linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [Linux Kernel Bug] divide error in exfat_load_bitmap
@ 2025-11-17  6:54 Jiaming Zhang
  2025-11-17  8:18 ` Namjae Jeon
  0 siblings, 1 reply; 4+ messages in thread
From: Jiaming Zhang @ 2025-11-17  6:54 UTC (permalink / raw)
  To: linkinjeon, linux-fsdevel, sj1557.seo
  Cc: linux-kernel, yuezhang.mo, syzkaller

[-- Attachment #1: Type: text/plain, Size: 5747 bytes --]

Dear Linux kernel developers and maintainers,

We are writing to report a divide error bug discovered in the exfat
subsystem. This bug is reproducible on the latest version (v6.18-rc6,
commit 6a23ae0a96a600d1d12557add110e0bb6e32730c).

The root cause is in exfat_allocate_bitmap(), the variable
max_ra_count can be 0, which causes a divide-by-zero error in the
subsequent modulo operation (i % max_ra_count), leading to a system
crash.

As a potential fix, we can add a zero check before the loop, for example:

```
static int exfat_allocate_bitmap(struct super_block *sb,
    struct exfat_dentry *ep)
{
  struct exfat_sb_info *sbi = EXFAT_SB(sb);

    ...

  sector = exfat_cluster_to_sector(sbi, sbi->map_clu);
  max_ra_count = min(sb->s_bdi->ra_pages, sb->s_bdi->io_pages) <<
    (PAGE_SHIFT - sb->s_blocksize_bits);
+ if (!max_ra_count) {
+   i = 0;
+   goto err_out;
+ }
  for (i = 0; i < sbi->map_sectors; i++) {
    /* Trigger the next readahead in advance. */
    if (0 == (i % max_ra_count)) {
            ...
```

If this solution is acceptable, we are happy to prepare and submit a
patch immediately.

The kernel console output, kernel config, syzkaller reproducer, and C
reproducer are attached to help with analysis. The KASAN report from
v6.18-rc6, formatted by syz-symbolize, is listed below:

---

loop1: detected capacity change from 0 to 256
Oops: divide error: 0000 [#1] SMP KASAN NOPTI
CPU: 1 UID: 0 PID: 9708 Comm: repro.out Not tainted 6.18.0-rc6 #22 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
RIP: 0010:exfat_allocate_bitmap fs/exfat/balloc.c:109 [inline]
RIP: 0010:exfat_load_bitmap+0x69d/0x10c0 fs/exfat/balloc.c:159
Code: 24 78 45 31 ff 48 89 44 24 28 48 c1 e8 03 48 89 84 24 88 00 00
00 4c 89 e8 48 c1 e8 03 48 89 84 24 80 00 00 00 44 89 f8 31 d2 <f7> 74
24 30 41 89 d6 31 ff 89 d6 e8 e3 b0 24 ff 45 85 f6 4c 89 fb
RSP: 0018:ffffc90011b9f860 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90011b9fa10 R08: 0000000000000cc0 R09: 00000000ffffffff
R10: 000000000000000b R11: ffffffff81c646c6 R12: dffffc0000000000
R13: ffff8880522d8018 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000010746300(0000) GS:ffff8880ec992000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004bf938 CR3: 000000001c7c6000 CR4: 0000000000752ef0
PKRU: 55555554
Call Trace:
 <TASK>
 __exfat_fill_super fs/exfat/super.c:623 [inline]
 exfat_fill_super+0x12c6/0x29c0 fs/exfat/super.c:668
 get_tree_bdev_flags+0x40e/0x4d0 fs/super.c:1691
 vfs_get_tree+0x92/0x2b0 fs/super.c:1751
 fc_mount fs/namespace.c:1208 [inline]
 do_new_mount_fc fs/namespace.c:3651 [inline]
 do_new_mount+0x302/0xa10 fs/namespace.c:3727
 do_mount fs/namespace.c:4050 [inline]
 __do_sys_mount fs/namespace.c:4238 [inline]
 __se_sys_mount+0x313/0x410 fs/namespace.c:4215
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf3/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x45234a
Code: 48 c7 c2 c0 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 a8
00 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d
01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd5246d6f8 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00000000004004a0 RCX: 000000000045234a
RDX: 0000000020001500 RSI: 0000000020001540 RDI: 00007ffd5246d840
RBP: 00007ffd5246d8d0 R08: 00007ffd5246d740 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000286 R12: 0000000000409da0
R13: 0000000000000000 R14: 00000000004bd018 R15: 00000000004004a0
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:exfat_allocate_bitmap fs/exfat/balloc.c:109 [inline]
RIP: 0010:exfat_load_bitmap+0x69d/0x10c0 fs/exfat/balloc.c:159
Code: 24 78 45 31 ff 48 89 44 24 28 48 c1 e8 03 48 89 84 24 88 00 00
00 4c 89 e8 48 c1 e8 03 48 89 84 24 80 00 00 00 44 89 f8 31 d2 <f7> 74
24 30 41 89 d6 31 ff 89 d6 e8 e3 b0 24 ff 45 85 f6 4c 89 fb
RSP: 0018:ffffc90011b9f860 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90011b9fa10 R08: 0000000000000cc0 R09: 00000000ffffffff
R10: 000000000000000b R11: ffffffff81c646c6 R12: dffffc0000000000
R13: ffff8880522d8018 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000010746300(0000) GS:ffff8880ec992000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004bf938 CR3: 000000001c7c6000 CR4: 0000000000752ef0
PKRU: 55555554
----------------
Code disassembly (best guess):
   0:   24 78                   and    $0x78,%al
   2:   45 31 ff                xor    %r15d,%r15d
   5:   48 89 44 24 28          mov    %rax,0x28(%rsp)
   a:   48 c1 e8 03             shr    $0x3,%rax
   e:   48 89 84 24 88 00 00    mov    %rax,0x88(%rsp)
  15:   00
  16:   4c 89 e8                mov    %r13,%rax
  19:   48 c1 e8 03             shr    $0x3,%rax
  1d:   48 89 84 24 80 00 00    mov    %rax,0x80(%rsp)
  24:   00
  25:   44 89 f8                mov    %r15d,%eax
  28:   31 d2                   xor    %edx,%edx
* 2a:   f7 74 24 30             divl   0x30(%rsp) <-- trapping instruction
  2e:   41 89 d6                mov    %edx,%r14d
  31:   31 ff                   xor    %edi,%edi
  33:   89 d6                   mov    %edx,%esi
  35:   e8 e3 b0 24 ff          call   0xff24b11d
  3a:   45 85 f6                test   %r14d,%r14d
  3d:   4c 89 fb                mov    %r15,%rbx

