BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 PID: 4812 Comm: syz-executor.0 Not tainted 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f02b80cd700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000d84c000 CR4: 0000000000350ef0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f02bab57b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f02b80cd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f02bac6af60 RCX: 00007f02bab57b19 RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000005 RBP: 00007f02babb1f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca1b10f5f R14: 00007f02b80cd300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f02b80cd700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000d84c000 CR4: 0000000000350ef0 FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) EXT4-fs: Ignoring removed nomblk_io_submit option ext4: Unknown parameter 'euid>00000000000000000000' EXT4-fs: Ignoring removed nomblk_io_submit option ext4: Unknown parameter 'euid>00000000000000000000' SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#2] PREEMPT SMP KASAN NOPTI CPU: 0 PID: 4865 Comm: syz-executor.0 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe8240 RCX: 1ffffe21fe601271 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd048 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe8240 R14: ffffffff815f2620 R15: 1ffff1100112321f FS: 00007f02b80cd700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000016a5e000 CR4: 0000000000350ef0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f02bab57b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f02b80cd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f02bac6af60 RCX: 00007f02bab57b19 RDX: 0000000000000001 RSI: 0000000000004c81 RDI: 0000000000000005 RBP: 00007f02babb1f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca1b10f5f R14: 00007f02b80cd300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f02b80cd700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000016a5e000 CR4: 0000000000350ef0 audit: type=1400 audit(1667304363.497:13): avc: denied { tracepoint } for pid=4926 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#3] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 4959 Comm: syz-executor.3 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff8880429f7cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe83c0 RCX: 1ffffe21fe601277 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd078 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe83c0 R14: ffffffff815f2620 R15: 1ffff110010e5c1f FS: 00007fedb7bcf700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000ed02000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7fedba659b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fedb7bcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fedba76cf60 RCX: 00007fedba659b19 RDX: 0000000000000002 RSI: 0000000000004c81 RDI: 0000000000000006 RBP: 00007fedba6b3f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff1729853f R14: 00007fedb7bcf300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007fedb7bcf700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000ed02000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. random: crng reseeded on system resumption netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. random: crng reseeded on system resumption BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#4] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5000 Comm: syz-executor.3 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888041477cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe8540 RCX: 1ffffe21fe60127d RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd0a8 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe8540 R14: ffffffff815f2620 R15: 1ffff11001122c1f FS: 00007fedb7b8d700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000ed02000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7fedba659b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fedb7b8d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fedba76d0e0 RCX: 00007fedba659b19 RDX: 0000000000000003 RSI: 0000000000004c81 RDI: 0000000000000006 RBP: 00007fedba6b3f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff1729853f R14: 00007fedb7b8d300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007fedb7b8d700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000ed02000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 syz-executor.2 (4960) used greatest stack depth: 23608 bytes left audit: type=1326 audit(1667304364.781:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5007 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7faed5164b19 code=0x0 random: crng reseeded on system resumption BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#5] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5016 Comm: syz-executor.3 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff8880422cfcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe86c0 RCX: 1ffffe21fe601283 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd0d8 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe86c0 R14: ffffffff815f2620 R15: 1ffff1100112281f FS: 00007fedb7bcf700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000df2e000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7fedba659b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fedb7bcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fedba76cf60 RCX: 00007fedba659b19 RDX: 0000000000000004 RSI: 0000000000004c81 RDI: 0000000000000006 RBP: 00007fedba6b3f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff1729853f R14: 00007fedb7bcf300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007fedb7bcf700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000df2e000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#6] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5021 Comm: syz-executor.4 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888040707cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe8840 RCX: 1ffffe21fe601289 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd108 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe8840 R14: ffffffff815f2620 R15: 1ffff1100112241f FS: 00007f9b7060c700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000df40000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f9b73096b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f9b7060c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f9b731a9f60 RCX: 00007f9b73096b19 RDX: 0000000000000005 RSI: 0000000000004c81 RDI: 0000000000000006 RBP: 00007f9b730f0f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff6bdfe53f R14: 00007f9b7060c300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f9b7060c700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000df40000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#7] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5026 Comm: syz-executor.5 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043997cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe89c0 