 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3006, 0x9, 0x2013, r0, 0x0) [ 1700.624137] binder_alloc: binder_alloc_mmap_handler: 24167 20002000-20006000 already mapped failed -16 12:32:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syltem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:47 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x600, 0x2013, r1, 0x0) 12:32:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x3b8, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:47 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) 12:32:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:47 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x307a, 0x9, 0x2013, r0, 0x0) [ 1701.994091] binder_alloc: binder_alloc_mmap_handler: 24191 20002000-20006000 already mapped failed -16 12:32:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy"tem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xa00, 0x2013, r1, 0x0) 12:32:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) 12:32:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x40004) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1702.755701] binder_alloc: binder_alloc_mmap_handler: 24209 20002000-20006000 already mapped failed -16 12:32:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x300b, 0x9, 0x2013, r0, 0x0) 12:32:49 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2, 0x2013, r1, 0x0) 12:32:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy0tem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1703.136772] kauditd_printk_skb: 135 callbacks suppressed [ 1703.136798] audit: type=1400 audit(1539520369.295:26908): avc: denied { map } for pid=24214 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1703.169588] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1703.223844] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1703.237695] CPU: 1 PID: 24218 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #62 [ 1703.244989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.254347] Call Trace: [ 1703.256952] dump_stack+0x1c4/0x2b4 [ 1703.260597] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1703.265811] ? kasan_check_read+0x11/0x20 [ 1703.269979] warn_alloc.cold.119+0xb7/0x1bd [ 1703.274315] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1703.279175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.284753] __vmalloc_node_range+0x472/0x750 [ 1703.289271] ? graph_lock+0x170/0x170 [ 1703.289294] ? sel_write_load+0x1d1/0x460 [ 1703.289316] vmalloc+0x6f/0x80 [ 1703.300441] ? sel_write_load+0x1d1/0x460 [ 1703.304600] sel_write_load+0x1d1/0x460 [ 1703.308592] __vfs_write+0x119/0x9f0 [ 1703.312321] ? check_preemption_disabled+0x48/0x200 [ 1703.312339] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1703.312357] ? kernel_read+0x120/0x120 [ 1703.312378] ? __lock_is_held+0xb5/0x140 [ 1703.317533] audit: type=1400 audit(1539520369.325:26909): avc: denied { map } for pid=24214 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1703.322321] ? rcu_read_lock_sched_held+0x108/0x120 [ 1703.322340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.322358] ? __sb_start_write+0x1b2/0x370 [ 1703.369587] vfs_write+0x1fc/0x560 [ 1703.373143] ksys_write+0x101/0x260 [ 1703.376795] ? __ia32_sys_read+0xb0/0xb0 [ 1703.380879] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1703.386350] __x64_sys_write+0x73/0xb0 [ 1703.390252] do_syscall_64+0x1b9/0x820 [ 1703.392655] audit: type=1400 audit(1539520369.375:26910): avc: denied { map } for pid=24214 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1703.394144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1703.394164] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1703.394179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1703.394199] ? trace_hardirqs_on_caller+0x310/0x310 [ 1703.394219] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1703.443375] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1703.448416] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1703.453284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1703.458485] RIP: 0033:0x457569 [ 1703.461689] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1703.480602] RSP: 002b:00007f40361a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1703.488321] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1703.495594] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1703.502871] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1703.510158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40361a56d4 [ 1703.517439] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1703.596482] audit: type=1400 audit(1539520369.395:26911): avc: denied { map } for pid=24214 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1703.804611] audit: type=1400 audit(1539520369.395:26912): avc: denied { map } for pid=24219 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1703.921122] binder_alloc: binder_alloc_mmap_handler: 24224 20002000-20006000 already mapped failed -16 [ 1704.048963] audit: type=1400 audit(1539520369.395:26913): avc: denied { map } for pid=24214 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:50 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7f01000000000000, 0x2013, r1, 0x0) [ 1704.230563] audit: type=1400 audit(1539520369.395:26914): avc: denied { map } for pid=24219 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x6, 0x2013, r0, 0x0) 12:32:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0xfffffffffffffffc) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x4, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1704.453606] audit: type=1400 audit(1539520369.395:26915): avc: denied { map } for pid=24214 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy+tem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1704.613480] audit: type=1400 audit(1539520369.395:26916): avc: denied { map } for pid=24219 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1704.800446] audit: type=1400 audit(1539520369.395:26917): avc: denied { map } for pid=24219 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1705.099404] binder_alloc: binder_alloc_mmap_handler: 24240 20002000-20006000 already mapped failed -16 [ 1705.600835] Mem-Info: [ 1705.619361] active_anon:219209 inactive_anon:2996 isolated_anon:0 [ 1705.619361] active_file:9561 inactive_file:45257 isolated_file:0 [ 1705.619361] unevictable:9453 dirty:132 writeback:0 unstable:0 [ 1705.619361] slab_reclaimable:19236 slab_unreclaimable:105690 [ 1705.619361] mapped:62766 shmem:3092 pagetables:5731 bounce:0 [ 1705.619361] free:1061759 free_pcp:945 free_cma:0 [ 1705.849566] Node 0 active_anon:878908kB inactive_anon:11984kB active_file:38244kB inactive_file:181028kB unevictable:37812kB isolated(anon):0kB isolated(file):0kB mapped:251064kB dirty:528kB writeback:0kB shmem:12368kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 464896kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1706.073241] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1706.261603] lowmem_reserve[]: 0 2819 6323 6323 [ 1706.295487] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1706.414701] lowmem_reserve[]: 0 0 3503 3503 [ 1706.419116] Node 0 Normal free:1338812kB min:37352kB low:46688kB high:56024kB active_anon:879008kB inactive_anon:11984kB active_file:38244kB inactive_file:181028kB unevictable:37812kB writepending:528kB present:4718592kB managed:3588044kB mlocked:37812kB kernel_stack:12288kB pagetables:22924kB bounce:0kB free_pcp:2336kB local_pcp:1112kB free_cma:0kB [ 1706.609343] lowmem_reserve[]: 0 0 0 0 [ 1706.622466] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1706.667463] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1706.713348] Node 0 Normal: 929*4kB (UME) 236*8kB (UME) 2355*16kB (UME) 1353*32kB (UME) 750*64kB (UME) 236*128kB (UME) 96*256kB (UME) 40*512kB (UM) 13*1024kB (UME) 3*2048kB (UE) 271*4096kB (UM) = 1339316kB [ 1706.753378] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1706.762249] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1706.789980] 62782 total pagecache pages [ 1706.795858] 0 pages in swap cache [ 1706.799323] Swap cache stats: add 0, delete 0, find 0/0 12:32:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000"], 0x14) [ 1706.815021] Free swap = 0kB [ 1706.818069] Total swap = 0kB [ 1706.821088] 1965979 pages RAM [ 1706.836680] 0 pages HighMem/MovableOnly [ 1706.840671] 342307 pages reserved [ 1706.845920] 0 pages cma reserved 12:32:53 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xb00, 0x2013, r1, 0x0) 12:32:53 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xa, 0x2013, r0, 0x0) 12:32:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syctem_u:system_r:kernel_t:s0\x00'}, 0x78) 12:32:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:53 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x5, 0x2013, r0, 0x0) 12:32:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syztem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1707.163330] binder_alloc: binder_alloc_mmap_handler: 24263 20002000-20006000 already mapped failed -16 12:32:53 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xe4, 0x2013, r1, 0x0) 12:32:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x5) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x100, 0x0) [ 1707.830746] SELinux: failed to load policy 12:32:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000"], 0x14) 12:32:54 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4, 0x2013, r0, 0x0) [ 1708.155135] kauditd_printk_skb: 125 callbacks suppressed [ 1708.155151] audit: type=1400 audit(1539520374.315:27043): avc: denied { map } for pid=24283 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy[tem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1708.373981] binder_alloc: binder_alloc_mmap_handler: 24286 20002000-20006000 already mapped failed -16 [ 1708.408979] audit: type=1400 audit(1539520374.415:27044): avc: denied { map } for pid=24283 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:54 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x200000000000000, 0x2013, r1, 0x0) 12:32:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1708.627634] audit: type=1400 audit(1539520374.425:27045): avc: denied { map } for pid=24279 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1708.817012] audit: type=1400 audit(1539520374.425:27046): avc: denied { map } for pid=24283 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1708.955720] SELinux: failed to load policy [ 1708.991137] audit: type=1400 audit(1539520374.435:27047): avc: denied { map } for pid=24279 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000"], 0x14) 12:32:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x9) 12:32:55 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x180, 0x2013, r0, 0x0) [ 1709.234763] audit: type=1400 audit(1539520374.445:27048): avc: denied { map } for pid=24290 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1709.332140] binder_alloc: binder_alloc_mmap_handler: 24305 20002000-20006000 already mapped failed -16 12:32:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syxtem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1709.374296] audit: type=1400 audit(1539520374.445:27049): avc: denied { map } for pid=24290 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:55 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x74000000, 0x2013, r1, 0x0) [ 1709.551390] audit: type=1400 audit(1539520374.485:27050): avc: denied { map } for pid=24290 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1709.732036] audit: type=1400 audit(1539520374.495:27051): avc: denied { map } for pid=24286 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1709.974923] SELinux: failed to load policy [ 1710.003311] audit: type=1400 audit(1539520374.505:27052): avc: denied { map } for pid=24290 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000080000000700"], 0x1e) 12:32:56 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xb, 0x2013, r0, 0x0) 12:32:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x2f, 0x0, 0x0, 0x4, 0xa, 0x9, 0x1, 0x26, 0x1}}) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syhtem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1710.675935] binder_alloc: binder_alloc_mmap_handler: 24328 20002000-20006000 already mapped failed -16 12:32:56 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x47030000, 0x2013, r1, 0x0) [ 1710.986818] SELinux: failed to load policy 12:32:57 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000080000000700"], 0x1e) 12:32:57 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xe, 0x2013, r0, 0x0) 12:32:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="6e65702f7061636b65740066f17d31979553fb510dfb8128683acc9017f8a5a69d3d5d6fc78ccee8568abd0a6eaf8d892a66f7c652df46a79084772005ba21261bcec36bfb5253758f4dbfe8496290e70ec57e04685385d1495d022e79970c5dc32bf7545acd248746959d5ccc") preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:32:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy-tem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1711.848497] binder_alloc: binder_alloc_mmap_handler: 24347 20002000-20006000 already mapped failed -16 12:32:58 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6800, 0x2013, r1, 0x0) 12:32:58 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000080000000700"], 0x1e) 12:32:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:32:58 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x17f, 0x2013, r0, 0x0) 12:32:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sydtem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1712.880860] binder_alloc: binder_alloc_mmap_handler: 24364 20002000-20006000 already mapped failed -16 12:32:59 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x3, 0x2013, r1, 0x0) 12:32:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000000)=0xf001) [ 1713.169562] SELinux: failed to load policy 12:32:59 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c00"], 0x23) [ 1713.232844] kauditd_printk_skb: 137 callbacks suppressed [ 1713.232858] audit: type=1400 audit(1539520379.385:27190): avc: denied { map } for pid=24371 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1713.385988] audit: type=1400 audit(1539520379.435:27191): avc: denied { map } for pid=24371 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1713.531447] audit: type=1400 audit(1539520379.495:27192): avc: denied { map } for pid=24371 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:32:59 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x10, 0x2013, r0, 0x0) [ 1713.782217] audit: type=1400 audit(1539520379.505:27193): avc: denied { map } for pid=24371 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syntem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1713.900382] binder_alloc: binder_alloc_mmap_handler: 24378 20002000-20006000 already mapped failed -16 [ 1713.987849] audit: type=1400 audit(1539520379.765:27194): avc: denied { map } for pid=24377 comm="syz-executor5" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:33:00 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x68000000, 0x2013, r1, 0x0) [ 1714.211627] audit: type=1400 audit(1539520379.885:27195): avc: denied { validate_trans } for pid=24379 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1714.389354] audit: type=1400 audit(1539520380.025:27196): avc: denied { map } for pid=24378 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:33:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c00"], 0x23) 12:33:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1714.653081] audit: type=1400 audit(1539520380.025:27197): avc: denied { map } for pid=24378 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:33:01 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x11, 0x2013, r0, 0x0) [ 1714.818173] audit: type=1400 audit(1539520380.125:27198): avc: denied { map } for pid=24378 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:33:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4080, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x7, 0xffffffffffff3ebc, 0x100, 0x0, 0x5, 0x6, 0x4, {0x0, @in6={{0xa, 0x4e20, 0x0, @loopback, 0x400}}, 0x10000, 0x4, 0x420, 0x800, 0x4}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x3, 0x203, 0xa8d, 0x0, r2}, 0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={r3, 0x3f}, &(0x7f0000000340)=0xfffffffffffffed0) socket$packet(0x11, 0x0, 0x300) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="00fb840506cdc97877db6f1be5db2f000512eb1e7f0656b739a976d303eea82af93a8ffe145d404c6dde7719df80c9693178242918db1be9a92760694da6b4526da3f361dd51738b625074e68b8d098cfd5b2f2ee678193b5bb9d41b9939a801c5905315dda9996924e33f194da2cc2101152380f9df4c826cd90c0cd50d3a43d7f256d9"], 0x84, 0x1) preadv(r5, &(0x7f0000000480), 0x1000000000000286, 0x1000000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000480)={r4, 0x19}, &(0x7f00000004c0)=0x8) socket$rds(0x15, 0x5, 0x0) [ 1715.045365] audit: type=1400 audit(1539520380.225:27199): avc: denied { map } for pid=24385 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syutem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1715.261621] binder_alloc: binder_alloc_mmap_handler: 24404 20002000-20006000 already mapped failed -16 12:33:01 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x400000000000000, 0x2013, r1, 0x0) [ 1715.542289] SELinux: failed to load policy 12:33:01 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c00"], 0x23) 12:33:02 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x62c, 0x2013, r0, 0x0) 12:33:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) chroot(&(0x7f0000000000)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000286, 0x1000000) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0xffffffff}, 0x10) 12:33:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sy*tem_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1716.562152] SELinux: failed to load policy [ 1716.562247] binder_alloc: binder_alloc_mmap_handler: 24424 20002000-20006000 already mapped failed -16 12:33:02 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c00001000"], 0x26) 12:33:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:02 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4603000000000000, 0x2013, r1, 0x0) 12:33:03 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x14, 0x2013, r0, 0x0) 12:33:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sys"em_u:system_r:kernel_t:s0\x00'}, 0x78) 12:33:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1717.505190] SELinux: failed to load policy 12:33:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c00001000"], 0x26) 12:33:03 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x480, 0x2013, r0, 0x0) [ 1717.642750] binder_alloc: binder_alloc_mmap_handler: 24446 20002000-20006000 already mapped failed -16 12:33:04 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4703, 0x2013, r1, 0x0) [ 1718.251170] kauditd_printk_skb: 125 callbacks suppressed [ 1718.251185] audit: type=1400 audit(1539520384.405:27325): avc: denied { map } for pid=24455 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1718.256775] audit: type=1400 audit(1539520384.405:27326): avc: denied { map } for pid=24455 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sys%em_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1718.760000] audit: type=1400 audit(1539520384.465:27327): avc: denied { validate_trans } for pid=24456 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1718.918340] SELinux: failed to load policy 12:33:05 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x2, 0x2013, r0, 0x0) [ 1718.944030] audit: type=1400 audit(1539520384.585:27328): avc: denied { map } for pid=24455 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:05 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c00001000"], 0x26) [ 1719.105660] audit: type=1400 audit(1539520384.705:27329): avc: denied { map } for pid=24455 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0xc5) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000280)={[], 0xe8, 0x100000001, 0x2, 0x0, 0x2, 0x10d000, 0x0, [], 0x6}) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') recvfrom(r2, &(0x7f0000000480)=""/230, 0xe6, 0x40002042, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x7, 0x80, 0x2, 0x7, 0x1}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000440)={r4, 0x5, 0xfff, 0x2, 0x3b, 0x28d}, &(0x7f0000000100)=0x14) preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1719.273628] audit: type=1400 audit(1539520384.745:27330): avc: denied { map } for pid=24455 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1719.295233] binder_alloc: binder_alloc_mmap_handler: 24473 20002000-20006000 already mapped failed -16 [ 1719.414984] audit: type=1400 audit(1539520384.855:27331): avc: denied { map } for pid=24455 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:05 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7f01, 0x2013, r1, 0x0) 12:33:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'sys:em_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1719.604204] audit: type=1400 audit(1539520384.855:27332): avc: denied { map } for pid=24455 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1719.727927] audit: type=1400 audit(1539520384.975:27333): avc: denied { map } for pid=24455 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1719.871701] audit: type=1400 audit(1539520384.975:27334): avc: denied { map } for pid=24455 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:06 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x12, 0x2013, r0, 0x0) 12:33:06 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000100000"], 0x27) 12:33:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1720.650863] binder_alloc: binder_alloc_mmap_handler: 24494 20002000-20006000 already mapped failed -16 12:33:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0xa, &(0x7f00000002c0)=']}selinux\x00', 0x0}, 0x30) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000180)=""/52) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e0000000000000000000000000040000000000000000000000000000000e520885c0327fb592aeb764f3f00000000000000000000000000000000000000000000fe000000b4ffb89046c55ea84ce5f94b00000000000000000000000000000000000016000000190000000000000000000000104f9462534499f4f4"], 0x8e) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000880)=[&(0x7f0000000640)='\x00', &(0x7f00000007c0)="733ad9847461976d00a6ecde50aa85007e30ff0a7b15668167f001c2171efc2826603558cd6b80cbedb604f0acecab69d1821fc6da7071100c", &(0x7f0000000840)="733ad9847461976d00a6ecde50aa85007e30ff0a7b15668167f001c2171efc2826603558cd6b80cbedb604f0acecab69d1821fc6da7071100c"], 0x1000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r1, r0, 0x0, 0x6, &(0x7f0000000280)="6e450100", r3}, 0x30) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r7 = socket$packet(0x11, 0xfffffffffffffffe, 0x300) ioctl$TIOCMBIS(r7, 0x5416, &(0x7f0000000380)=0x20) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) fcntl$getown(r6, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0x2f, &(0x7f0000000100)='@]-:.:&GPL$.vmnet0{posix_acl_accessvboxnet1em0\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r8, &(0x7f0000000000)="6e45010000000000000000") preadv(r2, &(0x7f0000000480), 0x27c, 0x38) 12:33:06 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xc, 0x2013, r0, 0x0) 12:33:07 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x100000000000000, 0x2013, r1, 0x0) 12:33:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syst:m_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1721.044992] SELinux: failed to load policy 12:33:07 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000100000"], 