---

Please let me know if any further information is required.

Best Regards,
Jiaming Zhang

[-- Attachment #2: repro.c --]
[-- Type: text/plain, Size: 42517 bytes --]

// autogenerated by syzkaller (https://github.com/google/syzkaller)

#define _GNU_SOURCE

#include <dirent.h>
#include <endian.h>
#include <errno.h>
#include <fcntl.h>
#include <setjmp.h>
#include <signal.h>
#include <stdarg.h>
#include <stdbool.h>
#include <stddef.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/ioctl.h>
#include <sys/mman.h>
#include <sys/mount.h>
#include <sys/prctl.h>
#include <sys/stat.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <time.h>
#include <unistd.h>

#include <linux/loop.h>

#ifndef __NR_memfd_create
#define __NR_memfd_create 319
#endif

static unsigned long long procid;

static void sleep_ms(uint64_t ms)
{
  usleep(ms * 1000);
}

static uint64_t current_time_ms(void)
{
  struct timespec ts;
  if (clock_gettime(CLOCK_MONOTONIC, &ts))
    exit(1);
  return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
}

static bool write_file(const char* file, const char* what, ...)
{
  char buf[1024];
  va_list args;
  va_start(args, what);
  vsnprintf(buf, sizeof(buf), what, args);
  va_end(args);
  buf[sizeof(buf) - 1] = 0;
  int len = strlen(buf);
  int fd = open(file, O_WRONLY | O_CLOEXEC);
  if (fd == -1)
    return false;
  if (write(fd, buf, len) != len) {
    int err = errno;
    close(fd);
    errno = err;
    return false;
  }
  close(fd);
  return true;
}

static long syz_open_dev(volatile long a0, volatile long a1, volatile long a2)
{
  if (a0 == 0xc || a0 == 0xb) {
    char buf[128];
    sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1,
            (uint8_t)a2);
    return open(buf, O_RDWR, 0);
  } else {
    char buf[1024];
    char* hash;
    strncpy(buf, (char*)a0, sizeof(buf) - 1);
    buf[sizeof(buf) - 1] = 0;
    while ((hash = strchr(buf, '#'))) {
      *hash = '0' + (char)(a1 % 10);
      a1 /= 10;
    }
    return open(buf, a2, 0);
  }
}

//% This code is derived from puff.{c,h}, found in the zlib development. The
//% original files come with the following copyright notice:

