BUG: unable to handle page fault for address: ffffffff819370f1 #PF: supervisor write access in kernel mode #PF: error_code(0x0003) - permissions violation PGD 5e11067 P4D 5e11067 PUD 5e12063 PMD 18001e1 Oops: 0003 [#1] PREEMPT SMP KASAN CPU: 0 PID: 1241 Comm: syz-executor.0 Tainted: G W 5.4.274-syzkaller-00016-gdd432c37afcd #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:__hlist_del include/linux/list.h:791 [inline] RIP: 0010:detach_timer kernel/time/timer.c:824 [inline] RIP: 0010:expire_timers kernel/time/timer.c:1482 [inline] RIP: 0010:__run_timers+0x7be/0xbe0 kernel/time/timer.c:1817 Code: 74 2e e8 e5 68 0f 00 49 83 c5 08 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 ef e8 32 4e 3f 00 <4d> 89 65 00 eb 05 e8 b7 68 0f 00 49 bd 00 00 00 00 00 fc ff df 42 RSP: 0018:ffff8881f6e09d60 EFLAGS: 00010046 RAX: 1ffffffff0326e1e RBX: 1ffff1103a7bee39 RCX: dffffc0000000000 RDX: 0000000080000102 RSI: 0000000000000004 RDI: ffff8881f6e09ce0 RBP: ffff8881f6e09ec8 R08: dffffc0000000000 R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: ffff8881f6e09e20 R13: ffffffff819370f1 R14: 1ffff1103a7bee38 R15: ffff8881d3df71c8 FS: 00005555558ed480(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff819370f1 CR3: 00000001d28b3000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x195/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:538 [inline] smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834 RIP: 0010:unwind_get_return_address+0x4/0x80 arch/x86/kernel/unwind_orc.c:309 Code: 8c fb fe ff ff 48 89 df 89 74 24 14 e8 55 64 64 00 48 8d 7c 24 40 8b 74 24 14 e9 e1 fe ff ff e8 42 34 0b 00 66 90 41 57 41 56 <53> 48 89 fb 49 be 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 03 42 RSP: 0018:ffff8881d3fd6f28 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 RAX: 0000000080000001 RBX: ffff8881d3fd6f40 RCX: 4136595ec3ae8c00 RDX: ffff8881d3fd6f80 RSI: ffff8881d3fd6bc0 RDI: ffff8881d3fd6f40 RBP: ffff8881d3fd6fd0 R08: dffffc0000000000 R09: ffff8881d3fd6f90 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881ebd29f80 R13: ffffffff8153b310 R14: ffff8881d3fd7020 R15: 0000000000000000 arch_stack_walk+0xf5/0x140 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x118/0x1c0 kernel/stacktrace.c:123 save_stack mm/kasan/common.c:70 [inline] set_track mm/kasan/common.c:78 [inline] __kasan_kmalloc+0x171/0x210 mm/kasan/common.c:529 slab_post_alloc_hook mm/slab.h:584 [inline] slab_alloc_node mm/slub.c:2829 [inline] slab_alloc mm/slub.c:2837 [inline] __kmalloc+0x105/0x2e0 mm/slub.c:3909 kmalloc include/linux/slab.h:561 [inline] context_struct_to_string+0x441/0x8a0 security/selinux/ss/services.c:1238 context_add_hash+0x141/0x270 security/selinux/ss/services.c:1479 context_struct_to_sid security/selinux/ss/services.c:1497 [inline] security_compute_sid+0x11a7/0x1d60 security/selinux/ss/services.c:1861 security_transition_sid+0x78/0x90 security/selinux/ss/services.c:1886 selinux_determine_inode_label security/selinux/hooks.c:1822 [inline] selinux_inode_init_security+0x49f/0xad0 security/selinux/hooks.c:2935 security_inode_init_security+0x14e/0x3e0 security/security.c:998 __ext4_new_inode+0x2fb9/0x3f10 fs/ext4/ialloc.c:1168 ext4_symlink+0x4a1/0xef0 fs/ext4/namei.c:3427 vfs_symlink+0x36c/0x500 fs/namei.c:4276 do_symlinkat+0x19b/0x400 fs/namei.c:4303 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x5c/0xc1 RIP: 0033:0x7f967a89b6e7 Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0a 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe0818f858 EFLAGS: 00000202 ORIG_RAX: 000000000000010a RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f967a89b6e7 RDX: 00007f967a8f977b RSI: 00000000ffffff9c RDI: 00007ffe0818f910 RBP: 0000000000000001 R08: 0000000000000013 R09: 00007ffe0818f5a7 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffe0818f910 R15: 0000000000000001 Modules linked in: CR2: ffffffff819370f1 ---[ end trace 9dba3e1f9e6efda7 ]--- RIP: 0010:__hlist_del include/linux/list.h:791 [inline] RIP: 0010:detach_timer kernel/time/timer.c:824 [inline] RIP: 0010:expire_timers kernel/time/timer.c:1482 [inline] RIP: 0010:__run_timers+0x7be/0xbe0 kernel/time/timer.c:1817 Code: 74 2e e8 e5 68 0f 00 49 83 c5 08 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 ef e8 32 4e 3f 00 <4d> 89 65 00 eb 05 e8 b7 68 0f 00 49 bd 00 00 00 00 00 fc ff df 42 RSP: 0018:ffff8881f6e09d60 EFLAGS: 00010046 RAX: 1ffffffff0326e1e RBX: 1ffff1103a7bee39 RCX: dffffc0000000000 RDX: 0000000080000102 RSI: 0000000000000004 RDI: ffff8881f6e09ce0 RBP: ffff8881f6e09ec8 R08: dffffc0000000000 R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: ffff8881f6e09e20 R13: ffffffff819370f1 R14: 1ffff1103a7bee38 R15: ffff8881d3df71c8 FS: 00005555558ed480(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff819370f1 CR3: 00000001d28b3000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: 74 2e je 0x30 2: e8 e5 68 0f 00 call 0xf68ec 7: 49 83 c5 08 add $0x8,%r13 b: 4c 89 e8 mov %r13,%rax e: 48 c1 e8 03 shr $0x3,%rax 12: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 19: fc ff df 1c: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) 20: 74 08 je 0x2a 22: 4c 89 ef mov %r13,%rdi 25: e8 32 4e 3f 00 call 0x3f4e5c * 2a: 4d 89 65 00 mov %r12,0x0(%r13) <-- trapping instruction 2e: eb 05 jmp 0x35 30: e8 b7 68 0f 00 call 0xf68ec 35: 49 bd 00 00 00 00 00 movabs $0xdffffc0000000000,%r13 3c: fc ff df 3f: 42 rex.X