BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5661 Comm: syz-executor.2 Not tainted 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803e68fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e0c0 RCX: 1ffffe21fe601fd2 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803c18 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e0c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f7a805c3700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000003e90c000 CR4: 0000000000350ee0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f7a8304db19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7a805c3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7a83160f60 RCX: 00007f7a8304db19 RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000004 RBP: 00007f7a830a7f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff9faa424f R14: 00007f7a805c3300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803e68fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e0c0 RCX: 1ffffe21fe601fd2 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803c18 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e0c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f7a805c3700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000003e90c000 CR4: 0000000000350ee0 BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#2] PREEMPT SMP KASAN NOPTI CPU: 0 PID: 5705 Comm: syz-executor.2 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803eeefcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e240 RCX: 1ffffe21fe601fd8 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803c48 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e240 R14: ffffffff815f2620 R15: 1ffff1100112321f FS: 00007f7a805c3700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000bda2000 CR4: 0000000000350ef0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f7a8304db19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7a805c3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7a83160f60 RCX: 00007f7a8304db19 RDX: 0000000000000001 RSI: 0000000000004c81 RDI: 0000000000000004 RBP: 00007f7a830a7f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff9faa424f R14: 00007f7a805c3300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803e68fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e0c0 RCX: 1ffffe21fe601fd2 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803c18 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e0c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f7a805c3700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000bda2000 CR4: 0000000000350ef0 BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#3] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5728 Comm: syz-executor.4 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803fa3fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e3c0 RCX: 1ffffe21fe601fde RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803c78 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e3c0 R14: ffffffff815f2620 R15: 1ffff110010e5c1f FS: 00007f38ae365700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000017902000 CR4: 0000000000350ee0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f38b0defb19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f38ae365188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f38b0f02f60 RCX: 00007f38b0defb19 RDX: 0000000000000002 RSI: 0000000000004c81 RDI: 0000000000000004 RBP: 00007f38b0e49f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcd643aacf R14: 00007f38ae365300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803e68fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e0c0 RCX: 1ffffe21fe601fd2 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803c18 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e0c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f38ae365700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000017902000 CR4: 0000000000350ee0 BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#4] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5758 Comm: syz-executor.7 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803e64fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e540 RCX: 1ffffe21fe601fe4 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803ca8 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e540 R14: ffffffff815f2620 R15: 1ffff11001113e1f FS: 00007f087b2d1700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000031fea000 CR4: 0000000000350ee0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f087dd5bb19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f087b2d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f087de6ef60 RCX: 00007f087dd5bb19 RDX: 0000000000000003 RSI: 0000000000004c81 RDI: 0000000000000004 RBP: 00007f087ddb5f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffda569375f R14: 00007f087b2d1300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803e68fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e0c0 RCX: 1ffffe21fe601fd2 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803c18 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e0c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f087b2d1700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000031fea000 CR4: 0000000000350ee0 BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#5] PREEMPT SMP KASAN NOPTI CPU: 0 PID: 5768 Comm: syz-executor.2 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88804105fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e6c0 RCX: 1ffffe21fe601fea RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803cd8 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e6c0 R14: ffffffff815f2620 R15: 1ffff1100111321f FS: 00007f7a805c3700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000016592000 CR4: 0000000000350ef0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f7a8304db19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7a805c3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7a83160f60 RCX: 00007f7a8304db19 RDX: 0000000000000004 RSI: 0000000000004c81 RDI: 0000000000000004 RBP: 00007f7a830a7f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff9faa424f R14: 00007f7a805c3300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803e68fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e0c0 RCX: 1ffffe21fe601fd2 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803c18 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e0c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f7a805c3700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000016592000 CR4: 0000000000350ef0 BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#6] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5797 Comm: syz-executor.7 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803d9b7cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e840 RCX: 1ffffe21fe601ff0 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803d08 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e840 R14: ffffffff815f2620 R15: 1ffff110011f3a1f FS: 00007f087b2d1700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000008c32000 CR4: 0000000000350ee0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f087dd5bb19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f087b2d1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f087de6ef60 RCX: 00007f087dd5bb19 RDX: 0000000000000005 RSI: 0000000000004c81 RDI: 0000000000000004 RBP: 00007f087ddb5f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffda569375f R14: 00007f087b2d1300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88803e68fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800c01e0c0 RCX: 1ffffe21fe601fd2 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c0413c0 R08: 0000000000000005 R09: ffffed1001803c18 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0413c0 R13: ffff88800c01e0c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f087b2d1700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000008c32000 CR4: 0000000000350ee0 audit: type=1326 audit(1667301249.938:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5879 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f49ce4ccb19 code=0x0 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 'syz-executor.5': attribute type 1 has an invalid length. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 'syz-executor.5': attribute type 1 has an invalid length. Process accounting resumed Process accounting resumed netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 'syz-executor.5': attribute type 1 has an invalid length. audit: type=1326 audit(1667301251.877:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5930 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f49ce4ccb19 code=0x0 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 'syz-executor.5': attribute type 1 has an invalid length. Process accounting resumed audit: type=1326 audit(1667301252.792:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5974 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f49ce4ccb19 code=0x0 audit: type=1326 audit(1667301253.071:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5990 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f38b0defb19 code=0x0 Process accounting resumed Process accounting resumed audit: type=1326 audit(1667301253.664:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5998 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f49ce4ccb19 code=0x0 Process accounting resumed audit: type=1326 audit(1667301254.006:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6002 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f38b0defb19 code=0x0 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 90 nop 3: 90 nop 4: 90 nop 5: 90 nop 6: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) b: 49 89 f9 mov %rdi,%r9 e: 48 89 d1 mov %rdx,%rcx 11: 83 e2 07 and $0x7,%edx 14: 48 c1 e9 03 shr $0x3,%rcx 18: 40 0f b6 f6 movzbl %sil,%esi 1c: 48 b8 01 01 01 01 01 movabs $0x101010101010101,%rax 23: 01 01 01 26: 48 0f af c6 imul %rsi,%rax * 2a: f3 48 ab rep stos %rax,%es:(%rdi) <-- trapping instruction 2d: 89 d1 mov %edx,%ecx 2f: f3 aa rep stos %al,%es:(%rdi) 31: 4c 89 c8 mov %r9,%rax 34: e9 0d d4 12 00 jmpq 0x12d446 39: 66 data16 3a: 66 data16 3b: 2e cs 3c: 0f .byte 0xf 3d: 1f (bad) 3e: 84 00 test %al,(%rax)