//% Copyright (C) 2002-2013 Mark Adler, all rights reserved
//% version 2.3, 21 Jan 2013
//% This software is provided 'as-is', without any express or implied
//% warranty.  In no event will the author be held liable for any damages
//% arising from the use of this software.
//% Permission is granted to anyone to use this software for any purpose,
//% including commercial applications, and to alter it and redistribute it
//% freely, subject to the following restrictions:
//% 1. The origin of this software must not be misrepresented; you must not
//%    claim that you wrote the original software. If you use this software
//%    in a product, an acknowledgment in the product documentation would be
//%    appreciated but is not required.
//% 2. Altered source versions must be plainly marked as such, and must not be
//%    misrepresented as being the original software.
//% 3. This notice may not be removed or altered from any source distribution.
//% Mark Adler    madler@alumni.caltech.edu

//% BEGIN CODE DERIVED FROM puff.{c,h}

#define MAXBITS 15
#define MAXLCODES 286
#define MAXDCODES 30
#define MAXCODES (MAXLCODES + MAXDCODES)
#define FIXLCODES 288

struct puff_state {
  unsigned char* out;
  unsigned long outlen;
  unsigned long outcnt;
  const unsigned char* in;
  unsigned long inlen;
  unsigned long incnt;
  int bitbuf;
  int bitcnt;
  jmp_buf env;
};
static int puff_bits(struct puff_state* s, int need)
{
  long val = s->bitbuf;
  while (s->bitcnt < need) {
    if (s->incnt == s->inlen)
      longjmp(s->env, 1);
    val |= (long)(s->in[s->incnt++]) << s->bitcnt;
    s->bitcnt += 8;
  }
  s->bitbuf = (int)(val >> need);
  s->bitcnt -= need;
  return (int)(val & ((1L << need) - 1));
}
static int puff_stored(struct puff_state* s)
{
  s->bitbuf = 0;
  s->bitcnt = 0;
  if (s->incnt + 4 > s->inlen)
    return 2;
  unsigned len = s->in[s->incnt++];
  len |= s->in[s->incnt++] << 8;
  if (s->in[s->incnt++] != (~len & 0xff) ||
      s->in[s->incnt++] != ((~len >> 8) & 0xff))
    return -2;
  if (s->incnt + len > s->inlen)
    return 2;
  if (s->outcnt + len > s->outlen)
    return 1;
  for (; len--; s->outcnt++, s->incnt++) {
    if (s->in[s->incnt])
      s->out[s->outcnt] = s->in[s->incnt];
  }
  return 0;
}
struct puff_huffman {
  short* count;
  short* symbol;
};
static int puff_decode(struct puff_state* s, const struct puff_huffman* h)
{
  int first = 0;
  int index = 0;
  int bitbuf = s->bitbuf;
  int left = s->bitcnt;
  int code = first = index = 0;
  int len = 1;
  short* next = h->count + 1;
  while (1) {
    while (left--) {
      code |= bitbuf & 1;
      bitbuf >>= 1;
      int count = *next++;
      if (code - count < first) {
        s->bitbuf = bitbuf;
        s->bitcnt = (s->bitcnt - len) & 7;
        return h->symbol[index + (code - first)];
      }
      index += count;
      first += count;
      first <<= 1;
      code <<= 1;
      len++;
    }
    left = (MAXBITS + 1) - len;
    if (left == 0)
      break;
    if (s->incnt == s->inlen)
      longjmp(s->env, 1);
    bitbuf = s->in[s->incnt++];
    if (left > 8)
      left = 8;
  }
  return -10;
}
static int puff_construct(struct puff_huffman* h, const short* length, int n)
{
  int len;
  for (len = 0; len <= MAXBITS; len++)
    h->count[len] = 0;
  int symbol;
  for (symbol = 0; symbol < n; symbol++)
    (h->count[length[symbol]])++;
  if (h->count[0] == n)
    return 0;
  int left = 1;
  for (len = 1; len <= MAXBITS; len++) {
    left <<= 1;
    left -= h->count[len];
    if (left < 0)
      return left;
  }
  short offs[MAXBITS + 1];
  offs[1] = 0;
  for (len = 1; len < MAXBITS; len++)
    offs[len + 1] = offs[len] + h->count[len];
  for (symbol = 0; symbol < n; symbol++)
    if (length[symbol] != 0)
      h->symbol[offs[length[symbol]]++] = symbol;
  return left;
}
static int puff_codes(struct puff_state* s, const struct puff_huffman* lencode,
                      const struct puff_huffman* distcode)
{
  static const short lens[29] = {3,  4,  5,  6,   7,   8,   9,   10,  11, 13,
                                 15, 17, 19, 23,  27,  31,  35,  43,  51, 59,
                                 67, 83, 99, 115, 131, 163, 195, 227, 258};
  static const short lext[29] = {0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 2, 2, 2,
                                 2, 3, 3, 3, 3, 4, 4, 4, 4, 5, 5, 5, 5, 0};
  static const short dists[30] = {
      1,    2,    3,    4,    5,    7,    9,    13,    17,    25,
      33,   49,   65,   97,   129,  193,  257,  385,   513,   769,
      1025, 1537, 2049, 3073, 4097, 6145, 8193, 12289, 16385, 24577};