0x27) 12:33:07 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x2013, r0, 0x0) [ 1722.002315] binder_alloc: binder_alloc_mmap_handler: 24513 20002000-20006000 already mapped failed -16 12:33:08 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4000000000000, 0x2013, r1, 0x0) 12:33:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syst"m_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1722.398388] SELinux: failed to load policy 12:33:08 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0xca) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000286, 0x1000000) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) 12:33:08 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000100000"], 0x27) 12:33:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xaa, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:09 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x223, 0x2013, r0, 0x0) [ 1723.192678] binder_alloc: binder_alloc_mmap_handler: 24540 20002000-20006000 already mapped failed -16 [ 1723.272169] kauditd_printk_skb: 153 callbacks suppressed [ 1723.272183] audit: type=1400 audit(1539520389.425:27488): avc: denied { map } for pid=24545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1723.348723] SELinux: failed to load policy 12:33:09 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4, 0x2013, r1, 0x0) [ 1723.406532] audit: type=1400 audit(1539520389.465:27490): avc: denied { map } for pid=24545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syst%m_u:system_r:kernel_t:s0\x00'}, 0x78) 12:33:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x10e, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1723.628235] audit: type=1400 audit(1539520389.465:27489): avc: denied { map } for pid=24540 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:33:09 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$BINDER_SET_MAX_THREADS(r0, 0xc0046209, 0x0) [ 1723.893311] audit: type=1400 audit(1539520389.495:27491): avc: denied { map } for pid=24545 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_matches\x00') preadv(r1, &(0x7f00000000c0), 0x0, 0x1000000) bind$unix(r0, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000000c0)) [ 1724.063290] audit: type=1400 audit(1539520389.505:27492): avc: denied { map } for pid=24545 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:10 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x3, 0x2013, r0, 0x0) [ 1724.223712] audit: type=1400 audit(1539520389.515:27493): avc: denied { map } for pid=24542 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1724.335059] binder: 24561:24566 ioctl c0046209 0 returned -22 [ 1724.360539] audit: type=1400 audit(1539520389.545:27494): avc: denied { map } for pid=24545 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:10 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x57, 0x0, 0x0, 0x0, @multicast2, @multicast2}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000240)) [ 1724.490563] binder_alloc: binder_alloc_mmap_handler: 24564 20002000-20006000 already mapped failed -16 [ 1724.566967] audit: type=1400 audit(1539520389.565:27495): avc: denied { map } for pid=24542 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:10 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xa0008000, 0x2013, r1, 0x0) 12:33:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syste%_u:system_r:kernel_t:s0\x00'}, 0x78) [ 1724.792482] audit: type=1400 audit(1539520389.615:27496): avc: denied { map } for pid=24542 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.060412] audit: type=1400 audit(1539520389.625:27497): avc: denied { map } for pid=24545 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:11 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x8, 0x2013, r0, 0x0) 12:33:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = semget(0x2, 0x1, 0x200) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000240)=""/222) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000540)) socket$xdp(0x2c, 0x3, 0x0) ioprio_set$uid(0x3, r5, 0x0) 12:33:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x13f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1725.697750] binder_alloc: binder_alloc_mmap_handler: 24590 20002000-20006000 already mapped failed -16 12:33:11 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x10, 0x0, &(0x7f0000000700)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="852a6273d0e4"], @ANYPTR64=&(0x7f0000000600)=ANY=[]], 0x0, 0x0, &(0x7f00000007c0)}) 12:33:12 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x347, 0x2013, r1, 0x0) 12:33:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'syste:_u:system_r:kernel_t:s0\x00'}, 0x78) 12:33:12 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x7, 0x2013, r0, 0x0) [ 1726.642106] binder: 24606:24610 unknown command 536872064 [ 1726.652572] binder: 24606:24610 ioctl c0306201 200002c0 returned -22 [ 1726.761031] binder: 24606:24613 unknown command 536872064 [ 1726.807769] binder: 24606:24613 ioctl c0306201 200002c0 returned -22 12:33:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000240)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000580)="65640fd2134f0fc71bc74424007b2866adc744240200900000c7442406000000000f0114240fc71df70000000f01b7542f000066baf80cb830521280ef66bafc0cb0d0ee0f0139460f01cbe48a0f005c8100"}], 0x1, 0x0, &(0x7f0000000000), 0x310) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000), &(0x7f0000000080)=0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1726.929219] binder_alloc: binder_alloc_mmap_handler: 24609 20002000-20006000 already mapped failed -16 12:33:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x64, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:13 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x346, 0x2013, r1, 0x0) 12:33:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, "73797374656ddf753a73797374656d5f723a6b65726e656c5f743a733000"}, 0x78) 12:33:13 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x8}, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000ff8)={0x0, 0x989680}, &(0x7f0000000ff8)={&(0x7f0000000ff8), 0x8}) 12:33:13 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2014, r0, 0x0) 12:33:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1728.210453] binder_alloc: binder_alloc_mmap_handler: 24631 20002000-20006000 already mapped failed -16 12:33:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system:u:system_r:kernel_t:s0\x00'}, 0x78) 12:33:14 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x48000000, 0x2013, r1, 0x0) [ 1728.371997] kauditd_printk_skb: 139 callbacks suppressed [ 1728.372013] audit: type=1400 audit(1539520394.525:27637): avc: denied { map } for pid=24635 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = semget(0x2, 0x1, 0x200) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000240)=""/222) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000540)) socket$xdp(0x2c, 0x3, 0x0) ioprio_set$uid(0x3, r5, 0x0) 12:33:14 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7000000) [ 1728.605549] audit: type=1400 audit(1539520394.565:27638): avc: denied { map } for pid=24635 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1728.855667] audit: type=1400 audit(1539520394.675:27639): avc: denied { map } for pid=24635 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1728.996011] audit: type=1400 audit(1539520394.695:27640): avc: denied { map } for pid=24635 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1e, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1729.214685] audit: type=1400 audit(1539520395.345:27641): avc: denied { map } for pid=24652 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = semget(0x2, 0x1, 0x200) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000240)=""/222) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000540)) socket$xdp(0x2c, 0x3, 0x0) ioprio_set$uid(0x3, r5, 0x0) [ 1729.321957] binder_alloc: binder_alloc_mmap_handler: 24651 20002000-20006000 already mapped failed -16 [ 1729.365381] audit: type=1400 audit(1539520395.345:27642): avc: denied { map } for pid=24652 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_i:system_r:kernel_t:s0\x00'}, 0x78) 12:33:15 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x80040000, 0x2013, r1, 0x0) [ 1729.572153] audit: type=1400 audit(1539520395.375:27643): avc: denied { map } for pid=24652 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1729.788521] audit: type=1400 audit(1539520395.405:27644): avc: denied { map } for pid=24652 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:16 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7400) [ 1729.932910] audit: type=1400 audit(1539520395.435:27645): avc: denied { map } for pid=24655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = semget(0x2, 0x1, 0x200) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000240)=""/222) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000286, 0x1000000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000540)) socket$xdp(0x2c, 0x3, 0x0) ioprio_set$uid(0x3, r5, 0x0) [ 1730.112844] audit: type=1400 audit(1539520395.435:27646): avc: denied { validate_trans } for pid=24653 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1730.470072] binder_alloc: binder_alloc_mmap_handler: 24669 20002000-20006000 already mapped failed -16 12:33:16 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x300, 0x2013, r1, 0x0) 12:33:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_*:system_r:kernel_t:s0\x00'}, 0x78) 12:33:17 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x40000000) 12:33:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x12d, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4080, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x7, 0xffffffffffff3ebc, 0x100, 0x0, 0x5, 0x6, 0x4, {0x0, @in6={{0xa, 0x4e20, 0x0, @loopback, 0x400}}, 0x10000, 0x4, 0x420, 0x800, 0x4}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x3, 0x203, 0xa8d, 0x0, r2}, 0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={r3, 0x3f}, &(0x7f0000000340)=0xfffffffffffffed0) socket$packet(0x11, 0x0, 0x300) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="00fb840506cdc97877db6f1be5db2f000512eb1e7f0656b739a976d303eea82af93a8ffe145d404c6dde7719df80c9693178242918db1be9a92760694da6b4526da3f361dd51738b625074e68b8d098cfd5b2f2ee678193b5bb9d41b9939a801c5905315dda9996924e33f194da2cc2101152380f9df4c826cd90c0cd50d3a43d7f256d9"], 0x84, 0x1) preadv(r5, &(0x7f0000000480), 0x1000000000000286, 0x1000000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000480)={r4, 0x19}, &(0x7f00000004c0)=0x8) socket$rds(0x15, 0x5, 0x0) [ 1731.771522] binder_alloc: binder_alloc_mmap_handler: 24688 20002000-20006000 already mapped failed -16 12:33:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_p:system_r:kernel_t:s0\x00'}, 0x78) 12:33:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6, 0x2013, r1, 0x0) 12:33:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x3b8, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:33:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x2b, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:18 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x74000000) 12:33:18 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7f010000, 0x2013, r1, 0x0) [ 1733.029259] binder_alloc: binder_alloc_mmap_handler: 24711 20002000-20006000 already mapped failed -16 12:33:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_x:system_r:kernel_t:s0\x00'}, 0x78) 12:33:19 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xff03000000000000, 0x2013, r1, 0x0) 12:33:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') r1 = semget$private(0x0, 0x3, 0x1) semctl$SETVAL(r1, 0x40000003, 0x10, &(0x7f0000000700)=0xfffffffffffffff7) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) process_vm_writev(r2, &(0x7f0000000400)=[{&(0x7f0000000240)=""/161, 0xa1}, {&(0x7f00000000c0)=""/121, 0x79}, {&(0x7f0000000300)=""/212, 0xd4}], 0x3, &(0x7f0000000680)=[{&(0x7f0000000440)=""/233, 0xe9}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/19, 0x13}, {&(0x7f0000000580)=""/75, 0x4b}, {&(0x7f0000000600)=""/99, 0x63}], 0x6, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 12:33:19 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x40000) [ 1733.587468] kauditd_printk_skb: 131 callbacks suppressed [ 1733.587484] audit: type=1400 audit(1539520399.735:27778): avc: denied { map } for pid=24722 comm="syz-executor2" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1733.664369] binder_alloc: binder_alloc_mmap_handler: 24722 20002000-20006000 already mapped failed -16 [ 1733.788226] audit: type=1400 audit(1539520399.805:27779): avc: denied { map } for pid=24722 comm="syz-executor2" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:33:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) [ 1734.006308] audit: type=1400 audit(1539520399.895:27780): avc: denied { map } for pid=24722 comm="syz-executor2" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1734.231980] audit: type=1400 audit(1539520400.105:27781): avc: denied { map } for pid=24727 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x14d, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4000) [ 1734.394538] binder_alloc: binder_alloc_mmap_handler: 24734 20002000-20006000 already mapped failed -16 [ 1734.451140] audit: type=1400 audit(1539520400.115:27782): avc: denied { map } for pid=24727 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_%:system_r:kernel_t:s0\x00'}, 0x78) 12:33:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6b6b6b00000000, 0x2013, r1, 0x0) [ 1734.673655] audit: type=1400 audit(1539520400.145:27783): avc: denied { map } for pid=24727 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:20 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1734.826246] audit: type=1400 audit(1539520400.195:27784): avc: denied { map } for pid=24727 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.043259] audit: type=1400 audit(1539520400.265:27785): avc: denied { map } for pid=24727 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.236079] audit: type=1400 audit(1539520400.275:27786): avc: denied { map } for pid=24731 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0xfffffffffffffffd) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000), 0x14) close(r2) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) close(r1) [ 1735.413565] audit: type=1400 audit(1539520400.285:27787): avc: denied { map } for pid=24731 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_.:system_r:kernel_t:s0\x00'}, 0x78) [ 1735.515014] binder_alloc: binder_alloc_mmap_handler: 24752 20002000-20006000 already mapped failed -16 12:33:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4800) 12:33:21 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7a000000, 0x2013, r1, 0x0) [ 1735.690611] FAULT_INJECTION: forcing a failure. [ 1735.690611] name failslab, interval 1, probability 0, space 0, times 0 [ 1735.794382] CPU: 1 PID: 24762 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #62 [ 1735.801712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1735.811075] Call Trace: [ 1735.813694] dump_stack+0x1c4/0x2b4 [ 1735.817345] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1735.822706] ? mark_held_locks+0x130/0x130 [ 1735.826983] should_fail.cold.4+0xa/0x17 [ 1735.831057] ? flex_array_get_ptr+0x49/0x60 [ 1735.835393] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1735.840513] ? context_struct_compute_av+0x1600/0x1600 [ 1735.845817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1735.851369] ? graph_lock+0x170/0x170 [ 1735.855183] ? flex_array_get_ptr+0x49/0x60 [ 1735.859518] ? avtab_search_node+0x425/0x550 [ 1735.863941] ? graph_lock+0x170/0x170 [ 1735.867759] ? print_usage_bug+0xc0/0xc0 [ 1735.871840] ? find_held_lock+0x36/0x1c0 [ 1735.875924] ? find_held_lock+0x36/0x1c0 [ 1735.880010] __should_failslab+0x124/0x180 [ 1735.884265] should_failslab+0x9/0x14 [ 1735.888083] kmem_cache_alloc+0x47/0x730 [ 1735.892159] ? trace_hardirqs_on+0xbd/0x310 [ 1735.896492] ? kasan_check_read+0x11/0x20 [ 1735.900651] ? avc_compute_av+0x2c5/0x800 [ 1735.904828] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1735.910293] avc_alloc_node+0x2a/0x5e0 [ 1735.914200] avc_compute_av+0x2d1/0x800 [ 1735.918186] ? avc_has_perm+0xe4/0x7e0 [ 1735.922089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1735.927646] ? avc_alloc_node+0x5e0/0x5e0 [ 1735.931819] ? kasan_check_read+0x11/0x20 [ 1735.935980] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1735.941274] ? rcu_bh_qs+0xc0/0xc0 [ 1735.944832] ? __fdget_pos+0x1bb/0x200 [ 1735.948733] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1735.955044] avc_has_perm+0x3c9/0x7e0 [ 1735.958863] ? avc_has_perm_noaudit+0x630/0x630 [ 1735.963557] ? ksys_dup3+0x680/0x680 [ 1735.967290] ? graph_lock+0x170/0x170 [ 1735.971118] sel_write_load+0x154/0x460 [ 1735.975114] __vfs_write+0x119/0x9f0 [ 1735.978860] ? check_preemption_disabled+0x48/0x200 [ 1735.983892] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1735.988839] ? kernel_read+0x120/0x120 [ 1735.992748] ? __lock_is_held+0xb5/0x140 [ 1735.996844] ? rcu_read_lock_sched_held+0x108/0x120 [ 1736.002176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1736.007721] ? __sb_start_write+0x1b2/0x370 [ 1736.012064] vfs_write+0x1fc/0x560 [ 1736.015626] ksys_write+0x101/0x260 [ 1736.019275] ? __ia32_sys_read+0xb0/0xb0 [ 1736.023353] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1736.028829] __x64_sys_write+0x73/0xb0 [ 1736.032735] do_syscall_64+0x1b9/0x820 [ 1736.036633] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1736.042017] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1736.046961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1736.051827] ? trace_hardirqs_on_caller+0x310/0x310 [ 1736.056860] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1736.061888] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1736.066923] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1736.071799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1736.076994] RIP: 0033:0x457569 [ 1736.080200] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1736.099109] RSP: 002b:00007f75aa451c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1736.106835] RAX: ffffffffffffffda RBX: 00007f75aa451c90 RCX: 0000000000457569 [ 1736.114110] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 0000000000000003 [ 1736.121389] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1736.128673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75aa4526d4 [ 1736.135956] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 0000000000000004 12:33:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$NBD_DO_IT(r1, 0xab03) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) fsetxattr$security_selinux(r2, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:hald_cache_t:s0\x00', 0x22, 0x3) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000380)={0x0, 0x100}, 0x8) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) fcntl$dupfd(r2, 0x0, r1) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x84) fadvise64(r0, 0x0, 0xfff, 0x0) fdatasync(r2) sendmsg$key(r4, &(0x7f0000000200)={0xa00, 0x40030000000000, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020200000000000000000000ddfbaba95e3188a2f601df57f21e05ae5e5aba1b0a6ef1912263c7655185bb5df3d8b1fdea33ddb9e1d34ee44c8409654f00ecada2ae798c20890c7a62b3d9bb5ff954716015b4802172767d6555f92905fc26876679c723c33bbda19493ec10ed1d4c20b9686100000000000000000000000000ba47b9dd9d0cebea5fe972530ef7d0528178efe3478d1dacc26a6a421d152ab17e304595dbfade4b18db3ffda30fe1344abad707823d9dca"], 0xb8}}, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x1000) unlink(&(0x7f0000000000)='./file0\x00') 12:33:22 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x300) 12:33:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x157, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_o:system_r:kernel_t:s0\x00'}, 0x78) [ 1736.969873] binder_alloc: binder_alloc_mmap_handler: 24777 20002000-20006000 already mapped failed -16 12:33:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7a00, 0x2013, r1, 0x0) 12:33:23 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7f01) 12:33:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='.