kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 3091 Comm: syz-executor0 Not tainted 4.15.0-rc1+ #114 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: 0000000050cf4b34 task.stack: 000000003c7bfb7a RIP: 0010:sidtab_search_core+0x6a/0x320 security/selinux/ss/sidtab.c:88 RSP: 0018:ffff8801cc5672f0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000000008 RCX: ffffffff82207ffd RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffffffff874c5180 RBP: ffff8801cc567320 R08: 0000000000000001 R09: 1ffffffff0d6ab32 R10: 0000000000000000 R11: ffffffff87489d60 R12: 0000000000000001 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8801db400000(0063) knlGS:00000000f7fcfb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000008090150 CR3: 00000001cbb17000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: sidtab_search+0x1f/0x30 security/selinux/ss/sidtab.c:111 security_bounded_transition+0xa8/0x4d0 security/selinux/ss/services.c:873 selinux_setprocattr+0x8d0/0xb50 security/selinux/hooks.c:6042 security_setprocattr+0x85/0xc0 security/security.c:1264 proc_pid_attr_write+0x1e6/0x280 fs/proc/base.c:2545 __vfs_write+0xef/0x970 fs/read_write.c:480 __kernel_write+0xfe/0x350 fs/read_write.c:501 write_pipe_buf+0x175/0x220 fs/splice.c:797 splice_from_pipe_feed fs/splice.c:502 [inline] __splice_from_pipe+0x328/0x730 fs/splice.c:626 splice_from_pipe+0x1e9/0x330 fs/splice.c:661 default_file_splice_write+0x40/0x90 fs/splice.c:809 do_splice_from fs/splice.c:851 [inline] direct_splice_actor+0x125/0x180 fs/splice.c:1018 splice_direct_to_actor+0x2c1/0x820 fs/splice.c:973 do_splice_direct+0x2a7/0x3d0 fs/splice.c:1061 do_sendfile+0x5d5/0xe90 fs/read_write.c:1413 C_SYSC_sendfile fs/read_write.c:1489 [inline] compat_SyS_sendfile+0xea/0x1a0 fs/read_write.c:1478 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x51/0x60 arch/x86/entry/entry_64_compat.S:125 RIP: 0023:0xf7fd3c79 RSP: 002b:00000000f7fcf08c EFLAGS: 00000296 ORIG_RAX: 00000000000000bb RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000020014000 RSI: 0000000000000008 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Code: ea 03 41 83 e4 7f 80 3c 02 00 0f 85 7d 02 00 00 4c 8b 33 4d 63 e4 48 b8 00 00 00 00 00 fc ff df 4b 8d 1c e6 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 41 02 00 00 48 8b 1b 48 85 db 0f 84 8b 00 00 RIP: sidtab_search_core+0x6a/0x320 security/selinux/ss/sidtab.c:88 RSP: ffff8801cc5672f0 ---[ end trace 728858a8403ca440 ]---