  static const short dext[30] = {0, 0, 0,  0,  1,  1,  2,  2,  3,  3,
                                 4, 4, 5,  5,  6,  6,  7,  7,  8,  8,
                                 9, 9, 10, 10, 11, 11, 12, 12, 13, 13};
  int symbol;
  do {
    symbol = puff_decode(s, lencode);
    if (symbol < 0)
      return symbol;
    if (symbol < 256) {
      if (s->outcnt == s->outlen)
        return 1;
      if (symbol)
        s->out[s->outcnt] = symbol;
      s->outcnt++;
    } else if (symbol > 256) {
      symbol -= 257;
      if (symbol >= 29)
        return -10;
      int len = lens[symbol] + puff_bits(s, lext[symbol]);
      symbol = puff_decode(s, distcode);
      if (symbol < 0)
        return symbol;
      unsigned dist = dists[symbol] + puff_bits(s, dext[symbol]);
      if (dist > s->outcnt)
        return -11;
      if (s->outcnt + len > s->outlen)
        return 1;
      while (len--) {
        if (dist <= s->outcnt && s->out[s->outcnt - dist])
          s->out[s->outcnt] = s->out[s->outcnt - dist];
        s->outcnt++;
      }
    }
  } while (symbol != 256);
  return 0;
}
static int puff_fixed(struct puff_state* s)
{
  static int virgin = 1;
  static short lencnt[MAXBITS + 1], lensym[FIXLCODES];
  static short distcnt[MAXBITS + 1], distsym[MAXDCODES];
  static struct puff_huffman lencode, distcode;
  if (virgin) {
    lencode.count = lencnt;
    lencode.symbol = lensym;
    distcode.count = distcnt;
    distcode.symbol = distsym;
    short lengths[FIXLCODES];
    int symbol;
    for (symbol = 0; symbol < 144; symbol++)
      lengths[symbol] = 8;
    for (; symbol < 256; symbol++)
      lengths[symbol] = 9;
    for (; symbol < 280; symbol++)
      lengths[symbol] = 7;
    for (; symbol < FIXLCODES; symbol++)
      lengths[symbol] = 8;
    puff_construct(&lencode, lengths, FIXLCODES);
    for (symbol = 0; symbol < MAXDCODES; symbol++)
      lengths[symbol] = 5;
    puff_construct(&distcode, lengths, MAXDCODES);
    virgin = 0;
  }
  return puff_codes(s, &lencode, &distcode);
}
static int puff_dynamic(struct puff_state* s)
{
  static const short order[19] = {16, 17, 18, 0, 8,  7, 9,  6, 10, 5,
                                  11, 4,  12, 3, 13, 2, 14, 1, 15};
  int nlen = puff_bits(s, 5) + 257;
  int ndist = puff_bits(s, 5) + 1;
  int ncode = puff_bits(s, 4) + 4;
  if (nlen > MAXLCODES || ndist > MAXDCODES)
    return -3;
  short lengths[MAXCODES];
  int index;
  for (index = 0; index < ncode; index++)
    lengths[order[index]] = puff_bits(s, 3);
  for (; index < 19; index++)
    lengths[order[index]] = 0;
  short lencnt[MAXBITS + 1], lensym[MAXLCODES];
  struct puff_huffman lencode = {lencnt, lensym};
  int err = puff_construct(&lencode, lengths, 19);
  if (err != 0)
    return -4;
  index = 0;
  while (index < nlen + ndist) {
    int symbol;
    int len;
    symbol = puff_decode(s, &lencode);
    if (symbol < 0)
      return symbol;
    if (symbol < 16)
      lengths[index++] = symbol;
    else {
      len = 0;
      if (symbol == 16) {
        if (index == 0)
          return -5;
        len = lengths[index - 1];
        symbol = 3 + puff_bits(s, 2);
      } else if (symbol == 17)
        symbol = 3 + puff_bits(s, 3);
      else
        symbol = 11 + puff_bits(s, 7);
      if (index + symbol > nlen + ndist)
        return -6;
      while (symbol--)
        lengths[index++] = len;
    }
  }
  if (lengths[256] == 0)
    return -9;
  err = puff_construct(&lencode, lengths, nlen);
  if (err && (err < 0 || nlen != lencode.count[0] + lencode.count[1]))
    return -7;
  short distcnt[MAXBITS + 1], distsym[MAXDCODES];
  struct puff_huffman distcode = {distcnt, distsym};
  err = puff_construct(&distcode, lengths + nlen, ndist);
  if (err && (err < 0 || ndist != distcode.count[0] + distcode.count[1]))
    return -8;
  return puff_codes(s, &lencode, &distcode);
}
static int puff(unsigned char* dest, unsigned long* destlen,
                const unsigned char* source, unsigned long sourcelen)
{
  struct puff_state s = {
      .out = dest,
      .outlen = *destlen,
      .outcnt = 0,
      .in = source,
      .inlen = sourcelen,
      .incnt = 0,
      .bitbuf = 0,
      .bitcnt = 0,
  };
  int err;
  if (setjmp(s.env) != 0)
    err = 2;
  else {
    int last;
    do {
      last = puff_bits(&s, 1);
      int type = puff_bits(&s, 2);
      err = type == 0 ? puff_stored(&s)
                      : (type == 1 ? puff_fixed(&s)
                                   : (type == 2 ? puff_dynamic(&s) : -1));
      if (err != 0)
        break;
    } while (!last);
  }
  *destlen = s.outcnt;
  return err;
}