\x00', 0x84040, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x3) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r1, &(0x7f0000000040)='./file1\x00', 0x200) [ 1738.034876] SELinux: failed to load policy 12:33:24 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:33:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_h:system_r:kernel_t:s0\x00'}, 0x78) [ 1738.350161] binder_alloc: binder_alloc_mmap_handler: 24799 20002000-20006000 already mapped failed -16 12:33:24 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xe400, 0x2013, r1, 0x0) 12:33:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x171, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1738.612709] kauditd_printk_skb: 121 callbacks suppressed [ 1738.612723] audit: type=1400 audit(1539520404.765:27909): avc: denied { map } for pid=24802 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:24 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4) [ 1738.798665] audit: type=1400 audit(1539520404.785:27910): avc: denied { map } for pid=24802 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) signalfd4(r0, &(0x7f0000000040)={0x7ff}, 0x8, 0x800) [ 1738.982919] audit: type=1400 audit(1539520404.855:27911): avc: denied { map } for pid=24802 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:25 executing program 2: ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='nr0\x00'}) r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") time(&(0x7f0000000200)) r1 = socket$nl_crypto(0x10, 0x3, 0x15) r2 = socket$inet(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000003a0007031dfffd946fa283000a200a0005000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = dup2(r2, r1) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000240)={0x1000000000000000, 0xf000, 0x1, 0x1, 0x9}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000001c0)={0x2b, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e21, 0x0, 'wrr\x00', 0x10, 0x8, 0x6f}, 0x2c) [ 1739.236055] audit: type=1400 audit(1539520404.865:27912): avc: denied { map } for pid=24802 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_#:system_r:kernel_t:s0\x00'}, 0x78) [ 1739.417492] audit: type=1400 audit(1539520405.125:27913): avc: denied { map } for pid=24811 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1739.557417] audit: type=1400 audit(1539520405.125:27914): avc: denied { map } for pid=24811 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1739.669115] binder_alloc: binder_alloc_mmap_handler: 24819 20002000-20006000 already mapped failed -16 [ 1739.716329] audit: type=1400 audit(1539520405.165:27915): avc: denied { map } for pid=24808 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xb9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:26 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x74) 12:33:26 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xffffffffa0008000, 0x2013, r1, 0x0) [ 1739.934011] audit: type=1400 audit(1539520405.175:27916): avc: denied { map } for pid=24808 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1739.992971] SELinux: failed to load policy [ 1740.067865] SELinux: failed to load policy [ 1740.093965] audit: type=1400 audit(1539520405.185:27917): avc: denied { map } for pid=24814 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.189733] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 12:33:26 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x400, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000240)={0x3a, @remote, 0x4e20, 0x4, 'sh\x00', 0x1, 0x3, 0x2d}, 0x2c) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x9, 0xffffffffffffffd5}, &(0x7f0000000140)=0xc) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000000)={0x7, 0x18, "623f9a7c4bc48943b0410c025869aeb6e523be5f0acc51ae"}) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={r2, 0xcbf, 0x5d4b, 0x9bf}, 0x10) socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$selinux_load(r1, &(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYPTR], 0xc) [ 1740.260521] audit: type=1400 audit(1539520405.195:27918): avc: denied { map } for pid=24811 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.307341] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 12:33:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_d:system_r:kernel_t:s0\x00'}, 0x78) 12:33:26 executing program 2: syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000002500)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) r2 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r2) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00d\x00\x00\x00\x00']) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xd13, 0x80803) [ 1740.742991] binder_alloc: binder_alloc_mmap_handler: 24839 20002000-20006000 already mapped failed -16 12:33:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x9000000) 12:33:27 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6800000000000000, 0x2013, r1, 0x0) [ 1741.054230] SELinux: policydb magic number 0xffffffff does not match expected magic number 0xf97cff8c [ 1741.147127] SELinux: failed to load policy [ 1741.227933] SELinux: policydb magic number 0xffffffff does not match expected magic number 0xf97cff8c [ 1741.290272] SELinux: failed to load policy 12:33:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f00000000c0)) 12:33:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_s:system_r:kernel_t:s0\x00'}, 0x78) 12:33:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x200000, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000140)=0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = inotify_init1(0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x40100, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f00000000c0)={0x1, 0x4, [0x8]}) dup2(r1, r3) 12:33:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xae, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xe4) [ 1742.183022] binder_alloc: binder_alloc_mmap_handler: 24867 20002000-20006000 already mapped failed -16 [ 1742.219075] SELinux: failed to load policy [ 1742.297147] SELinux: failed to load policy 12:33:28 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xe400000000000000, 0x2013, r1, 0x0) 12:33:28 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000000c0)={0x2, 0x18, 0x3ff, 0xf, 0x70, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_sec_ctx={0x1b, 0x18, 0x1, 0x5, 0xcf, "75c4976edc4241b8be20a9c15f7cc024a3dd5e8d63b822b138788b5ba4c4696f866e3378927e4a02f3915499e5e449f88f0f432ef28bfebf6e3162c90763ce21c7cdd59ef293976cafef24db2171723dcc7b57ddf1ca6330fd2504872bb10d483accf99e90588c6f9a5ccc4216f9b5c66d2f5e3ab3b5343f7f420f1a8916b7c7d621eed14556445309e348a5697798da206f8c614c794b8a7f870996ffc6c93ff84739949cebf6d067590e99cf44268768adaba110e1464de201aec4905109217a5bbf73d0b5db28e7128f35f2a654"}, @sadb_x_sec_ctx={0x1d, 0x18, 0x6, 0x3, 0xde, "20b51d0b9184160708ef44d998bc8c07a81820620b98c851010a952b219f2016fbce6d80286544279a2d5c7235062747692a29f87fb437049127ae09c79711a5a6724e6572a5231584242023d1afaf5ec402aef99e74f375a4a6d0371b5a1a364f98ba3e6755974902c80a165ce69eb7fa3ff1efdd470642d77aa28fef23618221dc8ac3573b64d8902c604dcd226d3bd83b1a4e306169683c8f7480d87f83fda48df8c055b4dba297f65216f5cebbca06995e3a57c3c92e8a9d872b7902b214af9a53c5771f6874577ce2af2bb8ab1965f3c5c7eff6d7074256c8a72afb"}, @sadb_x_filter={0x5, 0x1a, @in6=@dev={0xfe, 0x80, [], 0xb}, @in=@multicast2, 0x1b, 0x10, 0x4}, @sadb_key={0x1c, 0x8, 0x6a0, 0x0, "88339153e15d7a560a31fe0b894cff5b4da291189fdca46508e9a9801483145a7fd231428490d0dd54cd6ac7565b4c663f9165a748d61aa5811f4bbb03f5978aabe9c6387a5268dd190911224b4b87cc1be38f22a37be23c2ec766f8494a1d6e473ed331e84f9e207b00834a788566db7d34bd20fa424ff9aeb9eb4a98fa77bf520b9eb0b3bce448ad430a4381584ae7fa18c265f3e582fe069af8977c0083bdb7cf9ce0ce0ebf82cc11d8968a7241b8e4c41fd1898150d563ff1e930efd2d5b1e919fcc7d301f9729f2d6f0d10cc603439abf51"}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e23, 0x0, @remote, 0x5ede}, @in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x18}, 0xb5a}}, @sadb_address={0x5, 0x17, 0xff, 0xa0, 0x0, @in6={0xa, 0x4e21, 0x401, @dev={0xfe, 0x80, [], 0x18}, 0x1}}, @sadb_x_policy={0x8, 0x12, 0x4, 0x0, 0x0, 0x0, 0x8, {0x6, 0xff, 0xffff, 0x2, 0x0, 0x24, 0x0, @in6=@mcast1, @in6=@loopback}}]}, 0x380}}, 0x4080) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = msgget(0x2, 0x190) fcntl$getown(r0, 0x9) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000005c0)=""/226) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000004c0)={0x5, 0x8be, 0x3, 0x2, 0x10001, 0x4, 0x1, 0x2493, 0x0}, &(0x7f0000000500)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000540)={0x37, 0x6, 0x9, 0x3, 0x0, 0x1, 0x1f, 0x2, r3}, &(0x7f0000000580)=0x20) 12:33:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_::system_r:kernel_t:s0\x00'}, 0x78) 12:33:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4000000000000000) 12:33:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0x40286608, &(0x7f0000000440)={0x2000000000000157, &(0x7f0000000400)}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000a40)=0x2) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000001c00)={@dev}, &(0x7f0000001c40)=0x14) r2 = accept(0xffffffffffffffff, &(0x7f0000007ec0)=@can, &(0x7f0000007f40)=0x80) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000800)={0x1, 0x401}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000900)={'syz0', "864318dbe75615f378f9b61322f6ab947fb6b1afe532afd25465538821437edb4868d0e42add30143b18d1f9cfa91420146a45db62e382d46f20d2650f3e15e5db40c2ad206c5f5f4f253af22a8fedeff1befe0ff8027c50358affe416e96197ae15e0231755b0be9c2fa7e81ddbe299c1a626a88ff890698f4029d489b3314819f645b5bdd753203fa7a39d3df0f54e3e2bb8ed8a5f3fce0f413ec8e5078a9151692103b09bb8731aa7a4329a"}, 0xb1) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000640)=0x4, 0x4) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700, 0x500000000040000, 0xfe800000]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80389}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x10000000004) write(r4, &(0x7f0000000000)="2300000014000705030e257124ac4cfa255bea18f5aa59f338c57410e8a99f47ff00", 0x22) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000880)={0x7b, 0x0, [0x1ea5, 0x71e5, 0xe30, 0x4c84]}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000a80)={0x0, 0x81, "b685552a70611d3e65a1154b44cfc8f3e4f4610eeabee05ca8acde44997e6efdd73bb185769af6d5ecdb111d423ed19192c3e74ae88a68c2fa5a019d2a1d122e6a6abdeebfdbb2ccaa825b58dca2edda3c9978029d332d928c8efef3f8c3632d09dabc85af5d32b83fd3767240a52dd7ea0f620fbefada03465d3de4174f3863e9"}, &(0x7f00000009c0)=0x89) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000b40)={r5, 0x3f, "3a8314f9749bf9b48793570c6772aea847121ec8aec041a83ae76d048d212d331ded1e8b696e6ae2fe2a8360213200edf3015f4c3bda84ab512e4943bc9083"}, &(0x7f0000000bc0)=0x47) 12:33:29 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x28) [ 1743.158084] binder_alloc: binder_alloc_mmap_handler: 24885 20002000-20006000 already mapped failed -16 12:33:29 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4c00000000000000, 0x2013, r1, 0x0) [ 1743.640219] kauditd_printk_skb: 140 callbacks suppressed [ 1743.640235] audit: type=1400 audit(1539520409.795:28059): avc: denied { map } for pid=24891 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1743.780822] audit: type=1400 audit(1539520409.835:28060): avc: denied { map } for pid=24892 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x500000000000000) [ 1743.943670] audit: type=1400 audit(1539520409.835:28061): avc: denied { map } for pid=24891 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x184, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_[:system_r:kernel_t:s0\x00'}, 0x78) [ 1744.174476] audit: type=1400 audit(1539520409.855:28062): avc: denied { map } for pid=24892 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1744.360876] rdma_op 00000000447a931d conn xmit_rdma (null) [ 1744.390937] audit: type=1400 audit(1539520409.945:28063): avc: denied { map } for pid=24891 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0x40286608, &(0x7f0000000440)={0x2000000000000157, &(0x7f0000000400)}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000a40)=0x2) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000001c00)={@dev}, &(0x7f0000001c40)=0x14) r2 = accept(0xffffffffffffffff, &(0x7f0000007ec0)=@can, &(0x7f0000007f40)=0x80) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000800)={0x1, 0x401}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000900)={'syz0', "864318dbe75615f378f9b61322f6ab947fb6b1afe532afd25465538821437edb4868d0e42add30143b18d1f9cfa91420146a45db62e382d46f20d2650f3e15e5db40c2ad206c5f5f4f253af22a8fedeff1befe0ff8027c50358affe416e96197ae15e0231755b0be9c2fa7e81ddbe299c1a626a88ff890698f4029d489b3314819f645b5bdd753203fa7a39d3df0f54e3e2bb8ed8a5f3fce0f413ec8e5078a9151692103b09bb8731aa7a4329a"}, 0xb1) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000640)=0x4, 0x4) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700, 0x500000000040000, 0xfe800000]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80389}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x10000000004) write(r4, &(0x7f0000000000)="2300000014000705030e257124ac4cfa255bea18f5aa59f338c57410e8a99f47ff00", 0x22) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000880)={0x7b, 0x0, [0x1ea5, 0x71e5, 0xe30, 0x4c84]}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000a80)={0x0, 0x81, "b685552a70611d3e65a1154b44cfc8f3e4f4610eeabee05ca8acde44997e6efdd73bb185769af6d5ecdb111d423ed19192c3e74ae88a68c2fa5a019d2a1d122e6a6abdeebfdbb2ccaa825b58dca2edda3c9978029d332d928c8efef3f8c3632d09dabc85af5d32b83fd3767240a52dd7ea0f620fbefada03465d3de4174f3863e9"}, &(0x7f00000009c0)=0x89) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000b40)={r5, 0x3f, "3a8314f9749bf9b48793570c6772aea847121ec8aec041a83ae76d048d212d331ded1e8b696e6ae2fe2a8360213200edf3015f4c3bda84ab512e4943bc9083"}, &(0x7f0000000bc0)=0x47) [ 1744.487806] binder_alloc: binder_alloc_mmap_handler: 24906 20002000-20006000 already mapped failed -16 12:33:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000a10900000007000000402c0000100000006acfe602abe243727b25b15daf648cd6bf6ab2a9e0e6e6bc5f16d06fbaf150378dbb38dd133e8693cd35d687851f9a1c73c99a20a3abebd53016667a0e04297e99f0182d81ae7f80b306dcacc9ca01053b2d2944b5b01b88dab2f811724089ad5ec31574dca08e23ed60d054b3b6d586a1e41b92c28295ae31b68da52596"], 0x28) [ 1744.603299] audit: type=1400 audit(1539520409.975:28064): avc: denied { map } for pid=24891 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:30 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4800000000000000, 0x2013, r1, 0x0) [ 1744.783943] audit: type=1400 audit(1539520409.985:28065): avc: denied { map } for pid=24899 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1744.911706] audit: type=1400 audit(1539520410.015:28066): avc: denied { map } for pid=24899 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1745.089998] audit: type=1400 audit(1539520410.075:28067): avc: denied { map } for pid=24899 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_c:system_r:kernel_t:s0\x00'}, 0x78) 12:33:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x48000000) [ 1745.302947] audit: type=1400 audit(1539520410.075:28068): avc: denied { map } for pid=24899 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:31 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080003005345204c00004c336b8e00d41902000000000800000007000000402c00001000000037157205d2a582c2fc9af8cb2da181ba811376d922d129b3851dc76fd95bceae217081817cd7b6886eb811e7358766437f634041a889374eba795824d398f5745746e3aa4e5d3a799abe883ab9106a14addec2991f349dca000000c7d1c9501a7081746d4978ecde4cbeb86c2d98847c13f44b4c67a8625afdce461eff6a180c3e21c4bf20eb"], 0x28) [ 1745.797038] rdma_op 000000004c10c2e8 conn xmit_rdma (null) [ 1745.851062] binder_alloc: binder_alloc_mmap_handler: 24928 20003000-20006000 already mapped failed -16 12:33:32 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7400, 0x2013, r1, 0x0) 12:33:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0x40286608, &(0x7f0000000440)={0x2000000000000157, &(0x7f0000000400)}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000a40)=0x2) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000001c00)={@dev}, &(0x7f0000001c40)=0x14) r2 = accept(0xffffffffffffffff, &(0x7f0000007ec0)=@can, &(0x7f0000007f40)=0x80) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000800)={0x1, 0x401}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000900)={'syz0', "864318dbe75615f378f9b61322f6ab947fb6b1afe532afd25465538821437edb4868d0e42add30143b18d1f9cfa91420146a45db62e382d46f20d2650f3e15e5db40c2ad206c5f5f4f253af22a8fedeff1befe0ff8027c50358affe416e96197ae15e0231755b0be9c2fa7e81ddbe299c1a626a88ff890698f4029d489b3314819f645b5bdd753203fa7a39d3df0f54e3e2bb8ed8a5f3fce0f413ec8e5078a9151692103b09bb8731aa7a4329a"}, 0xb1) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000640)=0x4, 0x4) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700, 0x500000000040000, 0xfe800000]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80389}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x10000000004) write(r4, &(0x7f0000000000)="2300000014000705030e257124ac4cfa255bea18f5aa59f338c57410e8a99f47ff00", 0x22) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000880)={0x7b, 0x0, [0x1ea5, 0x71e5, 0xe30, 0x4c84]}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000a80)={0x0, 0x81, "b685552a70611d3e65a1154b44cfc8f3e4f4610eeabee05ca8acde44997e6efdd73bb185769af6d5ecdb111d423ed19192c3e74ae88a68c2fa5a019d2a1d122e6a6abdeebfdbb2ccaa825b58dca2edda3c9978029d332d928c8efef3f8c3632d09dabc85af5d32b83fd3767240a52dd7ea0f620fbefada03465d3de4174f3863e9"}, &(0x7f00000009c0)=0x89) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000b40)={r5, 0x3f, "3a8314f9749bf9b48793570c6772aea847121ec8aec041a83ae76d048d212d331ded1e8b696e6ae2fe2a8360213200edf3015f4c3bda84ab512e4943bc9083"}, &(0x7f0000000bc0)=0x47) 12:33:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x7a, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:32 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x2) 12:33:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_0:system_r:kernel_t:s0\x00'}, 0x78) 12:33:32 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() setregid(r0, r1) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1746.887073] binder_alloc: binder_alloc_mmap_handler: 24950 20002000-20006000 already mapped failed -16 [ 1747.026442] rdma_op 0000000053e010a9 conn xmit_rdma (null) 12:33:33 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x68, 0x2013, r1, 0x0) 12:33:33 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6) 12:33:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xf5, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0x40286608, &(0x7f0000000440)={0x2000000000000157, &(0x7f0000000400)}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000a00)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000a40)=0x2) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000001c00)={@dev}, &(0x7f0000001c40)=0x14) r2 = accept(0xffffffffffffffff, &(0x7f0000007ec0)=@can, &(0x7f0000007f40)=0x80) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000800)={0x1, 0x401}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000900)={'syz0', "864318dbe75615f378f9b61322f6ab947fb6b1afe532afd25465538821437edb4868d0e42add30143b18d1f9cfa91420146a45db62e382d46f20d2650f3e15e5db40c2ad206c5f5f4f253af22a8fedeff1befe0ff8027c50358affe416e96197ae15e0231755b0be9c2fa7e81ddbe299c1a626a88ff890698f4029d489b3314819f645b5bdd753203fa7a39d3df0f54e3e2bb8ed8a5f3fce0f413ec8e5078a9151692103b09bb8731aa7a4329a"}, 0xb1) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000640)=0x4, 0x4) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700, 0x500000000040000, 0xfe800000]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80389}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x10000000004) write(r4, &(0x7f0000000000)="2300000014000705030e257124ac4cfa255bea18f5aa59f338c57410e8a99f47ff00", 0x22) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000880)={0x7b, 0x0, [0x1ea5, 0x71e5, 0xe30, 0x4c84]}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000a80)={0x0, 0x81, "b685552a70611d3e65a1154b44cfc8f3e4f4610eeabee05ca8acde44997e6efdd73bb185769af6d5ecdb111d423ed19192c3e74ae88a68c2fa5a019d2a1d122e6a6abdeebfdbb2ccaa825b58dca2edda3c9978029d332d928c8efef3f8c3632d09dabc85af5d32b83fd3767240a52dd7ea0f620fbefada03465d3de4174f3863e9"}, &(0x7f00000009c0)=0x89) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000b40)={r5, 0x3f, "3a8314f9749bf9b48793570c6772aea847121ec8aec041a83ae76d048d212d331ded1e8b696e6ae2fe2a8360213200edf3015f4c3bda84ab512e4943bc9083"}, &(0x7f0000000bc0)=0x47) [ 1747.643887] SELinux: failed to load policy 12:33:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_l:system_r:kernel_t:s0\x00'}, 0x78) [ 1747.703060] SELinux: failed to load policy 12:33:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1747.964401] binder_alloc: binder_alloc_mmap_handler: 24970 20002000-20006000 already mapped failed -16 12:33:34 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7a00000000000000, 0x2013, r1, 0x0) 12:33:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x5) [ 1748.580221] rdma_op 00000000104ceba9 conn xmit_rdma (null) [ 1748.731510] kauditd_printk_skb: 126 callbacks suppressed [ 1748.731525] audit: type=1400 audit(1539520414.885:28195): avc: denied { map } for pid=24984 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1748.815798] SELinux: failed to load policy [ 1748.903568] audit: type=1400 audit(1539520414.985:28196): avc: denied { map } for pid=24984 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:35 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)=ANY=[@ANYRES64=r0, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES32], @ANYRES16=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESOCT=r0, @ANYRES64, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES16=r0, @ANYBLOB="e53df63f701535df3674f9531997a7499a2fbe8922a1f974708a6d6057dc0c85a48d6f6ed319d7ea73f93d0f95a41fda61f1b50686e87fb166539c5b74677c631c1281e66f2cc72c1a2697d61e5f167f32c5d60708cedd8aa0c2b288c20e28368c04366770719bb5f9d6befe7f97a748624a58b8f9ab1395be4b53c9fb02b5c52578", @ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="3ec0cbf3956e3a26f697b0591222e08ae5b0966603c1af057a6443a0cbbe4a2160ff2d164c0d718a738c0e44e4d2ac30752a19258e4db5cd06945009f2b3c3ac1be0ebee49f4c2ef28057b82ce89a62c54e3a7666e7446905ea33565a1264e141042d9cc426b2770a7c086641571", @ANYBLOB="ec435f317d721c8da60cc62f40e1281a13930ad698f4cbc511f95072f8f78e024b4e", @ANYRES64=r0, @ANYRES32=r0, @ANYRES32=r0], @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES16=r0], @ANYRES16=r0]], 0x291) 12:33:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_n:system_r:kernel_t:s0\x00'}, 0x78) 12:33:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x5e, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:35 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) write$binfmt_misc(r0, &(0x7f00000003c0)={'syz1', "5e5049fb2cc7b1f98a2471c44463edf877d4e285bf4c01aad96dd146231f022801b7f0f476e4b41367270c78ed65556eb6458faef6dd3e2cc048d668deeba9b9317372b0ecd956c32f0d0db43a2db46e76e6e9b2e1941fc1c67920deaeae65274feb8114d8b90a528214116f4f40ac6aa22b70a7ce221fd2a7a6703216235eb87f17a44ddc318e26fcfbef104795df29048bb858a7f537f55e10c076279cc62248b1d118c7822fa913fff8a64aa04326de2e04ed6340385a1acbd93ba45cb31eab58c5822ac95cf52bead12335cb751cbb259bb8a590561fc4f9233e58e175faf37115e8119500ba61eeae19c1390b28e52423d33d7d63a47fc6c1db20315febb02d88f24b4d1f45b472c0e220410325f54ee03d7b4bb036af7afe97b23ecce0222c57c04ec83039020a058a67c2ca9f4b9a3c95c958123a03934d3f82fd126cc7e29fd8fb4cb8bae2faedc285560ad38f39761018f6535d28414a8b3140a088762ead6248a33247c82a8d492767a760ea5e808c306c803c9aeb4e0521d1f632bfcc9bd1c50d87c1e7f3eb40fa090852198e02632d39d93a0540956e7f446d1ada8a01534f7ce213067c52ff48b92f8a0a92995b80897d89aab12915b9790bade4cdede0a030ebbbb572a77b297f984d97adf6f9b0bd56ebf41fe2948663d54fd840d4f9ea5ed02a963739c96c2fcc845c02300fc214db5df84605fe5225223b5f0f645d565276d740787a486f783ec65e5ed6cf046a15ce05f61bfac98e4590462282fe2b99d619a41a5dfcc1359fed12221a4bc1ad156c1387b556b9b006872fcf509b22580eba04fe0b1b2b2c95d29b48c0c3cce4bf2d496671e2ab19b36824d935a2d7c9f0dd8199068fef1f39175d59b36daf494e0bb59970b068298fa818da53f770e480e764a6633b6a773fad774f7b91af03394809bd5bca2ca3c339c68c3fef3c83fc094812f4cf9b33b3e300c43ce3e76e3ea88c265a00aeade17e758ba772158bdc009dbc20795566e3aed85574bb02bf02936125a4be9e873718653cfbd32a3ee352e6e330292a658cdadb90987cef22532f3a57ad6165325214362e1af792f1beef5cf1ec4f9f954b016964fdc79e8fac90a319b41fa42397e91e24e10098615f41b8d61951c63faa01b6e2db278f81b99b13c859b5de3730925f280a2be0c268765ac2a17790c5d9ecac53a28e1885fc8d81c5d92c4d8a1846ff233a0c10ec2974a00a499223ae3fa8b70516b0ee8800a0577f31b9cdbbff5c44b4190136df835016bb24d87333c9db4355701c50831f837ab2e6e6397ce3068f172876dd67be1c43f77fe120367753733c9d57e58fe0254b939e25103bbc2912ae2785871ab606d319708168550ecbddf518d7de95c877ececc1424a4c98a37b73273ac88a80e9864d659fc7a6da50a7679f280c0479e8937c51af6e97806664dde3e8f9d13559ab8c57f51b94bc5ca6cf899b810f7b69a08607a6c9aa432fce56449df7894a61034b95dd9e3d702e97151d91bdee4c53619b6ba0b49b8f83418adcc58560ab50d24d92c5e5aabb8d959038cd40bc1f60bd60c0f39cb20039fb10b1f9e08f5d3c06fb0e48a48b5176a5d5f23f7626ba2e6abc041320693f86cb3903414ac5a1a5bab47cf3ef6da9127e5fffdaaf4b4b96d7cc11dd8879baf8aa93f093745e3e238286cd1112cf4e7e4e4fdaf45b9c950783b4d92bfbd49f9b2ca8df7521d56c62bf51228d444a531a82c51cd6cfd5266ca044cad9abf7fe27a630ec88bc5e7c2d1e4f272bb989f90ff2f605d63d02d38aa7e21792428be0a0dde656dbac090dc1fb874bede3217b812ba1c0cb56377ac280068d05a3fc1332e84e429e275e101925c1ff5c0cac591c844312475cfa1cac87a8093464d556d56a92e848d0a141333792c5950640756a13da07cbe8d88fe5a780aef8f838bef2bbaf88cabefeab7c51aab05f89e7b4699df8d84f888c1f0156ba1bb36c3b75709b86d68ba1d6687305840dca52cb6af568a66193c30361b56e136a5a2a1fff093a898ae09d17c2a6597943a1a26266664c4d21091971ecbfe95cb21b9c2a164ea1895bebe084113611cc47fdd93a7c56a04359cdfd2176c4e2f00af04944a698ce9cc752b652253c27c51c3d0c75d3417d174d3c0cdbe2f6df043661a79c9089261b6de23efb1f168126c338c8b9de54dc7a3d3c6b8c2e585599ad5c289f4a8d2f522747e50c3e4edbf188f55ab2c8f12800252033f0d5fc05e6034aa9a450d490ab7ddbd2dce4a2f9ed47d1db3e26fd3d09bbf44c498ad4af8941332d86a7da48f7c2009d1d323b72fe76ca8db59465c1444b09da3a674c025850790acc1783bfe295cfd9d2ee224deb98b9f0dc690d85b918947aee2aca0e7125c266e24eac80456ce7f36e54340200d95005e6ad94997256cb9cbc777f06196ce054a39b6177fd46029877aef3bbf7a457a7eda1bb2494c9d2129bb37bf216e0686619c04890a485a3929fc630795ee3fa5df25625f7ce77769e02e9fd0838a2a5b7c76d7dd46daac29b4aff647dad164931f61adfd9010fc87fd403a3cb5a51bf0c67540afcbbef5e12d8efedaa7727f2a67bb9cd534c29f61d0b78df92a6ca34ed59da6f211588e27faf1df44c2c11bdd4a3b443ca9582badea5668b85117f8a5cbbdf04e394e567fe5a0b855bfb762554a907d37b09c3193817e0b341ff041ac7a0e87cb403e37268ea538c0e02b55c2663e99bc6d229f1caf67f75cb5620fc8f46b2d39f6d01e935bb21625cd4072b03dc4d6287871154bf8354fbb4b0f9d288c4d86844213c15c94739c929b679f6c7080c385a4f4dcf8fb87804aed6ab10931c5e3d42fa1f6aa87b0fb90000e