audit: type=1400 audit(1559289527.613:38): avc: denied { map } for pid=7536 comm="syz-executor.0" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=27171 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 hrtimer: interrupt took 25244 ns kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 7541 Comm: syz-executor.0 Not tainted 4.14.122 #16 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888093028400 task.stack: ffff88806d048000 RIP: 0010:proto_seq_printf net/core/sock.c:3307 [inline] RIP: 0010:proto_seq_show+0x52/0x8c0 net/core/sock.c:3324 RSP: 0018:ffff88806d04f478 EFLAGS: 00010a06 RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90006036000 RDX: 1bd5a0000000000c RSI: ffffffff84cc751f RDI: dead000000000060 RBP: ffff88806d04f508 R08: ffff88809b458e08 R09: ffffed100e15e9b4 R10: ffffed100e15e9b3 R11: ffff888070af4d9d R12: dffffc0000000000 R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3b20 FS: 00007f04c2e34700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b3272a000 CR3: 000000008af54000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: seq_read+0xb46/0x1280 fs/seq_file.c:272 proc_reg_read+0xfa/0x170 fs/proc/inode.c:217 do_loop_readv_writev fs/read_write.c:694 [inline] do_loop_readv_writev fs/read_write.c:681 [inline] do_iter_read+0x3e2/0x5b0 fs/read_write.c:918 vfs_readv+0xd3/0x130 fs/read_write.c:980 kernel_readv fs/splice.c:361 [inline] default_file_splice_read+0x421/0x7b0 fs/splice.c:416 do_splice_to+0x105/0x170 fs/splice.c:880 splice_direct_to_actor+0x222/0x7b0 fs/splice.c:952 do_splice_direct+0x18d/0x230 fs/splice.c:1061 do_sendfile+0x4db/0xbd0 fs/read_write.c:1440 SYSC_sendfile64 fs/read_write.c:1501 [inline] SyS_sendfile64+0x102/0x110 fs/read_write.c:1487 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459279 RSP: 002b:00007f04c2e33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000008000 R11: 0000000000000246 R12: 00007f04c2e346d4 R13: 00000000004c65f3 R14: 00000000004db268 R15: 00000000ffffffff Code: 06 00 00 e8 61 2e 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 RIP: proto_seq_printf net/core/sock.c:3307 [inline] RSP: ffff88806d04f478 RIP: proto_seq_show+0x52/0x8c0 net/core/sock.c:3324 RSP: ffff88806d04f478 ---[ end trace ba8eb98b4de91eeb ]---