//% END CODE DERIVED FROM puff.{c,h}

#define ZLIB_HEADER_WIDTH 2

static int puff_zlib_to_file(const unsigned char* source,
                             unsigned long sourcelen, int dest_fd)
{
  if (sourcelen < ZLIB_HEADER_WIDTH)
    return 0;
  source += ZLIB_HEADER_WIDTH;
  sourcelen -= ZLIB_HEADER_WIDTH;
  const unsigned long max_destlen = 132 << 20;
  void* ret = mmap(0, max_destlen, PROT_WRITE | PROT_READ,
                   MAP_PRIVATE | MAP_ANON, -1, 0);
  if (ret == MAP_FAILED)
    return -1;
  unsigned char* dest = (unsigned char*)ret;
  unsigned long destlen = max_destlen;
  int err = puff(dest, &destlen, source, sourcelen);
  if (err) {
    munmap(dest, max_destlen);
    errno = -err;
    return -1;
  }
  if (write(dest_fd, dest, destlen) != (ssize_t)destlen) {
    munmap(dest, max_destlen);
    return -1;
  }
  return munmap(dest, max_destlen);
}

static int setup_loop_device(unsigned char* data, unsigned long size,
                             const char* loopname, int* loopfd_p)
{
  int err = 0, loopfd = -1;
  int memfd = syscall(__NR_memfd_create, "syzkaller", 0);
  if (memfd == -1) {
    err = errno;
    goto error;
  }
  if (puff_zlib_to_file(data, size, memfd)) {
    err = errno;
    goto error_close_memfd;
  }
  loopfd = open(loopname, O_RDWR);
  if (loopfd == -1) {
    err = errno;
    goto error_close_memfd;
  }
  if (ioctl(loopfd, LOOP_SET_FD, memfd)) {
    if (errno != EBUSY) {
      err = errno;
      goto error_close_loop;
    }
    ioctl(loopfd, LOOP_CLR_FD, 0);
    usleep(1000);
    if (ioctl(loopfd, LOOP_SET_FD, memfd)) {
      err = errno;
      goto error_close_loop;
    }
  }
  close(memfd);
  *loopfd_p = loopfd;
  return 0;

error_close_loop:
  close(loopfd);
error_close_memfd:
  close(memfd);
error:
  errno = err;
  return -1;
}

static void reset_loop_device(const char* loopname)
{
  int loopfd = open(loopname, O_RDWR);
  if (loopfd == -1) {
    return;
  }
  if (ioctl(loopfd, LOOP_CLR_FD, 0)) {
  }
  close(loopfd);
}