13234d10e29eff23748a7f4543543e3b90e195cfc90ae81af148d61a942764cda45071d2dbacbf677c3338809e9c02fc8b2744744bc6935edf04c900a156f12572bfa89bef54d5589ec80889dd1deb56770364d13886a1a9fe0484247a0a4afe3d6a9c09a57866f5294be62a6fdf8828eb959642cda5e3878c0b6fdbbe8b2484947433b0fbb7e20d150f32db2601f09589fc49f363726a251a8267765bba4c9f45fcd8f92117cd92416633de65873124c5f017637794744adfcceae9978631228fb3bb643f0dd5a624e32bf8fd1eb9e0734b2abb6955a4a87ae72f2bec6fa2b7a86881c299aad8f2b165031943c227a2f83c2df8ccc1aef1f26a27ddbc5f046909bedfc29e3f65a8e9958d2451e2a25c34715827e8f6f5cd92bb6fb2856361d34bef4c7f19502054c4bd105e1b05be32c2ee8a27fa5b712f8103be27bc4e165876fa0160269503207ff8cff0cfd2b507bbe44bad14f99d2f91c8c47b8162fc2afc4638c720b57e1903de3314050d947549b9d163e6fc53031eedfbdc624aa0eccbfaf744405dc6e00f794b9a08742040856af98460c776e7fe329e31a5dd747fcfe1b7e6d89844f986eb39f56f8626ffde1b8a7feb32605bba4c68032328584cf2102b5b9020ec9ff8ca135391e8ae29c85b61aba2784c2c260a83d44ebcd62c35bdeba7e329e1d63c0c652a5ffc5ff4641277099de9e90029301a3bea23ed7d655e6ac7b529e44e1e91d21f3a61c104320e29fd0c951f843c4557a35a2f23251c62362e5061680b099af0bf7dd072fefbc82cd2f36b73f1b16930ace0a66d5d9f337f4dbd9f404e187c8b4e6299b8c761a8cfe534463709db07b9bb90cfe0c82af9053e4c141d11ba010e07cfcfae9d0c921601d218c06f51d9f8c74b79cb38c5cb9cbd109663cf46576e8a7865473c14007f430ad3ac95e4d889fce109a9a2f02df6d8d9462015bff6cc6b4f9123fb8324c2f06d7a42330e1b1fb3ffaa74646a6a253fe8523799a7a066d7d2ab5133d29852e90183a868ab5895d1deb67d32ae0c0c6d639485513b68d5b9e64f5250287fb14f2a4d4f0c689372c0e4ac9ba5e13d1b98216b7c3a765d1e7fb31b48b36d7cc1d25c2974c40b097b69a56b8440b7ed6268fae24b3467683e54c2040f9660371d9f83f509e2f238b6dd1f20882b578d9ac67dcc5e2566b482746f08496589cd3c3c1f6c9132b8405a379d76f2b286317b6e2499ff209f683c0b9e332c15498320fe2531d1afdd29b3837b21a2ea7c59013f52026d951c622803cd09bc8e175ff3970881b5f4d3047f1ad89ecdbe362560a5d81e042c9ea4d949dfa60155974bdb1bd27675b1de74725dce3bbc1031cbfbf3a5eb934611313f14b1841fce1e3bde0c3c3b654677938cd91283981d3ed9dc9346c863a7e1f6f2ae560ef6f29d97806d24ea7c7393d99a8b876abf1241d06689e76f46d5e79288d2470b9c69c16bad06da81b73676ee6031a81b684ac398d8620338c96d8e2e5d0d5243855c9c299914d1470e614eeb4c8d01983035544bef00b975db45ef576316d96f14fc4dde9738a066dc875570f06ca85c85bec3e484e165f3babfc49a6f84996e7b24c0b03e7803342e3b65f71b862ac15838877fb1715f9d3ceb3acdd92163fe10aea2a93bf49ad5f42f0e4d1f18ba3a574bc196adb13658dfde715e42e1b491562f56f61aa4fc0f17df2448606a19c07e3c5eac8a172fef882fb2ec8c322d6cd8c8a257cdde0c664ae52009f87a9e7cbce599baf8ee92a00abbadd62df54e59bfbc2dbe1ce776e35e48706be3d3b7ffa1f710947069b344f02c7a6034da2cab56324704c0c404299244f0f756888ccb6ff6c3e6ab9559021b6ed6edc642ecf95f3ad32671d9e5ab9164b624003bc3cf86335898870ca966a849ca24a522cc63e858b5159b094e087233e9522847c36504f6296966b8942c9142e463f0a387f11fe33b95c6d10adac7c5b94ff404f02daf33122319396a4e788593944bdd9a3a67c87f950f357669703f13f19ae841fc29782c4d7fa9c0e8fb6ae380c17e1103afd118fdc2bd2dc78b981ecb95d058a743ec60c2644f4eeb3fb74750540ead45e5b7cf7f9abf58f19f654966700763c0574511a3872fd07a0b6757581dc5744afad4459d4201605894ddb01ce106840c17e5e19e53e5057b1ffcfd49b5c389c9454942eba042e02906cea0ecbe0315d8bb97fe32f866bf977fb376201c080cac998e32a1e2d7c0ce58930263b6e8c675168e04bfc9c8924943735bb8d2563acab223dae905bbe725ea4c1364b02c8d8b762a391b9f826884ee69d672346f535fced661d660313a5b63183144a598cee03bd37c03f7ca19d43845f4164d4648857a4b6cbb47fa8078bfc770e0214d75ca7fbc145e95c8ab51bf6f867708645756e86746b3761000ad7050ebd3fd69da96c263c5addf38b0d88750228e503f4ed3dc049caf4a67736d26a5ae52d68ec0057e6d2770f0fa4c95dcca232287d3f5846f09ee4da811f5d49919b46660c7ffcb96bc7ae34e785a4037062bf2fe9597ea3b7edbfc334ff41d5a34356db3cf83f805a3e5dd02c0327858b9bb2d2eeb6fee916defbc0104dd0a8cafbd7e9aba84c98233493b808577cb79f669205905427631344c219740bbf091c3ef4f8c9a55dcc1c2b84b52c900e74254ac483edcd7e3bdbd3ef9efa3bc0ad9df512cfab13ac35692bd0d6bc94355ca49f5f78782921e2b1f09fdeded65bb38fe79f4421115deb8d2e3f3b7e15128b289ec1602eda15e2324c1bf67e3c12d8598b1aecedbc96c4d01d0bd6c1a4ca1e054c4dc87755aea89fe098c7eea03789e30902683505cee06fe37a5e8a4a5ebf2ca39ea3060c927cdfe0236a67763ccc4f0cbbe0ad9c02efc9b475df7790af13f8caa75e481db9facbfba4d906c4fe"}, 0x1004) r1 = socket$netlink(0x10, 0x3, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x800, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB="28001b009c3b090700000000000000000096c511", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00.\x00\x00\x00\x00\x00'], 0x28}}, 0x0) [ 1749.077617] audit: type=1400 audit(1539520415.015:28197): avc: denied { map } for pid=24984 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1749.164497] audit: type=1400 audit(1539520415.055:28198): avc: denied { validate_trans } for pid=24988 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1749.297996] audit: type=1400 audit(1539520415.105:28199): avc: denied { map } for pid=24984 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6b6b6b00000000) [ 1749.501919] audit: type=1400 audit(1539520415.125:28200): avc: denied { map } for pid=24984 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1749.650108] binder_alloc: binder_alloc_mmap_handler: 24995 20002000-20006000 already mapped failed -16 [ 1749.655729] audit: type=1400 audit(1539520415.175:28201): avc: denied { map } for pid=24984 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1749.735060] SELinux: policydb magic number 0x3 does not match expected magic number 0xf97cff8c [ 1749.790718] SELinux: failed to load policy 12:33:35 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4c000000, 0x2013, r1, 0x0) [ 1749.862705] audit: type=1400 audit(1539520415.175:28202): avc: denied { map } for pid=24984 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_":system_r:kernel_t:s0\x00'}, 0x78) [ 1749.980073] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15260 sclass=netlink_route_socket pig=25010 comm=syz-executor2 12:33:36 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000a0a8e8d5b8469fe00000000800000000001000"], 0x28) 12:33:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xfa, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1750.062965] audit: type=1400 audit(1539520415.315:28203): avc: denied { map } for pid=24993 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.182357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15260 sclass=netlink_route_socket pig=25014 comm=syz-executor2 [ 1750.283410] audit: type=1400 audit(1539520415.315:28204): avc: denied { map } for pid=24993 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x1b500) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000280)=r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="210000000300002000000000000000000000000000000000000000000000000000"], 0x21) accept4$bt_l2cap(r3, 0x0, &(0x7f0000000040), 0x800) 12:33:36 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4000000) [ 1750.803040] binder_alloc: binder_alloc_mmap_handler: 25019 20002000-20006000 already mapped failed -16 12:33:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_+:system_r:kernel_t:s0\x00'}, 0x78) 12:33:37 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x5000000, 0x2013, r1, 0x0) [ 1750.984258] SELinux: policydb string length -1610612728 does not match expected length 8 [ 1750.992881] SELinux: failed to load policy [ 1751.102588] SELinux: policydb string length -1610612728 does not match expected length 8 [ 1751.186565] SELinux: failed to load policy 12:33:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xd0, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:37 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400000, 0x0) 12:33:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xe4000000) 12:33:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_X:system_r:kernel_t:s0\x00'}, 0x78) 12:33:38 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8c41650000000000000000"], 0x12) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578aa544c46e943fa45fc6eb41a0ec53ae8b987aaa508a9281c2b81349dc5f192c302107e622c0b9e04be9db02f16ce42562a5987434b295958122bbca685398ee9c26b59fd27d8a39cf5adc689e7602864904475bf93cf0d97afe0577f07355cba80f4be8f5e2d462007fbaab49b71058b27b5240600000000000000000000000000000000007270e7b98d479e7f675d0ef888f45e3032270ab8b209678afee0ba653ca4e75ba44adaf5334c214184d4bd316b3f1c99725690b39454bfbdfff86f053160db41895555"], 0x95) [ 1752.898713] binder_alloc: binder_alloc_mmap_handler: 25047 20002000-20006000 already mapped failed -16 12:33:39 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x40000, 0x2013, r1, 0x0) 12:33:39 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x1000000) 12:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x18e, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:39 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000008b80)=[{{&(0x7f0000000040)=@nfc_llcp, 0x80, &(0x7f00000014c0)=[{&(0x7f00000000c0)=""/102, 0x66}, {&(0x7f0000000140)=""/96, 0x60}, {&(0x7f0000000280)=""/137, 0x89}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000340)=""/52, 0x34}, {&(0x7f0000000380)=""/181, 0xb5}, {&(0x7f0000000440)=""/55, 0x37}, {&(0x7f0000000480)=""/3, 0x3}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x9, &(0x7f0000001580)=""/255, 0xff, 0xe1ab}, 0xa4b}, {{&(0x7f0000001680)=@nl=@proc, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001700)=""/252, 0xfc}, {&(0x7f0000001800)=""/104, 0x68}, {&(0x7f0000001880)=""/147, 0x93}, {&(0x7f0000001940)=""/116, 0x74}, {&(0x7f00000019c0)=""/205, 0xcd}, {&(0x7f0000001ac0)=""/40, 0x28}, {&(0x7f0000001b00)=""/154, 0x9a}, {&(0x7f0000001bc0)=""/115, 0x73}], 0x8, 0x0, 0x0, 0x1}, 0x4d}, {{&(0x7f0000001cc0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001d40)=""/175, 0xaf}, {&(0x7f0000001e00)=""/34, 0x22}], 0x2, &(0x7f0000001e80)=""/238, 0xee, 0x7ff}, 0x7fff}, {{&(0x7f0000001f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006100)=[{&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000006000)=""/250, 0xfa}], 0x5, &(0x7f0000006180)=""/90, 0x5a, 0xfff}, 0x5}, {{&(0x7f0000006200)=@alg, 0x80, &(0x7f0000006380)=[{&(0x7f0000006280)=""/66, 0x42}, {&(0x7f0000006300)=""/10, 0xa}, {&(0x7f0000006340)=""/52, 0x34}], 0x3, 0x0, 0x0, 0x1}, 0x8}, {{&(0x7f00000063c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000008780)=[{&(0x7f0000006440)=""/101, 0x65}, {&(0x7f00000064c0)=""/4096, 0x1000}, {&(0x7f00000074c0)=""/67, 0x43}, {&(0x7f0000007540)=""/34, 0x22}, {&(0x7f0000007580)=""/5, 0x5}, {&(0x7f00000075c0)=""/186, 0xba}, {&(0x7f0000007680)}, {&(0x7f00000076c0)=""/4096, 0x1000}, {&(0x7f00000086c0)=""/131, 0x83}], 0x9, &(0x7f0000008840)=""/109, 0x6d, 0x8001}, 0x7}, {{0x0, 0x0, &(0x7f0000008900)=[{&(0x7f00000088c0)=""/17, 0x11}], 0x1, &(0x7f0000008940)=""/141, 0x8d, 0x8}, 0x6}, {{&(0x7f0000008a00)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000008b40)=[{&(0x7f0000008a80)=""/16, 0x10}, {&(0x7f0000008ac0)=""/81, 0x51}], 0x2, 0x0, 0x0, 0x10001}}], 0x8, 0x2042, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000008d80)=ANY=[@ANYRES32=0x0, @ANYBLOB="310402008000"], &(0x7f0000008dc0)=0xa) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000008e00)={r2, 0xff, 0x3ff, 0x1ff, 0xd815, 0x588}, 0x14) r3 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x22, &(0x7f0000000000)={0x0, 0x20002}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000007680)={0x2, 'ip6_vti0\x00', 0x3}, 0x18) 12:33:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_-:system_r:kernel_t:s0\x00'}, 0x78) [ 1753.818929] kauditd_printk_skb: 116 callbacks suppressed [ 1753.818944] audit: type=1400 audit(1539520419.975:28321): avc: denied { map } for pid=25064 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1754.033540] audit: type=1400 audit(1539520420.035:28322): avc: denied { map } for pid=25064 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1754.096121] SELinux: policydb magic number 0x65418c does not match expected magic number 0xf97cff8c [ 1754.140995] binder_alloc: binder_alloc_mmap_handler: 25067 20002000-20006000 already mapped failed -16 [ 1754.149335] SELinux: failed to load policy [ 1754.173609] audit: type=1400 audit(1539520420.035:28323): avc: denied { map } for pid=25064 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1754.175589] SELinux: failed to load policy 12:33:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x8000a0) [ 1754.311576] audit: type=1400 audit(1539520420.035:28324): avc: denied { map } for pid=25064 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:40 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7a, 0x2013, r1, 0x0) [ 1754.395181] SELinux: policydb version 1179407530 does not match my version range 15-31 [ 1754.425406] SELinux: failed to load policy [ 1754.459113] SELinux: failed to load policy [ 1754.465371] SELinux: policydb magic number 0x65418c does not match expected magic number 0xf97cff8c [ 1754.491325] audit: type=1400 audit(1539520420.115:28325): avc: denied { map } for pid=25066 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1754.522035] SELinux: failed to load policy 12:33:40 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000f476d14ebc495aaa830e6cbdf7407ebf36f1bfd94f1df0eca098ad48a26f5c5f8cf95c7cb9a75aa8b1071e185d49003c1052bdaa6105de7f53a01979d70c601bed50de1f1fc3366cb53b43cfcaffb8bc50f17342fd0000000000000000c360e60005ed486d90e6be97bd5d49ea5932962e51a305196a58ce16f847e4b443bfd0f74c47158a89cb0d103e3a9d23d83b22e86457bc889c0c45ca8ea286342e5ff3bffed0a085e2a0778e2c541c3d947546974f9789492987496f2cd64baba6d70b645378284d5637af54b3ddc46a66df29ae62df13bf5b4c3be14f6610ff65583a23384d9f0ee461be9b7a2f3a638894502080a458a29fbbe8c43b964aa63089242673cf5d2265077e4590afc8dc0c06025bb00ddc5c83ae7176b067f85e9070ed4e58e23048c90be00a1e9946f80f11179aa55dd1e97ebaf54fda8ed4de4532f023fc5775a5c165780d9fc431eedd9726da7a4504258d88a9b631d611de08a5e10a4f0e41e6a99be83cc35112b26d38a3cbe29898ce57ea555b03c7eec67a64ecc9551837103565386444ab53a63805ae10197bce4d99059704a790741362b09d2c24accb0b19bcb1a5af05ed93f1ada8e91f69843aa8c172b9a0cf4f4573e4cb9605afad1488e5b4c9"], 0x28) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xa}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x29}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x44810) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000040)={0x2, 0x3, 0x7, 0xd4}, 0x6) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280)=0x6c72, 0x155) [ 1754.682644] audit: type=1400 audit(1539520420.125:28326): avc: denied { map } for pid=25066 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xde, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fcntl$dupfd(r2, 0x406, r2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000108]}) [ 1754.827779] audit: type=1400 audit(1539520420.125:28327): avc: denied { map } for pid=25064 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u%system_r:kernel_t:s0\x00'}, 0x78) [ 1755.003556] audit: type=1400 audit(1539520420.145:28328): avc: denied { map } for pid=25066 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.131202] audit: type=1400 audit(1539520420.155:28329): avc: denied { map } for pid=25066 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.294255] audit: type=1400 audit(1539520420.195:28330): avc: denied { map } for pid=25066 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:41 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x17f) [ 1755.379193] binder_alloc: binder_alloc_mmap_handler: 25088 20002000-20006000 already mapped failed -16 [ 1755.508629] SELinux: failed to load policy 12:33:41 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x600000000000000, 0x2013, r1, 0x0) [ 1755.675234] SELinux: failed to load policy 12:33:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x800, 0x40000) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:33:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x100004000, 0x0) flistxattr(r0, &(0x7f00000001c0)=""/237, 0xed) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000000000008009084d92f020000"]) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080)=0x4, 0x4) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae09, &(0x7f0000000140)={0x2, 0x0, [0x0, 0x0, 0x0, 0x100007ffffffffd]}) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f00000002c0)) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0xa0dc, 0x1ff}) 12:33:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:zystem_r:kernel_t:s0\x00'}, 0x78) 12:33:42 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xfcffffffffff0f00) [ 1756.619768] binder_alloc: binder_alloc_mmap_handler: 25113 20002000-20006000 already mapped failed -16 [ 1756.685470] SELinux: failed to load policy [ 1756.760364] SELinux: failed to load policy 12:33:42 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000000, 0x2013, r1, 0x0) 12:33:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x14a, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:43 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0x14) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x200000, 0x80) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) dup2(r0, r0) 12:33:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:xystem_r:kernel_t:s0\x00'}, 0x78) 12:33:43 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='fdinfo\x00') setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0x6, 0x4) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:33:43 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x100000000000000) [ 1757.686218] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 1757.774462] SELinux: failed to load policy [ 1757.874338] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 1757.914445] bridge0: port 2(bridge_slave_1) entered blocking state [ 1757.920932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1757.927700] bridge0: port 1(bridge_slave_0) entered blocking state [ 1757.934125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1757.934590] binder_alloc: binder_alloc_mmap_handler: 25135 20002000-20006000 already mapped failed -16 12:33:44 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{0x80000000, 0x6}, 'port0\x00', 0x5b, 0x10000, 0xfffffffffffffffd, 0x9, 0x3, 0x9, 0x80000001, 0x0, 0x5, 0x3a7}) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1758.135234] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1758.176395] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1758.215781] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:33:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x176, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1758.379971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 12:33:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:+ystem_r:kernel_t:s0\x00'}, 0x78) 12:33:44 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4000, 0x2013, r1, 0x0) [ 1758.549732] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:33:44 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4603) 12:33:44 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) fcntl$notify(r1, 0x402, 0x80000030) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) recvmsg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000003c0)=""/182, 0xb6}], 0x1, &(0x7f00000004c0)=""/132, 0x84}, 0x2042) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000200), 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000005c0)={0x0, 0x2710}, 0x10) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000600), 0x2) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="370000000300000000000000000000000000000000000000160000000000000026757365726b657972696e67272873656375726974790082601b5f369a12ba5bc23e3c37d104bcf885802d03e6e679ab2d74a4a4b7fb259137d5194c83c4ce18b79723ebdefd2d4eeb6df502999828e55be0cf52d371b6f8f9"], 0x37) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) clock_gettime(0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) prctl$setmm(0x23, 0x8, &(0x7f0000a3a000/0x1000)=nil) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1758.826296] kauditd_printk_skb: 132 callbacks suppressed [ 1758.826311] audit: type=1400 audit(1539520424.985:28463): avc: denied { map } for pid=25153 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:45 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c690700cf5eaa9ee54bdf684ec1d500001000000000000000"], 0x28) [ 1759.144313] audit: type=1400 audit(1539520425.305:28464): avc: denied { map } for pid=25162 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:nystem_r:kernel_t:s0\x00'}, 0x78) [ 1759.254177] audit: type=1400 audit(1539520425.335:28465): avc: denied { map } for pid=25162 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1759.283354] binder_alloc: binder_alloc_mmap_handler: 25161 20002000-20006000 already mapped failed -16 [ 1759.416076] audit: type=1400 audit(1539520425.355:28466): avc: denied { map } for pid=25162 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:45 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x500, 0x2013, r1, 0x0) [ 1759.620832] audit: type=1400 audit(1539520425.365:28467): avc: denied { map } for pid=25162 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:46 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x700) [ 1759.909883] audit: type=1400 audit(1539520425.385:28468): avc: denied { map } for pid=25161 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1760.028939] SELinux: policydb string SE Li does not match my string SE Linux [ 1760.128130] sel_write_load: 2 callbacks suppressed [ 1760.128134] SELinux: failed to load policy [ 1760.167165] audit: type=1400 audit(1539520425.385:28469): avc: denied { map } for pid=25161 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1760.222913] SELinux: policydb string SE Li does not match my string SE Linux [ 1760.321621] SELinux: failed to load policy [ 1760.386232] audit: type=1400 audit(1539520425.435:28470): avc: denied { map } for pid=25162 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:46 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000001c0)={r2, 0x1c9, 0x0, "a2943a6ff9343830179b76cc0913dcd03fcf14f96e45543a40176275ddfc8140745d6410e41962162738e8fa076596a96e1d31e9850733de9a1e4879e843907861b2f5139de3acd5e3271b0fc9a71b064e9510d0e1770a77f090934cf4a5aa8eda04fa430b0e698a5d35e8af6cff804ac89595521e506101f0c7cb799443d280550c7ae355e27f75ee186372cbf9fcbb46115f263269dd9b390a97c747c9ba8f85c12246921687c935bbf8eea4110505f9f3141b0e9dcc22a08d2b91edc2d6d02f4c68466379997a836600b3c0a12d"}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_getrule={0x20, 0x22, 0x10, 0x70bd2d, 0x25dfdbfe, {0xa, 0x80, 0x10, 0xffff, 0x100, 0x0, 0x0, 0x4, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000810) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:33:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:*ystem_r:kernel_t:s0\x00'}, 0x78) 12:33:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x69, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1760.614509] audit: type=1400 audit(1539520425.495:28471): avc: denied { map } for pid=25162 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1760.681013] binder_alloc: binder_alloc_mmap_handler: 25185 20002000-20006000 already mapped failed -16 12:33:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4c, 0x2013, r1, 0x0) [ 1760.776414] audit: type=1400 audit(1539520425.495:28472): avc: denied { map } for pid=25161 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:33:47 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xa00) 12:33:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:Xystem_r:kernel_t:s0\x00'}, 0x78) [ 1761.432784] SELinux: failed to load policy 12:33:47 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[], 0x142) r1 = dup(r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000500)) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x430, 0x0, 0x230, 0x118, 0x348, 0x348, 0x348, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@remote, @multicast1, 0xffffffff, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff]}, @mac=@random="ab6374737b39", {[0xff, 0x0, 0xff, 0xff, 0xff]}, 0x4e3, 0x5, 0x5ac, 0xac6, 0x400, 0x4, 'veth0\x00', 'veth0_to_bond\x00', {0xff}, {}, 0x0, 0x4}, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x2}}}, {{@arp={@local, @broadcast, 0xffffffff, 0xffffff00, @empty, {[0xff, 0x0, 0xff, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x58, 0x5, 0x0, 0x4, 0xfffffffffffffff9, 0x9, 'bridge_slave_0\x00', 'veth0\x00', {}, {0xff}, 0x0, 0x10}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x480) [ 1761.935165] binder_alloc: binder_alloc_mmap_handler: 25207 20002000-20006000 already mapped failed -16 12:33:48 executing program 2: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x1a) close(r0) r2 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000040)={0x800, 0x0, 'client1\x00', 0x2, "db35e35b67ea4db1", "6de710d4e54e1c201f73bd121b267ef56f4c5fe00491f1500f5348bfe030cc6f", 0x7, 0x6}) syz_mount_image$erofs(&(0x7f0000000180)='erofs\x00', &(0x7f0000000200)='./file0\x00', 0x81, 0x5, &(0x7f00000004c0)=[{&(0x7f00000007c0)="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", 0x1000, 0x100}, {&(0x7f0000000300)="51063046a1499488b4072289ba201b2782e2704fce042c2ed1b588c08df08b8d5ee40811de62704c4fb87f2a46fa5ad92d2effcc041969ad93503eaabf4aa56ec2eb7689ddfcfdf5795f6509efc791c3dd8fb4a583041ca73474adf1bbc6d4d6f896686d41756bbd778dc476c1b64e912f71813627055fc56b6273ac9d1df96761e650bfa6b43e8d729c63fe10398e63b5b02e02ef26620526f28ee1feef265ff419c31a3acb2c3a440a22b485411fbe4452d531fb", 0xb5, 0x7ff}, {&(0x7f0000000240)="594ba5c4fb2229404c363d3c546ae9718454f49c83fb82cea8dc5aa5c654e32d5ecdc34abb88ca1a59b7a058dbb35d8f8ba2fa7932ce89ad4a2aee4593dc0f0dca74ba9dc9beb4e1c483ef96e2716ff937f46e3ad58d0bb6507793fdd626e76878543a124f8e8dd4f5a0076001428dc80099be3a62b0bf", 0x77, 0x20}, {&(0x7f00000003c0)="e89fc4551c3204a521c9d7aee5ac60be1e92b459520b429a8bb0c340701b007e8d0ba0b46272813cec95ead76bbecfae5180a2ea6bc7915922a20a54e335a3c6845e24c86f2ffd1e3c55221a94257ad02fd7e8dc711fae894a22d5f6d2a11cddb679599b80f6287ea9a23fdea8251f22a5788f67b64cdd7fc8c12e6801e35ec0419544cb935acff61d3c0eb0fd9fa0b96783f020d3b3657809cb6ec37902f425699e2623d8112690c9f038840377dbfb45104c3930ce", 0xb6, 0x2}, {&(0x7f0000000480)="2edfcaf37e7a80fe4c77925dc0d2e605c929cc0f31613f2fafff8749f1724dc2f083d8e7570f5c2af9bbd162620c6f", 0x2f, 0x3}], 0x2, &(0x7f0000000540)={[{@acl='acl'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}], [{@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, '^-proc\\!'