REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "" REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "" kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 29716 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #27 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__fire_sched_in_preempt_notifiers kernel/sched/core.c:2481 [inline] RIP: 0010:fire_sched_in_preempt_notifiers kernel/sched/core.c:2487 [inline] RIP: 0010:finish_task_switch+0x599/0x900 kernel/sched/core.c:2679 Code: 89 e1 48 c1 e9 03 42 80 3c 39 00 0f 85 a7 01 00 00 4d 8b 24 24 4d 85 e4 0f 84 ad fc ff ff 49 8d 7c 24 10 48 89 f9 48 c1 e9 03 <42> 80 3c 39 00 74 a5 e8 5b cb 6c 00 eb 9e 49 8d 7d 78 48 b8 00 00 kobject: 'loop3' (000000008b848821): kobject_uevent_env RSP: 0018:ffff88007a5f6fb0 EFLAGS: 00010a06 RAX: 0000000000000000 RBX: ffff8801dae2cb40 RCX: 1bd5a00000000022 RDX: 0000000000017d04 RSI: ffffffff810f036e RDI: dead000000000110 RBP: ffff88007a5f7098 R08: ffff88008f216000 R09: fffff52000337a46 R10: fffff52000337a46 R11: ffffc900019bd237 R12: dead000000000100 R13: ffff8801cba9e2c0 R14: ffff8801c511d0c0 R15: dffffc0000000000 FS: 00007f7f6399f700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 kobject: 'loop4' (00000000239b780c): kobject_uevent_env CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7f6395cdb8 CR3: 000000014f6d8000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 kobject: 'loop3' (000000008b848821): fill_kobj_path: path = '/devices/virtual/block/loop3' Call Trace: kobject: 'loop4' (00000000239b780c): fill_kobj_path: path = '/devices/virtual/block/loop4' REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "" context_switch kernel/sched/core.c:2828 [inline] __schedule+0x874/0x1ed0 kernel/sched/core.c:3473 preempt_schedule_irq+0x87/0x110 kernel/sched/core.c:3700 retint_kernel+0x1b/0x2d RIP: 0010:memset_erms+0xb/0x10 arch/x86/lib/memset_64.S:66 Code: 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 f3 aa <4c> 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 01 01 RSP: 0018:ffff88007a5f7378 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 RAX: 1ffff10037069900 RBX: ffffed00370699cc RCX: 0000000000000000 RDX: 000000000000000c RSI: 0000000000000000 RDI: ffffed00370699cc RBP: ffff88007a5f7390 R08: ffff88008f2168a0 R09: ffffed00370699c0 R10: 0000000000000000 R11: ffff88008f216000 R12: 0000000000000060 R13: ffff8801b834ce00 R14: ffff8801b834ce5f R15: ffff8801b834ce5f kasan_kmalloc+0x4a/0xe0 mm/kasan/kasan.c:548 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:490 slab_post_alloc_hook mm/slab.h:444 [inline] slab_alloc mm/slab.c:3392 [inline] kmem_cache_alloc+0x11b/0x730 mm/slab.c:3552 kmem_cache_zalloc include/linux/slab.h:697 [inline] inode_alloc_security security/selinux/hooks.c:255 [inline] selinux_inode_alloc_security+0x107/0x3a0 security/selinux/hooks.c:2977 security_inode_alloc+0x73/0xd0 security/security.c:448 inode_init_always+0x68f/0xd80 fs/inode.c:168 alloc_inode+0x80/0x190 fs/inode.c:217 new_inode_pseudo+0x71/0x1a0 fs/inode.c:903 new_inode+0x1c/0x40 fs/inode.c:932 debugfs_get_inode+0x19/0x120 fs/debugfs/inode.c:37 __debugfs_create_file+0xb5/0x400 fs/debugfs/inode.c:352 debugfs_create_file+0x57/0x70 fs/debugfs/inode.c:399 kvm_create_vm_debugfs arch/x86/kvm/../../../virt/kvm/kvm_main.c:620 [inline] kvm_dev_ioctl_create_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:3214 [inline] kvm_dev_ioctl+0xbe0/0x1b10 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3241 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:685 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:702 __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl fs/ioctl.c:707 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:707 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f7f6399ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7f6399f6d4 RCX: 0000000000457679 RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000008 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff kobject: 'kvm' (000000004af7cbdb): kobject_uevent_env R13: 00000000004cfc28 R14: 00000000004bfd60 R15: 0000000000000000 Modules linked in: ---[ end trace 6f47a1d44e299707 ]--- RIP: 0010:__fire_sched_in_preempt_notifiers kernel/sched/core.c:2481 [inline] RIP: 0010:fire_sched_in_preempt_notifiers kernel/sched/core.c:2487 [inline] RIP: 0010:finish_task_switch+0x599/0x900 kernel/sched/core.c:2679 Code: 89 e1 48 c1 e9 03 42 80 3c 39 00 0f 85 a7 01 00 00 4d 8b 24 24 4d 85 e4 0f 84 ad fc ff ff 49 8d 7c 24 10 48 89 f9 48 c1 e9 03 <42> 80 3c 39 00 74 a5 e8 5b cb 6c 00 eb 9e 49 8d 7d 78 48 b8 00 00 RSP: 0018:ffff88007a5f6fb0 EFLAGS: 00010a06 RAX: 0000000000000000 RBX: ffff8801dae2cb40 RCX: 1bd5a00000000022 RDX: 0000000000017d04 RSI: ffffffff810f036e RDI: dead000000000110 RBP: ffff88007a5f7098 R08: ffff88008f216000 R09: fffff52000337a46 R10: fffff52000337a46 R11: ffffc900019bd237 R12: dead000000000100 R13: ffff8801cba9e2c0 R14: ffff8801c511d0c0 R15: dffffc0000000000 FS: 00007f7f6399f700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7f6395cdb8 CR3: 000000014f6d8000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400