static long syz_mount_image(volatile long fsarg, volatile long dir,
                            volatile long flags, volatile long optsarg,
                            volatile long change_dir,
                            volatile unsigned long size, volatile long image)
{
  unsigned char* data = (unsigned char*)image;
  int res = -1, err = 0, need_loop_device = !!size;
  char* mount_opts = (char*)optsarg;
  char* target = (char*)dir;
  char* fs = (char*)fsarg;
  char* source = NULL;
  char loopname[64];
  if (need_loop_device) {
    int loopfd;
    memset(loopname, 0, sizeof(loopname));
    snprintf(loopname, sizeof(loopname), "/dev/loop%llu", procid);
    if (setup_loop_device(data, size, loopname, &loopfd) == -1)
      return -1;
    close(loopfd);
    source = loopname;
  }
  mkdir(target, 0777);
  char opts[256];
  memset(opts, 0, sizeof(opts));
  if (strlen(mount_opts) > (sizeof(opts) - 32)) {
  }
  strncpy(opts, mount_opts, sizeof(opts) - 32);
  if (strcmp(fs, "iso9660") == 0) {
    flags |= MS_RDONLY;
  } else if (strncmp(fs, "ext", 3) == 0) {
    bool has_remount_ro = false;
    char* remount_ro_start = strstr(opts, "errors=remount-ro");
    if (remount_ro_start != NULL) {
      char after = *(remount_ro_start + strlen("errors=remount-ro"));
      char before = remount_ro_start == opts ? '\0' : *(remount_ro_start - 1);
      has_remount_ro = ((before == '\0' || before == ',') &&
                        (after == '\0' || after == ','));
    }
    if (strstr(opts, "errors=panic") || !has_remount_ro)
      strcat(opts, ",errors=continue");
  } else if (strcmp(fs, "xfs") == 0) {
    strcat(opts, ",nouuid");
  }
  res = mount(source, target, fs, flags, opts);
  if (res == -1) {
    err = errno;
    goto error_clear_loop;
  }
  res = open(target, O_RDONLY | O_DIRECTORY);
  if (res == -1) {
    err = errno;
    goto error_clear_loop;
  }
  if (change_dir) {
    res = chdir(target);
    if (res == -1) {
      err = errno;
    }
  }

error_clear_loop:
  if (need_loop_device)
    reset_loop_device(loopname);
  errno = err;
  return res;
}

static void kill_and_wait(int pid, int* status)
{
  kill(-pid, SIGKILL);
  kill(pid, SIGKILL);
  for (int i = 0; i < 100; i++) {
    if (waitpid(-1, status, WNOHANG | __WALL) == pid)
      return;
    usleep(1000);
  }
  DIR* dir = opendir("/sys/fs/fuse/connections");
  if (dir) {
    for (;;) {
      struct dirent* ent = readdir(dir);
      if (!ent)
        break;
      if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0)
        continue;
      char abort[300];
      snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort",
               ent->d_name);
      int fd = open(abort, O_WRONLY);
      if (fd == -1) {
        continue;
      }
      if (write(fd, abort, 1) < 0) {
      }
      close(fd);
    }
    closedir(dir);
  } else {
  }
  while (waitpid(-1, status, __WALL) != pid) {
  }
}

static void reset_loop()
{
  char buf[64];
  snprintf(buf, sizeof(buf), "/dev/loop%llu", procid);
  int loopfd = open(buf, O_RDWR);
  if (loopfd != -1) {
    ioctl(loopfd, LOOP_CLR_FD, 0);
    close(loopfd);
  }
}

static void setup_test()
{
  prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
  setpgrp();
  write_file("/proc/self/oom_score_adj", "1000");
}

static void execute_one(void);

#define WAIT_FLAGS __WALL

static void loop(void)
{
  int iter = 0;
  for (;; iter++) {
    reset_loop();
    int pid = fork();
    if (pid < 0)
      exit(1);
    if (pid == 0) {
      setup_test();
      execute_one();
      exit(0);
    }
    int status = 0;
    uint64_t start = current_time_ms();
    for (;;) {
      sleep_ms(10);
      if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
        break;
      if (current_time_ms() - start < 5000)
        continue;
      kill_and_wait(pid, &status);
      break;
    }
  }
}

uint64_t r[1] = {0xffffffffffffffff};

