------------[ cut here ]------------ kernel BUG at security/keys/keyring.c:1214! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 26367 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #63 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__key_link_begin+0x23a/0x300 security/keys/keyring.c:1214 Code: fe 48 c7 c7 20 a9 67 89 e8 c3 27 23 fe eb ac e8 bc 59 42 fe 48 c7 c7 20 a9 67 89 e8 20 97 73 04 e9 e3 fe ff ff e8 a6 59 42 fe <0f> 0b e8 9f 59 42 fe 48 8d bb ce 00 00 00 48 b8 00 00 00 00 00 fc RSP: 0018:ffff88018776fb10 EFLAGS: 00010216 RAX: 0000000000040000 RBX: ffff8801bd2a2540 RCX: ffffc90003e8e000 RDX: 000000000000140b RSI: ffffffff833c4faa RDI: 0000000000000007 RBP: ffff88018776fb40 R08: ffff8801c518a680 R09: fffffbfff12cf404 R10: fffffbfff12cf404 R11: ffffffff8967a023 R12: ffff88018776fc48 R13: 0000000000000000 R14: ffff8801bb659800 R15: ffff8801bd2a2540 FS: 00007fe7d2bca700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffdc6c68fd8 CR3: 00000001c37d9000 CR4: 00000000001406e0 Call Trace: construct_alloc_key security/keys/request_key.c:389 [inline] construct_key_and_link security/keys/request_key.c:480 [inline] request_key_and_link+0x737/0x17a0 security/keys/request_key.c:593 __do_sys_request_key security/keys/keyctl.c:213 [inline] __se_sys_request_key security/keys/keyctl.c:158 [inline] __x64_sys_request_key+0x305/0x400 security/keys/keyctl.c:158 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457569 Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fe7d2bc9c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000020000080 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7d2bca6d4 R13: 00000000004c329b R14: 00000000004d4ec0 R15: 00000000ffffffff Modules linked in: ---[ end trace 391749d00405bd0b ]--- RIP: 0010:__key_link_begin+0x23a/0x300 security/keys/keyring.c:1214 Code: fe 48 c7 c7 20 a9 67 89 e8 c3 27 23 fe eb ac e8 bc 59 42 fe 48 c7 c7 20 a9 67 89 e8 20 97 73 04 e9 e3 fe ff ff e8 a6 59 42 fe <0f> 0b e8 9f 59 42 fe 48 8d bb ce 00 00 00 48 b8 00 00 00 00 00 fc RSP: 0018:ffff88018776fb10 EFLAGS: 00010216 RAX: 0000000000040000 RBX: ffff8801bd2a2540 RCX: ffffc90003e8e000 RDX: 000000000000140b RSI: ffffffff833c4faa RDI: 0000000000000007 RBP: ffff88018776fb40 R08: ffff8801c518a680 R09: fffffbfff12cf404 kobject: 'loop3' (00000000b5674ada): kobject_uevent_env kobject: 'loop3' (00000000b5674ada): fill_kobj_path: path = '/devices/virtual/block/loop3' R10: fffffbfff12cf404 R11: ffffffff8967a023 R12: ffff88018776fc48 kobject: 'loop0' (000000005888bcfc): kobject_uevent_env R13: 0000000000000000 R14: ffff8801bb659800 R15: ffff8801bd2a2540 kobject: 'loop0' (000000005888bcfc): fill_kobj_path: path = '/devices/virtual/block/loop0' FS: 00007fe7d2bca700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 kobject: 'loop2' (000000000fa74f6a): kobject_uevent_env CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kobject: 'loop2' (000000000fa74f6a): fill_kobj_path: path = '/devices/virtual/block/loop2' CR2: 0000000000930004 CR3: 00000001c37d9000 CR4: 00000000001406f0