}}, {@appraise='appraise'}]}) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x103100) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x35) 12:33:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a0, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1762.122275] binder_alloc: binder_alloc_mmap_handler: 25207 20002000-20006000 already mapped failed -16 12:33:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6b6b6b00, 0x2013, r1, 0x0) 12:33:48 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xa0008000) 12:33:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:cystem_r:kernel_t:s0\x00'}, 0x78) [ 1762.521346] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1762.597971] SELinux: failed to load policy 12:33:48 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fff, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000040)) 12:33:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6c000000) [ 1763.340322] erofs: read_super, device -> /dev/loop2 [ 1763.364541] binder_alloc: binder_alloc_mmap_handler: 25233 20002000-20006000 already mapped failed -16 [ 1763.388351] erofs: options -> acl,user_xattr,user_xattr,noacl,acl,user_xattr,user_xattr,user_xattr,dont_appraise,obj_type=^-proc\!,appraise, 12:33:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x72, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1763.493490] erofs: cannot find valid erofs superblock 12:33:49 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x74, 0x2013, r1, 0x0) [ 1763.685540] erofs: read_super, device -> /dev/loop2 12:33:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:lystem_r:kernel_t:s0\x00'}, 0x78) [ 1763.731410] erofs: options -> acl,user_xattr,user_xattr,noacl,acl,user_xattr,user_xattr,user_xattr,dont_appraise,obj_type=^-proc\!,appraise, [ 1763.767176] SELinux: failed to load policy [ 1763.817280] erofs: cannot find valid erofs superblock [ 1763.837735] SELinux: failed to load policy [ 1763.839768] kauditd_printk_skb: 153 callbacks suppressed [ 1763.839783] audit: type=1400 audit(1539520429.995:28626): avc: denied { map } for pid=25242 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:50 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0)=0x3, 0x4) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000080000000001800000007000000402c0000100000002b820ac2f7b2353c56fdbd86d6b42c3468718f6a97986b07a29160f8fa63913ef4326827fbbb5304023c447a305a12bbfdc8736142a6cc34dbba2b7939fa8bbe24436f108f05329cef82c8ce6f"], 0x28) getsockopt$packet_buf(r1, 0x107, 0x0, &(0x7f0000000100)=""/33, &(0x7f0000000140)=0x21) lseek(r0, 0x0, 0x0) 12:33:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000003a00)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, &(0x7f0000003840)}, &(0x7f0000003880)="cdaf42f2da9a626c39d8c6d5412da4aaf8ca98123a505d787d4e91669a09320116", &(0x7f0000003940)=""/116, 0x0, 0x0, 0x0, &(0x7f00000001c0)}) fcntl$setsig(r1, 0xa, 0x29) [ 1764.056571] audit: type=1400 audit(1539520430.075:28627): avc: denied { map } for pid=25242 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x46030000) [ 1764.213250] audit: type=1400 audit(1539520430.155:28628): avc: denied { map } for pid=25242 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1764.341051] audit: type=1400 audit(1539520430.155:28629): avc: denied { map } for pid=25242 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1764.503349] audit: type=1400 audit(1539520430.245:28630): avc: denied { map } for pid=25242 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1764.595095] binder_alloc: binder_alloc_mmap_handler: 25254 20002000-20006000 already mapped failed -16 12:33:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x38, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1764.747762] audit: type=1400 audit(1539520430.245:28631): avc: denied { map } for pid=25242 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1764.756503] sd 0:0:1:0: [sg0] tag#4102 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1764.781051] sd 0:0:1:0: [sg0] tag#4102 CDB: opcode=0xcd (vendor) [ 1764.787276] sd 0:0:1:0: [sg0] tag#4102 CDB[00]: cd af 42 f2 da 9a 62 6c 39 d8 c6 d5 41 2d a4 aa 12:33:50 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xfdffffffffff0f00, 0x2013, r1, 0x0) [ 1764.796249] sd 0:0:1:0: [sg0] tag#4102 CDB[10]: f8 ca 98 12 3a 50 5d 78 7d 4e 91 66 9a 09 32 01 [ 1764.805159] sd 0:0:1:0: [sg0] tag#4102 CDB[20]: 16 12:33:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:[ystem_r:kernel_t:s0\x00'}, 0x78) [ 1764.921538] SELinux: policydb version -2147483627 does not match my version range 15-31 [ 1764.946721] audit: type=1400 audit(1539520430.265:28632): avc: denied { map } for pid=25250 comm="syz-executor5" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1764.968195] SELinux: failed to load policy [ 1765.013093] SELinux: policydb version -2147483627 does not match my version range 15-31 [ 1765.053879] SELinux: failed to load policy [ 1765.087287] sd 0:0:1:0: [sg0] tag#4101 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1765.096212] sd 0:0:1:0: [sg0] tag#4101 CDB: opcode=0xcd (vendor) [ 1765.102410] sd 0:0:1:0: [sg0] tag#4101 CDB[00]: cd af 42 f2 da 9a 62 6c 39 d8 c6 d5 41 2d a4 aa [ 1765.111363] sd 0:0:1:0: [sg0] tag#4101 CDB[10]: f8 ca 98 12 3a 50 5d 78 7d 4e 91 66 9a 09 32 01 [ 1765.120286] sd 0:0:1:0: [sg0] tag#4101 CDB[20]: 16 12:33:51 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x1000, &(0x7f0000000040)) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1765.214764] audit: type=1400 audit(1539520430.365:28633): avc: denied { map } for pid=25252 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:51 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x8004) [ 1765.354957] audit: type=1400 audit(1539520430.365:28634): avc: denied { map } for pid=25252 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000000900)=""/235, 0xeb}], 0x1) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) [ 1765.509771] audit: type=1400 audit(1539520430.365:28635): avc: denied { map } for pid=25252 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1765.816495] binder_alloc: binder_alloc_mmap_handler: 25277 20002000-20006000 already mapped failed -16 12:33:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:"ystem_r:kernel_t:s0\x00'}, 0x78) [ 1765.964310] SELinux: failed to load policy 12:33:52 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x46030000, 0x2013, r1, 0x0) 12:33:52 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000100)=""/25) connect$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x1, 0x9, 0x95, 0x7fff, 0x20080000, 0x3df67d98}}, 0x8) 12:33:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x37, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:33:52 executing program 2: 12:33:52 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x400000) [ 1766.808098] SELinux: failed to load policy [ 1766.891240] binder_alloc: binder_alloc_mmap_handler: 25300 20002000-20006000 already mapped failed -16 [ 1766.915508] SELinux: failed to load policy 12:33:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:iystem_r:kernel_t:s0\x00'}, 0x78) 12:33:53 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:33:53 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7000000, 0x2013, r1, 0x0) 12:33:53 executing program 2: 12:33:53 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4603000000000000) 12:33:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x6c, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1767.839014] binder_alloc: binder_alloc_mmap_handler: 25319 20002000-20006000 already mapped failed -16 12:33:54 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x22) 12:33:54 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x7, 0x2013, r1, 0x0) 12:33:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:uystem_r:kernel_t:s0\x00'}, 0x78) 12:33:54 executing program 2: 12:33:54 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x200000000000000) 12:33:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xc7, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1768.771531] binder_alloc: binder_alloc_mmap_handler: 25336 20002000-20006000 already mapped failed -16 [ 1768.856555] kauditd_printk_skb: 141 callbacks suppressed [ 1768.856569] audit: type=1400 audit(1539520435.015:28777): avc: denied { validate_trans } for pid=25337 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 12:33:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x40000000, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 12:33:55 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) clone(0x4040000, &(0x7f0000000040)="d5cf6e1b8b23aa904e02c7d11545996289f3d3a4ec9662e78cdcf7f8613b3e424d6de2a9a699176c493035a6d0", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="83c8b4b7d8afaaeef818f22b2e545495defdacb0d70c7f03d1ac66e576839dd988025b67949d90a9f76cae95956734450ea7e8b05975183c6d30fc1278415bd13bcdcaeac0e32ff9bf6dbc0f4883ebd811c1f09d0ee0502284bfc8370c0c45f4c28e7f3b2944c3ef96d372157e9f47e9d83a83a5ed218b4951eb56ea170c5e5d27e488c327f300d7fc242292621a99d571ed0a83169f52b72246200ba83c823abf3e819da70e05e8b61332c12e6e4d950e805afbab4766bc0d70fd6a00efd977f965dd79f6489da5cf427388218948203c11ab7779eb39ab5945b17b7b3e5a9d") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x200, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x26, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000000000008b4d8da7a00000700"], 0x28) 12:33:55 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x2013, r1, 0x0) 12:33:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:hystem_r:kernel_t:s0\x00'}, 0x78) [ 1769.065526] audit: type=1400 audit(1539520435.015:28778): avc: denied { map } for pid=25338 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1769.231066] audit: type=1400 audit(1539520435.015:28779): avc: denied { map } for pid=25336 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:33:55 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6000000) [ 1769.436742] audit: type=1400 audit(1539520435.075:28780): avc: denied { map } for pid=25338 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x12, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1769.655769] audit: type=1400 audit(1539520435.085:28781): avc: denied { map } for pid=25341 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1769.822094] audit: type=1400 audit(1539520435.095:28782): avc: denied { map } for pid=25338 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1769.883054] SELinux: policydb table sizes (-623332344,117440634) do not match mine (8,7) 12:33:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:oystem_r:kernel_t:s0\x00'}, 0x78) [ 1769.957536] SELinux: failed to load policy 12:33:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x10000000, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000500)) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) read$FUSE(r0, &(0x7f0000005000), 0xe83) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000008000), 0x139f) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x10165) write$FUSE_OPEN(r0, &(0x7f0000000640)={0x20, 0x0, 0x3}, 0x20) ioctl(r1, 0xffffffff11660000, &(0x7f0000000b40)) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) [ 1770.021030] SELinux: policydb table sizes (-623332344,117440634) do not match mine (8,7) [ 1770.038025] audit: type=1400 audit(1539520435.095:28783): avc: denied { map } for pid=25341 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1770.110971] SELinux: failed to load policy [ 1770.183850] audit: type=1400 audit(1539520435.145:28784): avc: denied { map } for pid=25341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1770.254495] binder_alloc: binder_alloc_mmap_handler: 25365 20002000-20006000 already mapped failed -16 12:33:56 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c, 0x80000) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000000c0)=""/89, &(0x7f0000000140)=0x59) [ 1770.364168] audit: type=1400 audit(1539520435.155:28785): avc: denied { map } for pid=25341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:56 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xff030000, 0x2013, r1, 0x0) 12:33:56 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6800) [ 1770.603620] audit: type=1400 audit(1539520435.185:28786): avc: denied { map } for pid=25338 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:33:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:dystem_r:kernel_t:s0\x00'}, 0x78) 12:33:57 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[], 0x0) [ 1771.618948] binder_alloc: binder_alloc_mmap_handler: 25387 20003000-20006000 already mapped failed -16 12:33:57 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:33:57 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4c00, 0x2013, r1, 0x0) 12:33:57 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x3000000) 12:33:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x137, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1772.150211] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1772.207193] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1772.233645] CPU: 1 PID: 25407 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #62 [ 1772.240969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1772.250342] Call Trace: [ 1772.252965] dump_stack+0x1c4/0x2b4 [ 1772.256623] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1772.261862] ? kasan_check_read+0x11/0x20 [ 1772.266045] warn_alloc.cold.119+0xb7/0x1bd [ 1772.270394] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1772.275271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1772.280883] __vmalloc_node_range+0x472/0x750 [ 1772.285399] ? graph_lock+0x170/0x170 [ 1772.285422] ? sel_write_load+0x1d1/0x460 [ 1772.285440] vmalloc+0x6f/0x80 [ 1772.285457] ? sel_write_load+0x1d1/0x460 [ 1772.285475] sel_write_load+0x1d1/0x460 [ 1772.304818] __vfs_write+0x119/0x9f0 [ 1772.308564] ? check_preemption_disabled+0x48/0x200 [ 1772.313602] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1772.318563] ? kernel_read+0x120/0x120 [ 1772.322483] ? __lock_is_held+0xb5/0x140 [ 1772.326585] ? rcu_read_lock_sched_held+0x108/0x120 [ 1772.331625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1772.337181] ? __sb_start_write+0x1b2/0x370 [ 1772.337202] vfs_write+0x1fc/0x560 [ 1772.345080] ksys_write+0x101/0x260 [ 1772.348735] ? __ia32_sys_read+0xb0/0xb0 [ 1772.352847] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1772.358341] __x64_sys_write+0x73/0xb0 [ 1772.362256] do_syscall_64+0x1b9/0x820 [ 1772.366170] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1772.371558] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1772.376517] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1772.381382] ? trace_hardirqs_on_caller+0x310/0x310 [ 1772.386425] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1772.391476] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1772.396521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1772.401398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1772.406605] RIP: 0033:0x457569 [ 1772.409841] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:33:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:0ystem_r:kernel_t:s0\x00'}, 0x78) [ 1772.428764] RSP: 002b:00007f75aa451c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1772.436519] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1772.443825] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1772.451116] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1772.458403] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75aa4526d4 [ 1772.465695] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1772.858838] binder_alloc: binder_alloc_mmap_handler: 25410 20002000-20006000 already mapped failed -16 12:33:59 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7f010000) 12:33:59 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6c00, 0x2013, r1, 0x0) 12:33:59 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:33:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:pystem_r:kernel_t:s0\x00'}, 0x78) [ 1773.871284] kauditd_printk_skb: 144 callbacks suppressed [ 1773.871300] audit: type=1400 audit(1539520440.025:28931): avc: denied { map } for pid=25430 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:00 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xa000000) [ 1773.992893] audit: type=1400 audit(1539520440.065:28932): avc: denied { map } for pid=25431 comm="syz-executor5" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:34:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x4f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1774.146542] binder_alloc: binder_alloc_mmap_handler: 25433 20002000-20006000 already mapped failed -16 [ 1774.153502] audit: type=1400 audit(1539520440.065:28933): avc: denied { map } for pid=25430 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1774.165454] Mem-Info: [ 1774.264724] active_anon:220317 inactive_anon:2996 isolated_anon:0 [ 1774.264724] active_file:9590 inactive_file:45339 isolated_file:0 [ 1774.264724] unevictable:9453 dirty:108 writeback:0 unstable:0 [ 1774.264724] slab_reclaimable:18423 slab_unreclaimable:104546 [ 1774.264724] mapped:62748 shmem:3094 pagetables:5773 bounce:0 [ 1774.264724] free:1062499 free_pcp:975 free_cma:0 [ 1774.287969] audit: type=1400 audit(1539520440.105:28934): avc: denied { map } for pid=25430 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1774.423637] audit: type=1400 audit(1539520440.115:28935): avc: denied { map } for pid=25430 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1774.478305] Node 0 active_anon:881232kB inactive_anon:11984kB active_file:38360kB inactive_file:181356kB unevictable:37812kB isolated(anon):0kB isolated(file):0kB mapped:250992kB dirty:432kB writeback:0kB shmem:12376kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 468992kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1774.511554] audit: type=1400 audit(1539520440.275:28936): avc: denied { map } for pid=25433 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1774.672181] audit: type=1400 audit(1539520440.285:28937): avc: denied { map } for pid=25433 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1774.687852] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1774.814075] audit: type=1400 audit(1539520440.345:28938): avc: denied { map } for pid=25433 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1774.875603] lowmem_reserve[]: 0 2819 6323 6323 [ 1774.888351] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1774.936261] audit: type=1400 audit(1539520440.525:28939): avc: denied { validate_trans } for pid=25438 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1775.047312] lowmem_reserve[]: 0 0 3503 3503 [ 1775.070819] audit: type=1400 audit(1539520440.795:28940): avc: denied { map } for pid=25441 comm="syz-executor5" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1775.100777] Node 0 Normal free:1345376kB min:37352kB low:46688kB high:56024kB active_anon:881252kB inactive_anon:11992kB active_file:38360kB inactive_file:181364kB unevictable:37812kB writepending:440kB present:4718592kB managed:3588044kB mlocked:37812kB kernel_stack:12352kB pagetables:23052kB bounce:0kB free_pcp:2496kB local_pcp:1136kB free_cma:0kB [ 1775.283455] lowmem_reserve[]: 0 0 0 0 [ 1775.287346] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1775.352321] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1775.403436] Node 0 Normal: 1500*4kB (UME) 501*8kB (UME) 2232*16kB (UME) 1354*32kB (UME) 551*64kB (UME) 164*128kB (UME) 53*256kB (UME) 27*512kB (UM) 23*1024kB (UME) 13*2048kB (UME) 274*4096kB (UM) = 1345176kB [ 1775.455284] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1775.476565] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1775.513314] 62893 total pagecache pages [ 1775.517354] 0 pages in swap cache [ 1775.520845] Swap cache stats: add 0, delete 0, find 0/0 [ 1775.553470] Free swap = 0kB [ 1775.556525] Total swap = 0kB [ 1775.559558] 1965979 pages RAM 12:34:01 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="204c696e75781500000000000000080000000700000040cf000010000000b9d1109a4612c5d2c01358f0ab62d680ae8aae2924e3e07aceb8060324ab607a61a2d1e845100b6ef9dd9783ea4af5d29662b44046659c545c796b1e3c6b473c42947bf1ab79122f5736b3a11aef6c0d0c51991f3b9ede9521c913269ad49d825be3296fa1802f87c5eb585f6f4195abdfa0b7fbc21a20127efd7b6542345442fa2b4ee287901349dc4d2de8896207577203afb4bdc9b5c31a8aff091d8b63e817985d427887aa0f8553a0e35af49150876845e35debe889ca548f1d8b118136443c40e64d2d4f580fca0f807cec01204ef577b9c54808d2ae08aa92d1ef51a88d67aad826f4986e071eff608ec5956449de00000000"], 0x114) 12:34:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:01 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x6c, 0x2013, r1, 0x0) [ 1775.562678] 0 pages HighMem/MovableOnly [ 1775.583290] 342307 pages reserved [ 1775.586776] 0 pages cma reserved 12:34:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u::ystem_r:kernel_t:s0\x00'}, 0x78) 12:34:01 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x347) 12:34:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x25, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:02 