void execute_one(void)
{
  intptr_t res = 0;
  if (write(1, "executing program\n", sizeof("executing program\n") - 1)) {
  }
  memcpy((void*)0x20001500, "exfat\000", 6);
  memcpy((void*)0x20001540, "./file0\000", 8);
  memset((void*)0x20001580, 0, 1);
  memcpy(
      (void*)0x200015c0,
      "\x78\x9c\xec\xdc\x09\x70\x95\xc5\xb6\x28\xe0\x5e\xdd\xfd\x43\x88\x11\xb7"
      "\x11\x99\x7b\xf5\xfa\x61\x8b\x01\x9a\x88\x88\xc8\x20\x22\x32\x88\x88\x88"
      "\x08\x88\xcc\x22\x20\x62\x44\x44\x44\x44\x84\x80\x4c\x22\x02\x22\x02\x32"
      "\x46\x44\x86\x10\x01\x91\x21\x40\xc4\x30\xcf\xf3\x3c\x18\x39\x88\x88\x88"
      "\xc8\x24\x93\x40\xbf\xc2\xe3\xb9\xdc\x73\x3c\xb7\xb8\xef\xbc\x73\x2f\xaf"
      "\x2a\xeb\xab\xea\x4a\xaf\xfc\x7b\xad\xdd\x9d\x55\xc9\x3f\x54\x65\xff\xd4"
      "\x75\x58\x8d\xc6\x35\xab\x36\x20\x22\xf1\xaf\x50\x7f\x9b\xc0\x5f\xbf\x24"
      "\x0b\x21\x62\x84\x10\x03\x85\x10\xb7\x09\x21\x02\x21\x44\xd9\xf8\xb2\xf1"
      "\xd7\x8e\xe7\x52\x90\xfc\x2f\xbd\x09\xfb\x1f\xd2\x30\xf5\x66\xaf\x80\xdd"
      "\x4c\xdc\xff\xec\x8d\xfb\x9f\xbd\x71\xff\xb3\x37\xee\x7f\xf6\xc6\xfd\xcf"
      "\xde\xb8\xff\xd9\x1b\xf7\x3f\x7b\xe3\xfe\x33\x96\xad\xa5\x15\xb8\x9d\x47"
      "\xf6\x1d\xfc\xfc\x3f\x3b\xe3\xf3\x7f\xf6\xc6\xfd\xcf\xde\xb8\xff\xd9\x1b"
      "\xf7\x3f\x7b\xe3\xfe\x67\x6f\xdc\xff\xec\x8d\xfb\x9f\xbd\x71\xff\xb3\x37"
      "\xee\x3f\x63\xd9\xda\xff\x07\xcf\xa0\x79\xdc\xc4\xc1\x18\x63\x8c\x31\xc6"
      "\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c"
      "\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18"
      "\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31"
      "\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63"
      "\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6"
      "\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c"
      "\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\xfd\x2f\xb8"
      "\xe0\xaf\xd3\x42\x88\xbf\xcd\x6f\xf6\xba\x18\x63\x8c\x31\xc6\x18\x63\x8c"
      "\x31\xf6\xef\xe3\x73\xde\xec\x15\x30\xc6\x18\x63\x8c\x31\xc6\x18\x63\xec"
      "\x7f\x1e\x08\x29\x94\xd0\x22\x10\x39\x44\x4e\x11\x23\x72\x89\x58\x71\x8b"
      "\x88\x13\xb7\x8a\xdc\xe2\x36\x11\x11\xb7\x8b\x78\x71\x87\xc8\x23\xee\x14"
      "\x79\x45\x3e\x91\x5f\x14\x10\x05\x45\x21\x51\x58\x18\x81\xc2\x0a\x12\xa1"
      "\x28\x22\x8a\x8a\xa8\xb8\x4b\x14\x13\x77\x8b\x04\x51\x5c\x94\x10\x25\x85"
      "\x13\xa5\x44\xa2\xb8\x47\x94\x16\xf7\x8a\x32\xe2\x3e\x51\x56\xdc\x2f\xca"
      "\x89\x07\x44\x79\x51\x41\x54\x14\x95\xc4\x83\xa2\xb2\x78\x48\x54\x11\x0f"
      "\x8b\xaa\xe2\x11\x51\x4d\x54\x17\x35\x44\x4d\xf1\xa8\xa8\x25\x1e\x13\xb5"
      "\xc5\xe3\xa2\x8e\x78\x42\xd4\x15\x4f\x8a\x7a\xe2\x29\x51\x5f\x3c\x2d\x1a"
      "\x88\x86\xa2\x91\x78\x46\x34\x16\xcf\x8a\x26\xa2\xa9\x68\x26\x9a\x8b\x16"
      "\xa2\xa5\x68\xf5\x2f\xe5\xbf\x25\x7a\x88\xb7\x45\x4f\xd1\x4b\x24\x8b\xde"
