audit: type=1400 audit(1559543858.380:39): avc: denied { map } for pid=7813 comm="syz-executor.0" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=28155 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 hrtimer: interrupt took 34923 ns kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 7816 Comm: syz-executor.0 Not tainted 4.14.123 #17 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888078d3a5c0 task.stack: ffff8880681a8000 RIP: 0010:proto_seq_printf net/core/sock.c:3307 [inline] RIP: 0010:proto_seq_show+0x52/0x8c0 net/core/sock.c:3324 RSP: 0018:ffff8880681af478 EFLAGS: 00010a06 RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90006076000 RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 RBP: ffff8880681af508 R08: ffff8880900ee448 R09: ffffed100cf4114c R10: ffffed100cf4114b R11: ffff888067a08a5d R12: dffffc0000000000 R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 FS: 00007f3014151700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000200019c0 CR3: 0000000099135000 CR4: 00000000001406f0 Call Trace: seq_read+0xb46/0x1280 fs/seq_file.c:272 proc_reg_read+0xfa/0x170 fs/proc/inode.c:217 do_loop_readv_writev fs/read_write.c:694 [inline] do_loop_readv_writev fs/read_write.c:681 [inline] do_iter_read+0x3e2/0x5b0 fs/read_write.c:918 vfs_readv+0xd3/0x130 fs/read_write.c:980 kernel_readv fs/splice.c:361 [inline] default_file_splice_read+0x421/0x7b0 fs/splice.c:416 do_splice_to+0x105/0x170 fs/splice.c:880 splice_direct_to_actor+0x222/0x7b0 fs/splice.c:952 do_splice_direct+0x18d/0x230 fs/splice.c:1061 do_sendfile+0x4db/0xbd0 fs/read_write.c:1440 SYSC_sendfile64 fs/read_write.c:1501 [inline] SyS_sendfile64+0x102/0x110 fs/read_write.c:1487 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459279 RSP: 002b:00007f3014150c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000008000 R11: 0000000000000246 R12: 00007f30141516d4 R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 RIP: proto_seq_printf net/core/sock.c:3307 [inline] RSP: ffff8880681af478 RIP: proto_seq_show+0x52/0x8c0 net/core/sock.c:3324 RSP: ffff8880681af478 ---[ end trace a55903a0b471bd49 ]---