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xffffffffa0008000) 12:34:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:.ystem_r:kernel_t:s0\x00'}, 0x78) [ 1775.902229] binder_alloc: binder_alloc_mmap_handler: 25451 20002000-20006000 already mapped failed -16 12:34:02 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:02 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x480, 0x2013, r1, 0x0) [ 1776.497276] SELinux: policydb magic number 0x6e694c20 does not match expected magic number 0xf97cff8c [ 1776.580886] SELinux: failed to load policy 12:34:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:-ystem_r:kernel_t:s0\x00'}, 0x78) 12:34:02 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$assume_authority(0x10, r1) keyctl$assume_authority(0x10, r1) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:03 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6b6b6b00) [ 1776.969171] binder_alloc: binder_alloc_mmap_handler: 25474 20002000-20006000 already mapped failed -16 12:34:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x133, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:03 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2014, r1, 0x0) 12:34:03 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1777.625960] SELinux: failed to load policy [ 1777.691839] SELinux: failed to load policy 12:34:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:#ystem_r:kernel_t:s0\x00'}, 0x78) 12:34:03 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0)=0x2, 0x4) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000c8a9e4cd000010000000000000000000"], 0x28) 12:34:04 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4703000000000000) 12:34:04 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1778.039942] binder_alloc: binder_alloc_mmap_handler: 25491 20002000-20006000 already mapped failed -16 12:34:04 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x7a) 12:34:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:%ystem_r:kernel_t:s0\x00'}, 0x78) [ 1778.875707] SELinux: policydb table sizes (-840652344,1048576) do not match mine (8,7) [ 1778.883043] kauditd_printk_skb: 130 callbacks suppressed [ 1778.883057] audit: type=1400 audit(1539520445.035:29071): avc: denied { map } for pid=25505 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1778.957899] SELinux: failed to load policy [ 1779.065772] audit: type=1400 audit(1539520445.045:29072): avc: denied { map } for pid=25501 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:05 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400400) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x28) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xb9, 0x400) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0xb4d) 12:34:05 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xe400000000000000) 12:34:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xb8, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:05 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1779.292294] audit: type=1400 audit(1539520445.085:29073): avc: denied { map } for pid=25505 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1779.314764] binder_alloc: binder_alloc_mmap_handler: 25513 20002000-20006000 already mapped failed -16 12:34:05 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xfdffffffffff0f00) [ 1779.521621] audit: type=1400 audit(1539520445.085:29074): avc: denied { map } for pid=25499 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1779.640541] audit: type=1400 audit(1539520445.095:29075): avc: denied { map } for pid=25499 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1779.794497] audit: type=1400 audit(1539520445.095:29076): avc: denied { map } for pid=25505 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:s"stem_r:kernel_t:s0\x00'}, 0x78) [ 1779.963301] audit: type=1400 audit(1539520445.145:29077): avc: denied { map } for pid=25509 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:06 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x500) [ 1780.058444] SELinux: failed to load policy [ 1780.075027] audit: type=1400 audit(1539520445.155:29078): avc: denied { map } for pid=25505 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:06 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1780.167219] audit: type=1400 audit(1539520445.155:29079): avc: denied { map } for pid=25499 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1780.201427] SELinux: failed to load policy [ 1780.265350] binder_alloc: binder_alloc_mmap_handler: 25529 20002000-20006000 already mapped failed -16 12:34:06 executing program 4: socketpair$inet6(0xa, 0xf, 0x9, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0), 0x4) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1780.381769] audit: type=1400 audit(1539520445.155:29080): avc: denied { map } for pid=25509 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:06 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x8000a0) 12:34:07 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6c) 12:34:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:s:stem_r:kernel_t:s0\x00'}, 0x78) 12:34:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x107, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:07 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1781.288764] binder_alloc: binder_alloc_mmap_handler: 25543 20002000-20006000 already mapped failed -16 [ 1781.388697] SELinux: failed to load policy 12:34:07 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x8004) 12:34:07 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) accept4$unix(r0, &(0x7f0000000180), &(0x7f00000000c0)=0x6e, 0x80800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9c00002000000206e696e757815000000000000001400000007010000402c0000870a0de8100000002900dccf405dc9ecde205b45512dd5ad5f7215428b6ab01e7ae9f7925d06273ad016e6a4315ba3d7d3ce2d25bf22ba19bbb527dc5f248cca6b670e"], 0x28) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 12:34:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy.tem_r:kernel_t:s0\x00'}, 0x78) 12:34:08 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x8000000000000000) 12:34:08 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1782.367112] binder_alloc: binder_alloc_mmap_handler: 25563 20002000-20006000 already mapped failed -16 [ 1782.417892] SELinux: policydb string length 131264 does not match expected length 8 [ 1782.452427] SELinux: failed to load policy 12:34:08 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x4c00) [ 1782.508155] SELinux: policydb string length 131264 does not match expected length 8 [ 1782.572868] SELinux: failed to load policy 12:34:08 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:09 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x400000000000000) 12:34:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy0tem_r:kernel_t:s0\x00'}, 0x78) [ 1783.314537] binder_alloc: binder_alloc_mmap_handler: 25581 20002000-20006000 already mapped failed -16 12:34:09 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xb) 12:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xdc, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:09 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0), 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1783.838871] SELinux: failed to load policy [ 1783.890483] kauditd_printk_skb: 136 callbacks suppressed [ 1783.890498] audit: type=1400 audit(1539520450.045:29217): avc: denied { map } for pid=25590 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1783.913018] SELinux: failed to load policy 12:34:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x16, &(0x7f00000000c0)="f2f78e2cccb7561408aec8fe0641702f059b3c19d005fc727d7cbac7e83eba6b77bf0a3e992620f823f34cd5a165bb3f40977d569f5153f4", 0x38) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x80, r2, 0x104, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x53}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1784.076122] audit: type=1400 audit(1539520450.055:29218): avc: denied { map } for pid=25590 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1784.271802] audit: type=1400 audit(1539520450.155:29219): avc: denied { map } for pid=25593 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:10 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xff03000000000000) [ 1784.314030] binder_alloc: binder_alloc_mmap_handler: 25596 20002000-20006000 already mapped failed -16 12:34:10 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xa00000000000000) [ 1784.420430] audit: type=1400 audit(1539520450.165:29220): avc: denied { map } for pid=25590 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syxtem_r:kernel_t:s0\x00'}, 0x78) [ 1784.550402] audit: type=1400 audit(1539520450.175:29221): avc: denied { map } for pid=25590 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:10 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0), 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1784.743577] audit: type=1400 audit(1539520450.225:29222): avc: denied { map } for pid=25593 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1784.865266] audit: type=1400 audit(1539520450.235:29223): avc: denied { map } for pid=25593 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x68, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1785.016640] SELinux: failed to load policy [ 1785.028909] audit: type=1400 audit(1539520450.275:29224): avc: denied { map } for pid=25593 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1785.148801] SELinux: failed to load policy [ 1785.185731] audit: type=1400 audit(1539520450.325:29225): avc: denied { map } for pid=25593 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:11 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xff030000) 12:34:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1785.343421] audit: type=1400 audit(1539520450.365:29226): avc: denied { map } for pid=25595 comm="syz-executor5" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1785.375339] binder_alloc: binder_alloc_mmap_handler: 25614 20002000-20006000 already mapped failed -16 12:34:11 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x80040000) 12:34:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syntem_r:kernel_t:s0\x00'}, 0x78) 12:34:11 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0), 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:12 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xe400) [ 1786.216042] SELinux: failed to load policy 12:34:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x18c, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[], 0x1de) [ 1786.501086] binder_alloc: binder_alloc_mmap_handler: 25635 20002000-20006000 already mapped failed -16 12:34:12 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:12 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x4603) 12:34:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syhtem_r:kernel_t:s0\x00'}, 0x78) 12:34:13 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xb00) [ 1787.173153] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1787.232381] SELinux: failed to load policy 12:34:13 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffffffb9) 12:34:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1787.638265] binder_alloc: binder_alloc_mmap_handler: 25653 20002000-20006000 already mapped failed -16 12:34:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syotem_r:kernel_t:s0\x00'}, 0x78) 12:34:14 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x6800) 12:34:14 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x180, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000000c0)={0x1d, @multicast2, 0x4e24, 0x0, 'sh\x00', 0x12, 0xd61, 0x14}, 0x2c) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:14 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4c) 12:34:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x31, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1788.879884] binder_alloc: binder_alloc_mmap_handler: 25673 20002000-20006000 already mapped failed -16 12:34:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy*tem_r:kernel_t:s0\x00'}, 0x78) [ 1789.007222] kauditd_printk_skb: 138 callbacks suppressed [ 1789.007238] audit: type=1400 audit(1539520455.165:29365): avc: denied { map } for pid=25670 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:15 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x7400) [ 1789.210684] audit: type=1400 audit(1539520455.165:29366): avc: denied { map } for pid=25670 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:15 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xb00000000000000) [ 1789.348542] SELinux: failed to load policy [ 1789.373676] audit: type=1400 audit(1539520455.225:29367): avc: denied { map } for pid=25676 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xfd, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:15 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) fallocate(r0, 0xa, 0x800, 0x1000) [ 1789.555407] audit: type=1400 audit(1539520455.235:29368): avc: denied { map } for pid=25676 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:15 executing program 2: connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r0}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r0}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r0}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1789.763268] audit: type=1400 audit(1539520455.275:29369): avc: denied { map } for pid=25676 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1789.929276] audit: type=1400 audit(1539520455.285:29370): avc: denied { map } for pid=25676 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy#tem_r:kernel_t:s0\x00'}, 0x78) [ 1790.073306] binder_alloc: binder_alloc_mmap_handler: 25692 20002000-20006000 already mapped failed -16 [ 1790.133531] audit: type=1400 audit(1539520455.335:29371): avc: denied { map } for pid=25676 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:16 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x48) 12:34:16 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xa00000000000000) [ 1790.298848] audit: type=1400 audit(1539520455.415:29372): avc: denied { map } for pid=25676 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:16 executing program 2: connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r0}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r0}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r0}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1790.453405] SELinux: failed to load policy [ 1790.494959] SELinux: failed to load policy [ 1790.499348] audit: type=1400 audit(1539520455.435:29373): avc: denied { map } for pid=25676 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:16 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000500fcca572d7708544e2eeca9da000001000000004352a985a482a05260e6d99363ce58fd57a6e67e4cfccd6ec40979dae55d937184da88464758ada4f2c09046f7b9409750bdb4d4d9f34f6f"], 0x28) [ 1790.666228] audit: type=1400 audit(1539520455.465:29374): avc: denied { map } for pid=25676 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x21, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy-tem_r:kernel_t:s0\x00'}, 0x78) [ 1791.181511] binder_alloc: binder_alloc_mmap_handler: 25712 20002000-20006000 already mapped failed -16 12:34:17 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x8000a0ffffffff) 12:34:17 executing program 2: connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r0}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r0}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r0}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:17 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x7400000000000000) [ 1791.584971] SELinux: policydb version 83886101 does not match my version range 15-31 [ 1791.654061] SELinux: failed to load policy 12:34:17 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x10000) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000040)={0x6, 0x3, 0x9, 0x800, 0xb4, 0x7, 0xc3}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYRES32=r1], 0xfffffdea) 12:34:18 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x2000000) 12:34:18 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sydtem_r:kernel_t:s0\x00'}, 0x78) [ 1792.294106] binder_alloc: binder_alloc_mmap_handler: 25731 20002000-20006000 already mapped failed -16 12:34:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xff030000) 12:34:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x189, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:19 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) connect$netlink(r1, &(0x7f00000000c0)=@unspec, 0xc) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syitem_r:kernel_t:s0\x00'}, 0x78) 12:34:19 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7a000000) [ 1793.308391] binder_alloc: binder_alloc_mmap_handler: 25746 20002000-20006000 already mapped failed -16 12:34:19 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:19 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x2) [ 1794.032069] kauditd_printk_skb: 140 callbacks suppressed [ 1794.032083] audit: type=1400 audit(1539520460.185:29515): avc: denied { map } for pid=25764 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1794.156984] SELinux: failed to load policy [ 1794.301880] audit: type=1400 audit(1539520460.235:29516): avc: denied { map } for pid=25764 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x23) 12:34:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x80040000) 12:34:20 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1794.485138] audit: type=1400 audit(1539520460.275:29517): avc: denied { map } for pid=25764 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy%tem_r:kernel_t:s0\x00'}, 0x78) [ 1794.660386] binder_alloc: binder_alloc_mmap_handler: 25770 20002000-20006000 already mapped failed -16 12:34:20 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x6) [ 1794.763946] audit: type=1400 audit(1539520460.275:29518): avc: denied { map } for pid=25764 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1794.893087] audit: type=1400 audit(1539520460.405:29519): avc: denied { validate_trans } for pid=25763 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 12:34:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x44, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1795.073287] audit: type=1400 audit(1539520460.415:29520): avc: denied { map } for pid=25764 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1795.253260] audit: type=1400 audit(1539520460.485:29521): avc: denied { validate_trans } for pid=25763 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 12:34:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy[tem_r:kernel_t:s0\x00'}, 0x78) [ 1795.373534] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1795.396291] audit: type=1400 audit(1539520460.505:29522): avc: denied { map } for pid=25764 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1795.441391] SELinux: failed to load policy 12:34:21 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:21 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000000000007e77cc8b025d5482b080000000700000040000000"], 0x28) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x82440, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x8, 0x6, 0x8001, 0x9}]}, 0x10) 12:34:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6c00) [ 1795.605150] binder_alloc: binder_alloc_mmap_handler: 25786 20002000-20006000 already mapped failed -16 [ 1795.641368] audit: type=1400 audit(1539520460.535:29523): avc: denied { map } for pid=25764 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:21 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x6c00000000000000) [ 1795.825065] audit: type=1400 audit(1539520460.725:29524): avc: denied { map } for pid=25764 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:22 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syztem_r:kernel_t:s0\x00'}, 0x78) 12:34:22 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7) [ 1796.557452] SELinux: policydb table sizes (-931338489,1221928368) do not match mine (8,7) [ 1796.660328] SELinux: failed to load policy [ 1796.739346] binder_alloc: binder_alloc_mmap_handler: 25808 20002000-20006000 already mapped failed -16 12:34:22 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={r2, 0x2, 0x1, [0x42a7]}, &(0x7f0000000380)=0xa) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='qnx4\x00', 0x1002000, &(0x7f0000000100)='/selinux/load\x00') socket$packet(0x11, 0x2, 0x300) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800ae1707004000402c000010000000f1672cc6fb6acb3ff619ae9a6366f895aee87c28f688a378ec49eefcb89a4e8cbc39cfce8883468b2e69e16bdb63d3c5398b2b25b764c4e9c09c4b511853a11d4a12ac17cf2aa9e66a97f515f2f4c603dcf81ae54e2c76e94979312072a86589dca52cbcd8c8fcd138f0fa3611606f4fd1752b6eb3fe2dfee547627575112419a8219332616894a6abe2eac4efb9d061a8ea04ce18b2d5ff597ff0d016de117e221e242e80fd4bec7c1382d354305c3704a71f6371ce9c10f907b5fc2c2dd45499d0718806a6754f2dda4ada656f94fbebfffc7072f5be4861ce91382bfd2cae5db5c64c"], 0x28) 12:34:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x4703000000000000) 12:34:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x87, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:23 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy"tem_r:kernel_t:s0\x00'}, 0x78) 12:34:23 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x900000000000000) [ 1797.736231] SELinux: policydb table sizes (397279240,4194311) do not match mine (8,7) [ 1797.776139] SELinux: failed to load policy [ 1797.858726] SELinux: policydb table sizes (397279240,4194311) do not match mine (8,7) [ 1797.904064] binder_alloc: binder_alloc_mmap_handler: 25828 20002000-20006000 already mapped failed -16 [ 1797.921194] SELinux: failed to load policy 12:34:24 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCNXCL(r1, 0x540d) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:24 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xa0008000) 12:34:24 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syptem_r:kernel_t:s0\x00'}, 0x78) 12:34:24 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x400000000000) [ 1799.043930] binder_alloc: binder_alloc_mmap_handler: 25844 20002000-20006000 already mapped failed -16 [ 1799.091402] kauditd_printk_skb: 128 callbacks suppressed [ 1799.091418] audit: type=1400 audit(1539520465.245:29653): avc: denied { map } for pid=25842 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:25 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x4c000000) [ 1799.239588] audit: type=1400 audit(1539520465.255:29654): avc: denied { map } for pid=25842 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1799.248782] SELinux: failed to load policy [ 1799.429576] audit: type=1400 audit(1539520465.345:29655): avc: denied { map } for pid=25842 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x18f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:25 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8, 0x400) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000022c0)='/selinux/load\x00', 0x2, 0x0) r2 = dup2(r1, r1) ioctl$TCSETS(r2, 0x5402, &(0x7f00000000c0)={0x36b, 0x0, 0x4eb, 0x7, 0x1, 0x9, 0x4, 0x1, 0x1, 0x71, 0xffffffff, 0x8}) clone(0x80000, &(0x7f0000000280)="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", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000001280)="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") write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) 12:34:25 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1799.648036] audit: type=1400 audit(1539520465.395:29656): avc: denied { map } for pid=25853 