hrtimer: interrupt took 34436 ns audit: type=1400 audit(1559637595.880:39): avc: denied { map } for pid=7503 comm="syz-executor.3" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=26502 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 7509 Comm: syz-executor.3 Not tainted 4.14.123 #17 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880a07d4500 task.stack: ffff88806fe98000 RIP: 0010:proto_seq_printf net/core/sock.c:3307 [inline] RIP: 0010:proto_seq_show+0x52/0x8c0 net/core/sock.c:3324 RSP: 0018:ffff88806fe9f478 EFLAGS: 00010a06 RAX: dffffc0000000000 RBX: dead000000000100 RCX: ffffc90006448000 RDX: 1bd5a0000000000c RSI: ffffffff84cc851f RDI: dead000000000060 RBP: ffff88806fe9f508 R08: ffff8880a4deb448 R09: ffffed1014b9659c R10: ffffed1014b9659b R11: ffff8880a5cb2cdd R12: dffffc0000000000 R13: dead000000000100 R14: 0000000000000004 R15: ffffffff86ee3fe0 FS: 00007f2e6b377700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b3032a000 CR3: 0000000095572000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: seq_read+0xb46/0x1280 fs/seq_file.c:272 proc_reg_read+0xfa/0x170 fs/proc/inode.c:217 do_loop_readv_writev fs/read_write.c:694 [inline] do_loop_readv_writev fs/read_write.c:681 [inline] do_iter_read+0x3e2/0x5b0 fs/read_write.c:918 vfs_readv+0xd3/0x130 fs/read_write.c:980 kernel_readv fs/splice.c:361 [inline] default_file_splice_read+0x421/0x7b0 fs/splice.c:416 do_splice_to+0x105/0x170 fs/splice.c:880 splice_direct_to_actor+0x222/0x7b0 fs/splice.c:952 do_splice_direct+0x18d/0x230 fs/splice.c:1061 do_sendfile+0x4db/0xbd0 fs/read_write.c:1440 SYSC_sendfile64 fs/read_write.c:1501 [inline] SyS_sendfile64+0x102/0x110 fs/read_write.c:1487 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459279 RSP: 002b:00007f2e6b376c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000008000 R11: 0000000000000246 R12: 00007f2e6b3776d4 R13: 00000000004c65f3 R14: 00000000004db2a8 R15: 00000000ffffffff Code: 06 00 00 e8 a1 20 90 fc 48 8d bb 60 ff ff ff 48 8d 83 90 fe ff ff 48 89 fa 48 89 45 c8 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 b3 07 00 00 48 83 bb 60 ff ff ff 01 19 c0 83 RIP: proto_seq_printf net/core/sock.c:3307 [inline] RSP: ffff88806fe9f478 RIP: proto_seq_show+0x52/0x8c0 net/core/sock.c:3324 RSP: ffff88806fe9f478 ---[ end trace 33327c22c7b2f455 ]---