RCX: 1ffffe21fe60128f RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd138 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe89c0 R14: ffffffff815f2620 R15: 1ffff1100112201f FS: 00007f2598afa700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000003fc82000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f259b584b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f2598afa188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f259b697f60 RCX: 00007f259b584b19 RDX: 0000000000000006 RSI: 0000000000004c81 RDI: 0000000000000006 RBP: 00007f259b5def6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe1a72a81f R14: 00007f2598afa300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f2598afa700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000003fc82000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. audit: type=1400 audit(1667304365.345:15): avc: denied { write } for pid=5062 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 netlink: 36 bytes leftover after parsing attributes in process `syz-executor.7'. netlink: 36 bytes leftover after parsing attributes in process `syz-executor.7'. netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. random: crng reseeded on system resumption BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#8] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5040 Comm: syz-executor.2 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff88804394fcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe8b40 RCX: 1ffffe21fe601295 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd168 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe8b40 R14: ffffffff815f2620 R15: 1ffff11001124c1f FS: 00007f111cfef700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000e97a000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f111fa79b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f111cfef188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f111fb8cf60 RCX: 00007f111fa79b19 RDX: 0000000000000007 RSI: 0000000000004c81 RDI: 0000000000000006 RBP: 00007f111fad3f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd5556057f R14: 00007f111cfef300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f111cfef700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000000e97a000 CR4: 0000000000350ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 netlink: 36 bytes leftover after parsing attributes in process `syz-executor.7'. random: crng reseeded on system resumption random: crng reseeded on system resumption random: crng reseeded on system resumption BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#9] PREEMPT SMP KASAN NOPTI CPU: 0 PID: 5099 Comm: syz-executor.3 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff8880429d7cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe8e40 RCX: 1ffffe21fe6012a1 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd1c8 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe8e40 R14: ffffffff815f2620 R15: 1ffff110082f501f FS: 00007fedb7bcf700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000001bf18000 CR4: 0000000000350ef0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7fedba659b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fedb7bcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fedba76cf60 RCX: 00007fedba659b19 RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006 RBP: 00007fedba6b3f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff1729853f R14: 00007fedb7bcf300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007fedb7bcf700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 000000001bf18000 CR4: 0000000000350ef0 random: crng reseeded on system resumption BUG: unable to handle page fault for address: ffffed100fffc000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 Oops: 0002 [#10] PREEMPT SMP KASAN NOPTI CPU: 0 PID: 5145 Comm: syz-executor.4 Tainted: G D 6.1.0-rc3-next-20221101 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888042bdfcc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff888015010000 RCX: 1ffffe21fe841c68 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed1002a02000 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff888015010000 R14: ffffffff815f2620 R15: 1ffff11007ff061f FS: 00007f9b7060c700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000016030000 CR4: 0000000000350ef0 Call Trace: kasan_unpoison+0x23/0x60 mempool_exit+0x1c2/0x330 bioset_exit+0x2c9/0x630 disk_release+0x143/0x490 device_release+0xa2/0x250 kobject_put+0x173/0x280 put_device+0x1b/0x40 put_disk+0x41/0x60 loop_control_ioctl+0x4d1/0x630 __x64_sys_ioctl+0x19a/0x220 do_syscall_64+0x3b/0xa0 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f9b73096b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f9b7060c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f9b731a9f60 RCX: 00007f9b73096b19 RDX: 0000000000000001 RSI: 0000000000004c81 RDI: 0000000000000006 RBP: 00007f9b730f0f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff6bdfe53f R14: 00007f9b7060c300 R15: 0000000000022000 Modules linked in: CR2: ffffed100fffc000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memset+0x24/0x50 Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 0d d4 12 00 66 66 2e 0f 1f 84 00 RSP: 0018:ffff888043937cc0 EFLAGS: 00010212 RAX: 0000000000000000 RBX: ffff88800bfe80c0 RCX: 1ffffe21fe60126b RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 RBP: ffff88800c041a00 R08: 0000000000000005 R09: ffffed10017fd018 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c041a00 R13: ffff88800bfe80c0 R14: ffffffff815f2620 R15: 1ffff1100112361f FS: 00007f9b7060c700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed100fffc000 CR3: 0000000016030000 CR4: 0000000000350ef0 loop3: detected capacity change from 0 to 264192 FAT-fs (loop3): bogus number of reserved sectors FAT-fs (loop3): Can't find a valid FAT filesystem capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure loop3: detected capacity change from 0 to 264192 FAT-fs (loop3): bogus number of reserved sectors FAT-fs (loop3): Can't find a valid FAT filesystem blk_print_req_error: 1 callbacks suppressed I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 loop3: detected capacity change from 0 to 264192 FAT-fs (loop3): bogus number of reserved sectors FAT-fs (loop3): Can't find a valid FAT filesystem ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 90 nop 3: 90 nop 4: 90 nop 5: 90 nop 6: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) b: 49 89 f9 mov %rdi,%r9 e: 48 89 d1 mov %rdx,%rcx 11: 83 e2 07 and $0x7,%edx 14: 48 c1 e9 03 shr $0x3,%rcx 18: 40 0f b6 f6 movzbl %sil,%esi 1c: 48 b8 01 01 01 01 01 movabs $0x101010101010101,%rax 23: 01 01 01 26: 48 0f af c6 imul %rsi,%rax * 2a: f3 48 ab rep stos %rax,%es:(%rdi) <-- trapping instruction 2d: 89 d1 mov %edx,%ecx 2f: f3 aa rep stos %al,%es:(%rdi) 31: 4c 89 c8 mov %r9,%rax 34: e9 0d d4 12 00 jmpq 0x12d446 39: 66 data16 3a: 66 data16 3b: 2e cs 3c: 0f .byte 0xf 3d: 1f (bad) 3e: 84 00 test %al,(%rax)