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy:tem_r:kernel_t:s0\x00'}, 0x78) [ 1799.803130] audit: type=1400 audit(1539520465.425:29657): avc: denied { map } for pid=25853 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:26 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x300000000000000) [ 1799.959817] audit: type=1400 audit(1539520465.435:29658): avc: denied { map } for pid=25842 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1800.163271] audit: type=1400 audit(1539520465.445:29659): avc: denied { map } for pid=25853 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1800.264321] binder_alloc: binder_alloc_mmap_handler: 25864 20002000-20006000 already mapped failed -16 [ 1800.328841] audit: type=1400 audit(1539520465.465:29660): avc: denied { map } for pid=25853 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:26 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:26 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x7f01) [ 1800.509821] audit: type=1400 audit(1539520465.465:29661): avc: denied { map } for pid=25851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1800.594132] SELinux: failed to load policy [ 1800.666524] audit: type=1400 audit(1539520465.485:29662): avc: denied { map } for pid=25851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1800.720107] SELinux: failed to load policy 12:34:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syXtem_r:kernel_t:s0\x00'}, 0x78) 12:34:26 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) 12:34:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x5000000) 12:34:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x111, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:27 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1801.369409] binder_alloc: binder_alloc_mmap_handler: 25886 20002000-20006000 already mapped failed -16 12:34:27 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x346) 12:34:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x68000000) 12:34:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syctem_r:kernel_t:s0\x00'}, 0x78) 12:34:28 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1802.426374] SELinux: failed to load policy 12:34:28 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400042) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f00000000c0)=0x6, 0x8) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815001000200000000800000007000000402c000010000000"], 0x28) [ 1802.664144] binder_alloc: binder_alloc_mmap_handler: 25906 20002000-20006000 already mapped failed -16 12:34:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syltem_r:kernel_t:s0\x00'}, 0x78) 12:34:28 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x700000000000000) 12:34:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x9) 12:34:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x91, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1803.415802] SELinux: policydb version 1048597 does not match my version range 15-31 12:34:29 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1803.504390] SELinux: failed to load policy 12:34:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syutem_r:kernel_t:s0\x00'}, 0x78) 12:34:29 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) socket$rds(0x15, 0x5, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x115, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7400000000000000) [ 1803.824674] binder_alloc: binder_alloc_mmap_handler: 25934 20002000-20006000 already mapped failed -16 12:34:30 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x6b6b6b00) [ 1804.187920] kauditd_printk_skb: 153 callbacks suppressed [ 1804.187935] audit: type=1400 audit(1539520470.345:29816): avc: denied { map } for pid=25942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:30 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1804.361410] audit: type=1400 audit(1539520470.395:29817): avc: denied { map } for pid=25942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1804.514097] audit: type=1400 audit(1539520470.435:29818): avc: denied { map } for pid=25942 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1804.551665] SELinux: failed to load policy [ 1804.627081] SELinux: failed to load policy 12:34:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4000000000000) 12:34:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sy+tem_r:kernel_t:s0\x00'}, 0x78) [ 1804.706751] audit: type=1400 audit(1539520470.435:29819): avc: denied { map } for pid=25942 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:30 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7b115f9a58f8e143e707e7d7484528a939fd20c10fe4a2e56705dd76639fad5d35bf55077d72a8a583e2fe1814e9ead417d6afaa32d67b0566f02715085b69a54771f790f14d7293bb8d5cb9f68b9bf951f90684971712fed7d12fb3fcc11f1b3ec28e31d6e46a68ae3b36a963979171b2af980e432258878a8e85e02dec4fb0a27f48b2d13df18ae96a0492be16d2469a8d39447dde8bb8cc41171685cf8f176d339854ff76"], 0x10) write$selinux_context(r0, &(0x7f0000000100)='system_u:object_r:crond_var_run_t:s0\x00', 0x25) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xf1, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1804.852575] audit: type=1400 audit(1539520470.495:29820): avc: denied { map } for pid=25942 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1805.004927] audit: type=1400 audit(1539520470.555:29821): avc: denied { map } for pid=25942 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1805.082564] binder_alloc: binder_alloc_mmap_handler: 25957 20002000-20006000 already mapped failed -16 [ 1805.188827] audit: type=1400 audit(1539520470.555:29822): avc: denied { map } for pid=25942 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:31 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x4) 12:34:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1805.355312] audit: type=1400 audit(1539520470.625:29823): avc: denied { map } for pid=25942 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1805.498146] audit: type=1400 audit(1539520470.635:29824): avc: denied { map } for pid=25942 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7f01000000000000) [ 1805.654364] audit: type=1400 audit(1539520470.675:29825): avc: denied { validate_trans } for pid=25945 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1805.706273] SELinux: failed to load policy [ 1805.781233] SELinux: failed to load policy 12:34:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sys:em_r:kernel_t:s0\x00'}, 0x78) 12:34:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0xf0, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x1000000000200042, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) getpgid(0xffffffffffffffff) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x81, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r5 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x5, 0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f00000001c0)={0x2000000000000002, 'ip6tnl0\x00', 0x9}, 0x18) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) r8 = getpgrp(r7) prlimit64(r8, 0x7, &(0x7f00000004c0)={0x2b, 0x7ffffd}, &(0x7f0000000480)) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000180), &(0x7f0000002a00)=0xfffffffffffffdf9) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000002c0)={0x62, @multicast2, 0x4e23, 0x2, 'sed\x00', 0x9, 0x9, 0x4b}, 0xfffffffffffffe6e) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000027c0)={{0xffffffffffffffff, 0x0, 0x4, 0x3, 0x8}, 0x4, 0x1, 'id1\x00', "74696d657231000000000000000000000000000000000000000000000000000000000000008000001000", 0x0, 0x0, 0x81, 0x5, 0x1ff}) sendfile(r6, r6, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r6, 0x4c01) gettid() ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000380)={{0x7fff, 0x0, 0x8, 0x200, 0x10001, 0x6}, 0x4b5}) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1806.201746] binder_alloc: binder_alloc_mmap_handler: 25979 20002000-20006000 already mapped failed -16 12:34:32 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:32 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x6c) 12:34:32 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7a00000000000000) 12:34:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sys"em_r:kernel_t:s0\x00'}, 0x78) 12:34:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) getsockname$netlink(r0, &(0x7f0000000140), &(0x7f0000000180)=0xc) getresuid(&(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) setuid(r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockname$netlink(r2, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 12:34:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0x0, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x99, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1807.887839] binder_alloc: binder_alloc_mmap_handler: 26008 20002000-20006000 already mapped failed -16 12:34:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xa) 12:34:34 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x40000) 12:34:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:sys%em_r:kernel_t:s0\x00'}, 0x78) 12:34:34 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0x0, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1808.454862] SELinux: failed to load policy [ 1808.538080] SELinux: failed to load policy 12:34:34 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x200180) sendmmsg$alg(r1, &(0x7f0000002500)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f00000000c0)="51447c106c43eab0758e1dca9ffccd830ad9e966057fbdb3b42291e8ad0bd3810bd9c6ae022159fa602c232938a741b2d268ee1b1f4f825874d9c41ef5db44168d2d98f4144b2868f38e60e0b581e582fce972d442c791654d7e9b82232a0db15c7ebc202689b5c1534cfa77881b9ceb29344de41ad825cdceda19fdde89d7e651e0b3ce4581cc7cec17e0afa3f1a10d70ddffe38d1a2778f7516789f81c57c28150064a00185d8bbdf55047026f730610f993be5d69899253e497d2997777218d9e45d056a6d8d4fe6339cba97a57f65def2bd98e1453b20df51f9495e59602eea205abad724865", 0xe8}, {&(0x7f00000001c0)="00545f7b9399d560b89f93fd6bf5580e4e236431efe2b43256d220806592c2dcf21c60c22831976d25496964acc05a300231a4da44e7aa87479bc5d4c43126cb376b8f0aec96f5c39ac6d8d1032d36a7298f28cf57bb2ed193639147134ac14c57d98338fe0c19c891460d52acff0aa05fb887b0997fbe088d120456c23c31e803305f60b715f3102dd2d621c40475a5820216a07c181683fd869920d89e0ccba3e7498e69a467b2f969d2bb10f9cba3997ce509b8923f6c1750c0b37c776dac215d50c09a51c648e11680", 0xcb}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="730c0a6c7d6d4721255de08a2e06275451c7c1ebff02f497f5e462a1200794b817519d099bd48537886fa3a0065b5246f6fbb5bdfcd34ab994a1e231671b5759fb82a6fb4e416914ccec1cda7d3f17d720a2ac7d3471825cbb4ad6af340fc06f6136c88bed2a4914dde9545a05a7fda48306ae320737de0311c024f8a0abc51f7aecf1e3529e12c54ad8aab89a1126fb96ae851f8a8b63049196216b0a619090", 0xa0}, {&(0x7f0000001380)="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", 0x1000}], 0x5, &(0x7f0000002400)=[@assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x8}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x4}], 0xd8, 0x1}], 0x1, 0x4040010) write$selinux_load(r0, &(0x7f0000002540)={0xf97cff8c, 0x8, 'SE Linux', "ae555f08779066856c7bf54299e954e56a48bf4a8ddde4569ebc94acfc675aee1ceec5bce2f7652e5ac6133f0d74951f3dc811d74322169385052fede33f16432816122363042cfae99ea84459c7b3a4b6050d463e53515870d4023d1515f903659b8383c12e44a797d05a7106fa9f800dffe718c6442a7eb6dd2fc6c8ca863013db34e564049eeb6fde8ab2e3f3953d21451bbf3676805b50c230c7fe490e95fc2d8fb9d88bea3ffca36f9800727e1696493df99b16ab02a485477aab069c4eac31fd67d4"}, 0xd5) 12:34:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x48) [ 1809.028802] binder_alloc: binder_alloc_mmap_handler: 26030 20002000-20006000 already mapped failed -16 12:34:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syst"m_r:kernel_t:s0\x00'}, 0x78) 12:34:35 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x6000000) [ 1809.230877] kauditd_printk_skb: 125 callbacks suppressed [ 1809.230892] audit: type=1400 audit(1539520475.385:29951): avc: denied { map } for pid=26036 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1809.433313] audit: type=1400 audit(1539520475.385:29952): avc: denied { map } for pid=26036 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0x0, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1809.565231] SELinux: failed to load policy [ 1809.625581] audit: type=1400 audit(1539520475.445:29953): avc: denied { map } for pid=26036 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1809.665447] SELinux: policydb version 140465582 does not match my version range 15-31 [ 1809.728132] SELinux: failed to load policy [ 1809.784420] SELinux: failed to load policy [ 1809.839721] SELinux: policydb version 140465582 does not match my version range 15-31 [ 1809.849350] audit: type=1400 audit(1539520475.455:29954): avc: denied { map } for pid=26036 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1809.904281] SELinux: failed to load policy 12:34:36 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x202, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) r2 = geteuid() r3 = getegid() write$P9_RGETATTR(r0, &(0x7f0000000340)={0xa0, 0x19, 0x2, {0x1000, {0x40, 0x3, 0x4}, 0x36, r2, r3, 0x4, 0x400, 0x8, 0x5, 0x3fe, 0x1f, 0xffffffff, 0x3, 0x5, 0x3, 0x1ff, 0x2, 0xffff, 0xfff, 0xb}}, 0xa0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f00000000c0), r1, 0x2}}, 0x18) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES64], 0x8) 12:34:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x3b, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1810.032070] audit: type=1400 audit(1539520475.565:29955): avc: denied { map } for pid=26036 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1810.193259] audit: type=1400 audit(1539520475.675:29956): avc: denied { map } for pid=26036 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:36 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xffffffffffffc) [ 1810.348321] audit: type=1400 audit(1539520475.675:29957): avc: denied { map } for pid=26036 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syst%m_r:kernel_t:s0\x00'}, 0x78) [ 1810.525446] audit: type=1400 audit(1539520475.845:29958): avc: denied { map } for pid=26036 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1810.587998] binder_alloc: binder_alloc_mmap_handler: 26053 20002000-20006000 already mapped failed -16 12:34:36 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1810.684453] audit: type=1400 audit(1539520475.875:29959): avc: denied { map } for pid=26036 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:36 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xa000000) [ 1810.857878] audit: type=1400 audit(1539520475.965:29960): avc: denied { map } for pid=26036 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:37 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x100, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8080, 0x0) bind$llc(r0, &(0x7f0000000200)={0x1a, 0x1, 0x2, 0x6, 0x1f, 0x701e, @broadcast}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000100)=r1) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005347204c696e757815000000000000000800000007000000402c000010000000"], 0x28) fstat(r2, &(0x7f0000000180)) 12:34:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6b6b6b) 12:34:37 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syst:m_r:kernel_t:s0\x00'}, 0x78) [ 1811.862202] binder_alloc: binder_alloc_mmap_handler: 26076 20002000-20006000 already mapped failed -16 12:34:38 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x4000000) [ 1812.027600] SELinux: policydb string SG Linux does not match my string SE Linux [ 1812.087400] SELinux: failed to load policy 12:34:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x143, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1812.183951] SELinux: policydb string SG Linux does not match my string SE Linux [ 1812.262861] SELinux: failed to load policy 12:34:38 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf90f0000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:38 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x600) 12:34:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syste%_r:kernel_t:s0\x00'}, 0x78) 12:34:39 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1813.065324] binder_alloc: binder_alloc_mmap_handler: 26097 20002000-20006000 already mapped failed -16 12:34:39 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x300) 12:34:39 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4200, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "d6a9ff16e156c7305a11a2b652c6f0b58cde10adadda8fd2fda372623b8289f63388c08c9925ec229c17ba214f3e7026583df1b9b844483bb8e82cfdca3fc43f35051de66108c3a8304a69586b1168a91ad2405e5363e39bc8d2c961d4259055b5ae360316c6378ab3ec6b1211941af11af950377093fd8b3605599ff606cd5b2efeaf2adf88f010a5c270c3fa12a87da6e599bb76ebe92383fd10391eceb590f0a2620f73c5b21678c7dc3bf9e2e62326825f2203a6b709a7fcf106533702f2ccf3ae339e5bcc14d89510c14ad2c33bfac6d9436c91fabf7004a2b76dd870ffe6401fdfc751823dcf9b1830b7a1ecfa6bad8cc5a8af793604"}, 0x109) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e23}}, 0x4, 0x8000, 0x3f, "22223625740e3630bf8872432eb13173ab1156aab24a385365852935d43d0f8b7b88df63b3b8f2d10f89fe679e9ef119376c0f21fa59c94e50cc2c132389511ea6421fe3302208dcd7ac2ec94b1ac2ec"}, 0xd8) 12:34:39 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4c00) 12:34:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:syste:_r:kernel_t:s0\x00'}, 0x78) 12:34:40 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x95, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1814.278626] kauditd_printk_skb: 118 callbacks suppressed [ 1814.278640] audit: type=1400 audit(1539520480.435:30079): avc: denied { map } for pid=26116 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1814.447309] audit: type=1400 audit(1539520480.495:30080): avc: denied { map } for pid=26116 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1814.526396] binder_alloc: binder_alloc_mmap_handler: 26117 20002000-20006000 already mapped failed -16 [ 1814.586587] SELinux: failed to load policy [ 1814.596720] SELinux: policydb version 385853910 does not match my version range 15-31 12:34:40 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x4c) [ 1814.658998] SELinux: failed to load policy [ 1814.665329] audit: type=1400 audit(1539520480.495:30081): avc: denied { map } for pid=26116 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1814.729583] SELinux: failed to load policy [ 1814.741946] SELinux: policydb version 385853910 does not match my version range 15-31 12:34:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x700000000000000) [ 1814.827964] SELinux: failed to load policy [ 1814.829291] audit: type=1400 audit(1539520480.505:30082): avc: denied { map } for pid=26118 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001200)=0xe8) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '/selinux/load\x00'}], 0xa, "062e323f34c94033d22214e687a80a36fd32e83ddc1b8dcb8b0ae84aa69af233b605365c96b5e226bc9e49e76d453e101d534d8a4744db8f0287f29f5ad1fbbe74a02adc0999e5881d3f70549cefd4fff2fae08bbfb103b1ae4ddafff9d4128eec4f04c9b75b5748d7a532d38a67a25b6d4ec829acfd963f1b4b723906e9cc3ec849c8eacf0045644a81387f27d65f9068af99a5be46c0bad5ca82d22361efee7eaa796eb2336c213f48c671bc8a4221a23bbc901de3d94f862edc7c5bfa170e7227a2eb92482080ad552c83a70dccd285f502800d8988a72521fa840b9141e0d91a0ee42887e3e10f56111be779ca9b08e1dcb6243d54"}, 0x111) connect$can_bcm(r1, &(0x7f0000001240)={0x1d, r2}, 0x10) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system:r:kernel_t:s0\x00'}, 0x78) [ 1815.009394] audit: type=1400 audit(1539520480.505:30083): avc: denied { map } for pid=26118 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:41 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1815.128914] audit: type=1400 audit(1539520480.545:30084): avc: denied { map } for pid=26116 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1815.304908] audit: type=1400 audit(1539520480.545:30085): avc: denied { map } for pid=26116 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x14, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1815.471714] audit: type=1400 audit(1539520480.555:30086): avc: denied { map } for pid=26118 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1815.625041] audit: type=1400 audit(1539520480.555:30087): avc: denied { map } for pid=26118 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1815.639439] binder_alloc: binder_alloc_mmap_handler: 26138 20002000-20006000 already mapped failed -16 [ 1815.757035] SELinux: policydb magic number 0x2e202123 does not match expected magic number 0xf97cff8c [ 1815.780212] audit: type=1400 audit(1539520480.615:30088): avc: denied { map } for pid=26118 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:42 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x8004000000000000) [ 1815.835487] SELinux: failed to load policy 12:34:42 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x4000000000000) [ 1815.868513] SELinux: failed to load policy [ 1815.907301] SELinux: policydb magic number 0x2e202123 does not match expected magic number 0xf97cff8c [ 1815.939470] SELinux: failed to load policy 12:34:42 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345203f696e757815000000000000000800000007000000402c000010000200"], 0x28) 12:34:42 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, "73797374656d5f753a73797374656ddf723a6b65726e656c5f743a733000"}, 0x78) 12:34:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x60, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1816.706214] SELinux: policydb string SE ?inux does not match my string SE Linux [ 1816.759908] SELinux: failed to load policy [ 1816.770004] binder_alloc: binder_alloc_mmap_handler: 26160 20002000-20006000 already mapped failed -16 12:34:42 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4c00000000000000) 12:34:43 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1000, 0x8bff010f9e9407ec) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000000c0)={0xbb7, 0x800, 0x3, 0x17, 0x1, 0x81}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x1ff}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x5}, 0x8) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:43 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x7a000000) 12:34:43 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_::kernel_t:s0\x00'}, 0x78) [ 1817.843932] SELinux: failed to load policy [ 1817.852481] binder_alloc: binder_alloc_mmap_handler: 26177 20002000-20006000 already mapped failed -16 [ 1817.954740] SELinux: failed to load policy 12:34:44 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4c000000) 12:34:44 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x2000000) 12:34:44 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f00000000c0)=[{}], 0x0, [{}, {}, {}, {}]}, 0xb8) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:44 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x108, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_":kernel_t:s0\x00'}, 0x78) [ 1818.964037] binder_alloc: binder_alloc_mmap_handler: 26196 20002000-20006000 already mapped failed -16 12:34:45 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x2, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:45 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x4800) 12:34:45 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x480) [ 1819.159055] SELinux: failed to load policy 12:34:45 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000700)=ANY=[@ANYRESDEC=r0, @ANYPTR, @ANYRESDEC=r0], 0xe0cd19da608bdf1d) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000380)=0xc) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000780)=@assoc_id=0x0, &(0x7f00000007c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000800)={r3, 