kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 3574 Comm: syz-executor2 Not tainted 4.9.67-gf26d3c7 #106 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801a503b000 task.stack: ffff8801a4f70000 RIP: 0010:[] [] sidtab_search_core+0x6a/0x320 security/selinux/ss/sidtab.c:94 RSP: 0018:ffff8801a4f77490 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000000008 RCX: ffffc90002168000 RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffffffff8593e620 RBP: ffff8801a4f774c0 R08: ffffffff853907c0 R09: ffffffff83a5e040 R10: 0000000000000001 R11: ffff8801a503b000 R12: 0000000000000001 R13: 0000000000000001 R14: 0000000000000000 R15: ffff8801a7cb9cf0 FS: 00007fa702695700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b9bc22000 CR3: 00000001a4dca000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: 0000000000000001 ffffffff8593e620 0000000000000001 0000000000000001 0000000000000001 ffff8801a7cb9cf0 ffff8801a4f774e0 ffffffff81c0582f dffffc0000000000 ffff8801a7cb9cf4 ffff8801a4f77608 ffffffff81c23952 Call Trace: [] sidtab_search+0x1f/0x30 security/selinux/ss/sidtab.c:117 [] security_bounded_transition+0xb2/0x3a0 security/selinux/ss/services.c:860 [] selinux_setprocattr+0x8b0/0xa80 security/selinux/hooks.c:5941 [] security_setprocattr+0x8d/0xc0 security/security.c:1177 [] proc_pid_attr_write+0x1bd/0x270 fs/proc/base.c:2510 [] __vfs_write+0x103/0x680 fs/read_write.c:510 [] __kernel_write+0xf0/0x340 fs/read_write.c:532 [] write_pipe_buf+0x159/0x1f0 fs/splice.c:816 [] splice_from_pipe_feed fs/splice.c:521 [inline] [] __splice_from_pipe+0x323/0x730 fs/splice.c:645 [] splice_from_pipe+0xf9/0x160 fs/splice.c:680 [] default_file_splice_write+0x40/0x90 fs/splice.c:828 [] do_splice_from fs/splice.c:870 [inline] [] direct_splice_actor+0x125/0x180 fs/splice.c:1037 [] splice_direct_to_actor+0x2cc/0x800 fs/splice.c:992 [] do_splice_direct+0x1a7/0x270 fs/splice.c:1080 [] do_sendfile+0x54b/0xd30 fs/read_write.c:1401 [] SYSC_sendfile64 fs/read_write.c:1456 [inline] [] SyS_sendfile64+0xd1/0x160 fs/read_write.c:1448 [] entry_SYSCALL_64_fastpath+0x23/0xc6 Code: ea 03 41 83 e4 7f 80 3c 02 00 0f 85 7d 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 33 4d 63 e4 4b 8d 1c e6 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 41 02 00 00 48 8b 1b 48 85 db 0f 84 8b 00 00 RIP [] sidtab_search_core+0x6a/0x320 security/selinux/ss/sidtab.c:94 RSP ---[ end trace 0bfdbd020c92ea35 ]---