0xbb, "c05606ac30a6cf87a093509b77dded795e54f51625004a34b38d0ed08d06be3ae2ad590448e431373f7e2728446ac40832988ef9f67b85a3570ee5a1cffca5acd95a4eda77ae44e141efcf334db2f0c78b835c8bd0080a169e1780e971a14ea2b41f2ba571da0c3d984d8e13738c2c1a6ae21478b1b8d1da9ab015a650f091e6a83f33afcdd56cbe7fc1ac4dca63cdb0c6f3af7722de0971cb94b3e1f7691b4edbd89e8d2655a85a99a0bf73f659de9da2ddc9ecb4a5cc012b1f99"}, &(0x7f0000000900)=0xc3) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x4, &(0x7f0000000180)=[{&(0x7f0000000080)="d482f02174df46844ac752eb6c", 0xd, 0x5f56}, {&(0x7f00000000c0)="edc38f6e42f64c40067ad870b88d752126dca50df56d8aed8e70b579e27bb8dc4e650b40729fc7fb2676a674882c15cffe80c075f8f462e7", 0x38, 0x8}, {&(0x7f0000000100)="10b164c9e495d9f8ab9d029e16807ffd3decbb874ea8ac458104087eaf0f150cce6fd051d1a56c3ae3d094ab88b723a8cbbe67548e1c46e3991efe827b1bd61e2700ed5dc513d7333fb84865aa4e92652395b64ad1fe6857091add03014ce8a30960e7d274a3f17d3bd87e", 0x6b, 0x8}, {&(0x7f0000000280)="3afe25fcf4ba1f86186e5ebcd819f14ee4eb1b2546504baeb8af8a952c7a585776ee89942918901fed92df72a10561bfa398c5e5a303b10d3fe0520de1264d22be84e67d7f17f7a4149e3c93aee52f50888f9cb356ee2ae8c5bc538cf075e1977e2c3e07e8b49300c14fa3f38ab0d711155b4f86631fbe59afaffd405338421e6f0747fc02bdabd576fdd450048710e70df2e817e387ab0873b77616df7179dc84e9bfe616e682344528c011058a8f7fcd95a15d8dd5cc64e518d5c02bfd86980bd832ad5c90773858031d5e8613ac99eb802a3c16fdc11aea6455053181750fd72b7d0d0092a331", 0xe8, 0x5}], 0x808000, &(0x7f00000003c0)={[{@usrquota='usrquota'}, {@nointegrity='nointegrity'}], [{@dont_appraise='dont_appraise'}, {@uid_gt={'uid>', r1}}]}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x200000, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x36, &(0x7f00000006c0)=ANY=[@ANYBLOB="6f000000010000000502d818f2000000"], 0x10) ioctl$DRM_IOCTL_MAP_BUFS(r4, 0xc0186419, &(0x7f0000000680)={0x1, &(0x7f0000000440)=""/207, &(0x7f0000000640)=[{0x390d00000000, 0xf6, 0x1, &(0x7f0000000540)=""/246}]}) [ 1819.355346] kauditd_printk_skb: 148 callbacks suppressed [ 1819.355362] audit: type=1400 audit(1539520485.515:30237): avc: denied { map } for pid=26203 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1819.526433] audit: type=1400 audit(1539520485.565:30238): avc: denied { map } for pid=26203 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1819.794426] audit: type=1400 audit(1539520485.655:30239): avc: denied { map } for pid=26210 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_%:kernel_t:s0\x00'}, 0x78) [ 1819.990290] audit: type=1400 audit(1539520485.655:30240): avc: denied { map } for pid=26210 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1820.099921] binder_alloc: binder_alloc_mmap_handler: 26218 20002000-20006000 already mapped failed -16 [ 1820.167441] audit: type=1400 audit(1539520485.715:30241): avc: denied { map } for pid=26210 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xa00) 12:34:46 executing program 4: getitimer(0x0, &(0x7f0000000040)) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8c98b8360b6970db6045c657ae4cb0204c696e7578c5c77461ee2ea6d413ec179e4e89bc150000000000000008"], 0x28) 12:34:46 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:46 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7a) [ 1820.434050] audit: type=1400 audit(1539520485.715:30242): avc: denied { map } for pid=26210 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1820.613262] audit: type=1400 audit(1539520485.815:30243): avc: denied { map } for pid=26210 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x2e, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1820.787878] audit: type=1400 audit(1539520485.855:30244): avc: denied { validate_trans } for pid=26212 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1820.925453] audit: type=1400 audit(1539520485.885:30245): avc: denied { map } for pid=26210 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1821.068533] audit: type=1400 audit(1539520485.895:30246): avc: denied { map } for pid=26210 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r%kernel_t:s0\x00'}, 0x78) [ 1821.266367] SELinux: policydb magic number 0x36b8988c does not match expected magic number 0xf97cff8c 12:34:47 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1821.324816] SELinux: failed to load policy 12:34:47 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6c00000000000000) [ 1821.364191] binder_alloc: binder_alloc_mmap_handler: 26238 20002000-20006000 already mapped failed -16 [ 1821.396786] SELinux: policydb magic number 0x36b8988c does not match expected magic number 0xf97cff8c [ 1821.476552] SELinux: failed to load policy 12:34:47 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xffffffffa0008000) 12:34:47 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) 12:34:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x8e, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, "73797374656d5f753a73797374656d5f723aa765726e656c5f743a733000"}, 0x78) [ 1822.333713] SELinux: failed to load policy 12:34:48 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:48 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) r1 = getuid() fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) r4 = getegid() getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() r9 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x35, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000400)={0x0, 0x2, 0x10, 0xff, 0x894c}, &(0x7f0000000440)=0x18) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r9, 0x84, 0x75, &(0x7f0000000500)={r10, 0x5}, 0x8) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010002000000000002000600", @ANYRES32=r1, @ANYBLOB="040004000000000008000600", @ANYRES32=r2, @ANYBLOB="000000a46d5e257a49fb4571fa0dfc1ccb1300", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="08000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32=r7, @ANYBLOB="08000300", @ANYRES32=r8, @ANYBLOB="10000400000000002000060000000000"], 0x64, 0x1) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1822.440069] binder_alloc: binder_alloc_mmap_handler: 26260 20002000-20006000 already mapped failed -16 12:34:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x7) 12:34:48 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xff03) 12:34:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x135, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:k"rnel_t:s0\x00'}, 0x78) [ 1823.251525] SELinux: failed to load policy [ 1823.264520] binder_alloc: binder_alloc_mmap_handler: 26273 20002000-20006000 already mapped failed -16 12:34:49 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1823.358111] SELinux: failed to load policy 12:34:49 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x100000000000000) 12:34:49 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf908006e75781500000000000800000007000000a52c000010000000000000000000000000338a62e879bf871d97db6f6eeb843bf1ce88f2c7ec6e36ca54a28b5f102672c1bc1515c03e1bd9df5f5d58a1e5e31d19fb47f6d31754c4b10c017d4c18"], 0x28) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0400, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000140)=""/253) 12:34:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x900) 12:34:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x93, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:50 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0), 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:k%rnel_t:s0\x00'}, 0x78) [ 1824.252964] SELinux: policydb string length 1970143240 does not match expected length 8 [ 1824.304840] SELinux: failed to load policy [ 1824.339655] binder_alloc: binder_alloc_mmap_handler: 26299 20002000-20006000 already mapped failed -16 [ 1824.368494] SELinux: policydb string length 1970143240 does not match expected length 8 [ 1824.379541] kauditd_printk_skb: 152 callbacks suppressed [ 1824.379557] audit: type=1400 audit(1539520490.535:30400): avc: denied { map } for pid=26294 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1824.449407] SELinux: failed to load policy 12:34:50 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xb00) 12:34:50 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) syncfs(r0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) [ 1824.573594] audit: type=1400 audit(1539520490.535:30401): avc: denied { map } for pid=26294 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x68) [ 1824.711552] audit: type=1400 audit(1539520490.535:30399): avc: denied { map } for pid=26296 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x16e, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1825.073520] audit: type=1400 audit(1539520491.225:30402): avc: denied { validate_trans } for pid=26315 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 12:34:51 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0), 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:k:rnel_t:s0\x00'}, 0x78) [ 1825.194962] audit: type=1400 audit(1539520491.295:30403): avc: denied { validate_trans } for pid=26315 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 1825.213422] SELinux: failed to load policy [ 1825.301009] SELinux: failed to load policy [ 1825.320610] audit: type=1400 audit(1539520491.475:30404): avc: denied { map } for pid=26321 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:51 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xb) 12:34:51 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000000c0)={[0x8, 0x1, 0x0, 0xfffffffffffffffe, 0x38000000000000, 0xfffffffffffffe01, 0x0, 0x0, 0x2, 0x9, 0x7, 0x4, 0x8, 0x5a, 0x7, 0x38b3d0dc], 0xf000, 0x10200}) [ 1825.468827] binder_alloc: binder_alloc_mmap_handler: 26323 20003000-20006000 already mapped failed -16 [ 1825.493308] audit: type=1400 audit(1539520491.495:30405): avc: denied { map } for pid=26321 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:51 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xb00000000000000) [ 1825.663812] audit: type=1400 audit(1539520491.515:30406): avc: denied { map } for pid=26321 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1825.813614] audit: type=1400 audit(1539520491.525:30407): avc: denied { map } for pid=26321 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1825.987117] audit: type=1400 audit(1539520491.585:30408): avc: denied { map } for pid=26323 comm="syz-executor3" path="/dev/binder0" dev="devtmpfs" ino=16448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:34:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x11a, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:52 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x346) [ 1826.295791] SELinux: failed to load policy 12:34:52 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0), 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1826.381309] SELinux: failed to load policy 12:34:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:ke"nel_t:s0\x00'}, 0x78) 12:34:52 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000180)=ANY=[], 0xffffffffffffffb1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 1826.753977] binder_alloc: binder_alloc_mmap_handler: 26347 20002000-20006000 already mapped failed -16 12:34:53 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0xe4000000) 12:34:53 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x600000000000000) 12:34:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:ke%nel_t:s0\x00'}, 0x78) 12:34:53 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x0, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:53 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x1) 12:34:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x15a, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1827.889000] binder_alloc: binder_alloc_mmap_handler: 26367 20002000-20006000 already mapped failed -16 12:34:54 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x347) 12:34:54 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x47030000) 12:34:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:ke:nel_t:s0\x00'}, 0x78) 12:34:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x180, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:54 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) 12:34:54 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x0, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1829.283513] binder_alloc: binder_alloc_mmap_handler: 26390 20002000-20006000 already mapped failed -16 12:34:55 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0xb000000) 12:34:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x67, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:55 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x0, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1829.466681] SELinux: failed to load policy 12:34:55 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x600000000000000) 12:34:55 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x111000, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x4, 0xfffffffffffffe01, 0xff, 0xfde}, {0x7, 0x1e1, 0x9, 0x4}]}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000000000000676e00000000000000000000000000"], 0x28) 12:34:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:ker%el_t:s0\x00'}, 0x78) [ 1829.983756] kauditd_printk_skb: 130 callbacks suppressed [ 1829.983771] audit: type=1400 audit(1539520496.145:30539): avc: denied { map } for pid=26408 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1830.184152] audit: type=1400 audit(1539520496.145:30540): avc: denied { map } for pid=26408 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1830.271135] SELinux: policydb table sizes (7235328,0) do not match mine (8,7) [ 1830.281279] binder_alloc: binder_alloc_mmap_handler: 26411 20002000-20006000 already mapped failed -16 12:34:56 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x7a00) [ 1830.328609] SELinux: failed to load policy 12:34:56 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1830.406438] audit: type=1400 audit(1539520496.145:30541): avc: denied { map } for pid=26408 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1830.425247] SELinux: policydb table sizes (7235328,0) do not match mine (8,7) 12:34:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x6d, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:56 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x7f010000) [ 1830.525203] audit: type=1400 audit(1539520496.185:30542): avc: denied { map } for pid=26408 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1830.584158] SELinux: failed to load policy 12:34:56 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES64, @ANYRESDEC=r0, @ANYRES32=r0]], 0x6d) 12:34:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:ker:el_t:s0\x00'}, 0x78) [ 1830.753265] audit: type=1400 audit(1539520496.235:30543): avc: denied { map } for pid=26410 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1830.923283] audit: type=1400 audit(1539520496.255:30544): avc: denied { map } for pid=26408 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1831.071595] audit: type=1400 audit(1539520496.255:30545): avc: denied { map } for pid=26410 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1831.238728] audit: type=1400 audit(1539520496.275:30546): avc: denied { map } for pid=26410 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:57 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) [ 1831.386789] audit: type=1400 audit(1539520496.285:30547): avc: denied { map } for pid=26410 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:34:57 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x4703) 12:34:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x19a, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1831.593501] SELinux: policydb magic number 0x20000040 does not match expected magic number 0xf97cff8c 12:34:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:kern%l_t:s0\x00'}, 0x78) [ 1831.622572] audit: type=1400 audit(1539520496.305:30548): avc: denied { map } for pid=26408 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1831.624268] binder_alloc: binder_alloc_mmap_handler: 26437 20002000-20006000 already mapped failed -16 [ 1831.660188] SELinux: failed to load policy 12:34:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xce, &(0x7f0000000080), 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000"], 0x28) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) 12:34:58 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x68000000) 12:34:58 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7f19306af989d659"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x38}}, 0x0) 12:34:58 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x3) [ 1832.549875] SELinux: failed to load policy [ 1832.616506] SELinux: failed to load policy 12:34:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:pam_var_run_t:s0', 0x20, '[ystem_u:object_r:auditd_etc_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:kern:l_t:s0\x00'}, 0x78) 12:34:58 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000010000000a0c5b7e965e3555021cab1e6110b58c85bd7e7e4718722adeb4b77e2cd059f9b3865f5f1ff94e83ae6abd58331bb1008af22a0d3e6ecf57fd739980f28bf5e4ebaa5cbe92c7770b8a1f6933222a5e86bc349d42b84ef52411bf248e42d1d"], 0x86) [ 1833.003401] binder_alloc: binder_alloc_mmap_handler: 26465 20002000-20006000 already mapped failed -16 12:34:59 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2013, r0, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2013, r1, 0x1000000) 12:34:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x48, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:34:59 executing program 2: 12:34:59 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x9, 0x2013, r0, 0x6800000000000000) [ 1833.848828] WARNING: CPU: 0 PID: 26480 at mm/slab_common.c:1031 kmalloc_slab+0x56/0x70 [ 1833.856944] Kernel panic - not syncing: panic_on_warn set ... [ 1833.856944] [ 1833.864344] CPU: 0 PID: 26480 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #62 [ 1833.871619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1833.878123] kobject: 'loop2' (000000001de10e81): kobject_uevent_env [ 1833.880970] Call Trace: [ 1833.880995] dump_stack+0x1c4/0x2b4 [ 1833.881018] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1833.898847] panic+0x238/0x4e7 [ 1833.902056] ? add_taint.cold.5+0x16/0x16 [ 1833.906224] ? __warn.cold.8+0x148/0x1ba [ 1833.910305] ? kmalloc_slab+0x56/0x70 [ 1833.914117] __warn.cold.8+0x163/0x1ba [ 1833.918016] ? rcu_bh_qs+0xc0/0xc0 [ 1833.921110] kobject: 'loop2' (000000001de10e81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1833.921567] ? kmalloc_slab+0x56/0x70 [ 1833.934816] report_bug+0x254/0x2d0 [ 1833.938466] do_error_trap+0x1fc/0x4d0 [ 1833.942364] ? math_error+0x3f0/0x3f0 [ 1833.946183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1833.951038] ? trace_hardirqs_on_caller+0x310/0x310 [ 1833.956274] ? graph_lock+0x170/0x170 [ 1833.960093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1833.965647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1833.970508] do_invalid_op+0x1b/0x20 [ 1833.974233] invalid_op+0x14/0x20 [ 1833.977701] RIP: 0010:kmalloc_slab+0x56/0x70 [ 1833.982118] Code: c5 60 ab 00 89 5d c3 48 85 ff b8 10 00 00 00 74 f4 83 ef 01 c1 ef 03 0f b6 87 80 aa 00 89 eb d8 31 c0 81 e6 00 02 00 00 75 db <0f> 0b 5d c3 48 8b 04 c5 a0 aa 00 89 5d c3 66 90 66 2e 0f 1f 84 00 [ 1834.001032] RSP: 0018:ffff8801d544f2a0 EFLAGS: 00010246 [ 1834.006981] RAX: 0000000000000000 RBX: 00000000e9b7c5a0 RCX: ffffc90009f20000 [ 1834.014262] RDX: 0000000000007ac7 RSI: 0000000000000000 RDI: 00000000e9b7c5a1 [ 1834.021538] RBP: ffff8801d544f2a0 R08: ffff8801827cc000 R09: 1ffffffff1273955 [ 1834.028844] R10: ffffed003b5c4732 R11: ffff8801dae23993 R12: 00000000006000c0 [ 1834.036121] R13: ffff8801d544f938 R14: ffff8801d544f3c0 R15: 00000000006000c0 [ 1834.043426] __kmalloc+0x25/0x760 [ 1834.046895] ? hashtab_create+0x126/0x230 [ 1834.051055] ? hashtab_stat+0x1f0/0x1f0 [ 1834.055040] ? symcmp+0x30/0x30 [ 1834.058332] ? str_read+0x48/0x160 [ 1834.061883] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1834.066914] str_read+0x48/0x160 [ 1834.070299] common_read+0x380/0x580 [ 1834.074029] ? user_read+0x590/0x590 [ 1834.077754] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1834.083229] ? policydb_read+0x8f7/0x5f30 [ 1834.087402] policydb_read+0xef9/0x5f30 [ 1834.091387] ? save_stack+0xa9/0xd0 [ 1834.095043] ? user_read+0x590/0x590 12:35:00 executing program 2: [ 1834.098773] ? string_to_av_perm+0xb0/0xb0 [ 1834.103029] ? find_held_lock+0x36/0x1c0 [ 1834.107101] ? graph_lock+0x170/0x170 [ 1834.110923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.116470] ? check_preemption_disabled+0x48/0x200 [ 1834.121494] ? check_preemption_disabled+0x48/0x200 [ 1834.126546] ? security_load_policy+0x174/0x1630 [ 1834.131319] ? rcu_read_lock_sched_held+0x108/0x120 [ 1834.136351] ? kmem_cache_alloc_trace+0x353/0x750 [ 1834.141212] ? check_preemption_disabled+0x48/0x200 [ 1834.146238] ? check_preemption_disabled+0x48/0x200 [ 1834.151278] security_load_policy+0x23b/0x1630 [ 1834.155873] ? __lock_is_held+0xb5/0x140 [ 1834.159961] ? security_change_sid+0x50/0x50 [ 1834.164379] ? __alloc_pages_nodemask+0xb5a/0xde0 [ 1834.169238] ? graph_lock+0x170/0x170 [ 1834.173051] ? graph_lock+0x170/0x170 [ 1834.176876] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1834.181912] ? vmap_page_range_noflush+0x7fc/0xa80 [ 1834.186874] ? __might_fault+0x12b/0x1e0 [ 1834.190948] ? lock_downgrade+0x900/0x900 [ 1834.195116] ? lock_release+0x970/0x970 [ 1834.198239] binder_alloc: binder_alloc_mmap_handler: 26482 20002000-20006000 already mapped failed -16 [ 1834.199099] ? arch_local_save_flags+0x40/0x40 [ 1834.199125] ? usercopy_warn+0x110/0x110 [ 1834.217222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1834.222768] ? _copy_from_user+0xdf/0x150 [ 1834.226957] sel_write_load+0x24d/0x460 [ 1834.230968] __vfs_write+0x119/0x9f0 [ 1834.234699] ? check_preemption_disabled+0x48/0x200 [ 1834.239723] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1834.244665] ? kernel_read+0x120/0x120 [ 1834.248588] ? __lock_is_held+0xb5/0x140 [ 1834.252675] ? rcu_read_lock_sched_held+0x108/0x120 [ 1834.257702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.263249] ? __sb_start_write+0x1b2/0x370 [ 1834.267583] vfs_write+0x1fc/0x560 [ 1834.271147] ksys_write+0x101/0x260 [ 1834.274804] ? __ia32_sys_read+0xb0/0xb0 [ 1834.278882] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1834.284348] __x64_sys_write+0x73/0xb0 [ 1834.288252] do_syscall_64+0x1b9/0x820 [ 1834.292182] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1834.297557] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1834.302497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1834.307354] ? trace_hardirqs_on_caller+0x310/0x310 [ 1834.312380] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1834.317411] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1834.322449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1834.327311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1834.332510] RIP: 0033:0x457569 [ 1834.335710] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1834.354620] RSP: 002b:00007f75aa451c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1834.362334] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1834.369644] RDX: 0000000000000086 RSI: 0000000020000140 RDI: 0000000000000003 [ 1834.376921] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1834.384203] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75aa4526d4 [ 1834.391481] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1834.400064] Kernel Offset: disabled [ 1834.403707] Rebooting in 86400 seconds..