      "\xa2\x8f\x78\x47\xf4\x15\xfd\x44\x7f\x31\x40\x0c\x14\xef\x8a\x41\xe2\x3d"
      "\x31\x58\xbc\x2f\x86\x88\xa1\x62\x98\xf8\x40\x0c\x17\x1f\x8a\x11\xe2\x23"
      "\x31\x52\x8c\x12\xa3\xc5\xc7\x62\x8c\x18\x2b\xc6\x89\xf1\x62\x82\x98\x28"
      "\x52\xc4\x27\x62\x92\xf8\x54\x4c\x16\x9f\x89\x29\x62\xaa\x98\x26\xa6\x8b"
      "\x54\x31\x43\xa4\x89\xcf\xc5\x4c\x31\x4b\xcc\x16\x5f\x88\x39\xe2\x4b\x31"
      "\x57\xcc\x13\xf3\xc5\x02\x91\x2e\x16\x8a\x45\x62\xb1\xc8\x10\x5f\x89\x25"
      "\xe2\x6b\x91\x29\x96\x8a\x65\x62\xb9\x58\x21\x56\x8a\x55\x62\xb5\x58\x23"
      "\xd6\x8a\x75\x62\xbd\xd8\x20\x36\x8a\x4d\x62\xb3\xd8\x22\xb6\x8a\x6d\x62"
      "\xbb\xd8\x21\x76\x8a\x5d\x62\xb7\xd8\x23\xf6\x8a\x7d\x62\xbf\x38\x20\xbe"
      "\x11\x59\xe2\xdb\xff\xcb\xfc\xf3\xff\x90\xdf\x0d\x04\x08\x90\x20\x41\x83"
      "\x86\x1c\x90\x03\x62\x20\x06\x62\x21\x16\xe2\x20\x0e\x72\x43\x6e\x88\x40"
      "\x04\xe2\x21\x1e\xf2\x40\x1e\xc8\x0b\x79\x21\x3f\xe4\x87\x82\x50\x10\x0a"
      "\x43\x61\x40\x40\x20\x20\x28\x02\x45\x20\x0a\x51\x28\x06\xc5\x20\x01\x12"
      "\xa0\x04\x94\x00\x07\x0e\x12\x21\x11\x4a\xc3\xbd\x50\x06\xca\x40\x59\x28"
      "\x0b\xe5\xa0\x1c\x94\x87\x0a\x50\x01\x2a\x41\x25\xa8\x0c\x95\xa1\x0a\x54"
      "\x81\xaa\x50\x15\xaa\x41\x35\xa8\x01\x35\xe0\x51\x78\x14\x1e\x83\xda\x50"
      "\x1b\xea\x40\x1d\xa8\x0b\x75\xa1\x1e\xd4\x83\xfa\x50\x1f\x1a\x40\x03\x68"
      "\x04\x8d\xa0\x31\x34\x86\x26\xd0\x04\x9a\x41\x33\x68\x01\x2d\xa0\x15\xb4"
      "\x82\xd6\xd0\x1a\xda\x40\x1b\x68\x07\xed\xa0\x3d\xb4\x87\x0e\xd0\x01\x92"
      "\x20\x09\x3a\x42\x47\xe8\x04\x9d\xa0\x33\x74\x86\x2e\xd0\x05\xba\x42\x57"
      "\xe8\x06\x6f\xc2\x9b\xf0\x16\xbc\x05\x6f\xc3\xdb\xd0\x0b\xaa\xc9\xde\xd0"
      "\x07\xfa\x40\x5f\xe8\x0b\xfd\x61\x00\x0c\x80\x77\x61\x10\xbc\x07\xef\xc1"
      "\xfb\x30\x04\x86\xc2\x30\xf8\x00\x3e\x80\x0f\x61\x04\x9c\x83\x91\x30\x0a"
      "\x46\xc3\x68\xa8\x2c\xc7\xc2\x38\x18\x0f\x24\x27\x42\x0a\xa4\xc0\x24\x98"
      "\x04\x93\x61\x32\x4c\x81\xa9\x30\x15\xa6\x43\x2a\xcc\x80\x34\x48\x83\x99"
      "\x30\x0b\x66\xc1\x17\x30\x07\xbe\x84\x2f\x61\x1e\xcc\x83\x05\x90\x0e\xe9"
      "\xb0\x08\x16\x43\x06\x64\xc0\x12\x38\x0f\x99\xb0\x14\x96\xc1\x72\x58\x01"
      "\x2b\x61\x05\xac\x86\x35\xb0\x1a\xd6\xc1\x7a\x58\x07\x1b\x61\x23\x6c\x86"
      "\xcd\xb0\x15\xb6\xc2\x76\xd8\x0e\x3b\x61\x27\xec\x86\xdd\xb0\x17\xf6\xc2"
      "\x7e\xd8\x0f\x43\x20\x0b\xb2\xe0\x20\x1c\x84\x43\x70\x08\x0e\xc3\x61\x38"
      "\x02\x47\xe0\x28\x1c\x85\x63\x70\x0c\x8e\xc3\x71\x38\x01\x27\xe0\x24\x9c"
      "\x82\xd3\x70\x0a\xce\xc2\x59\x38\x07\xe7\xe1\x02\x5c\x80\x4b\x70\x09\x2e"
      "\xc3\x65\xb8\x0a\x57\xaf\xfd\xf2\xcb\x6b\xb4\xd4\x32\x87\xcc\x21\x63\x64"
      "\x8c\x8c\x95\xb1\x32\x4e\xc6\xc9\xdc\x32\xb7\x8c\xc8\x88\x8c\x97\xf1\x32"
      "\x8f\xcc\x23\xf3\xca\xbc\x32\xbf\xcc\x2f\x0b\xca\x82\xb2\xb0\x2c\x2c\x51"
      "\xa2\x24\x19\xca\x22\xb2\x88\x8c\xca\xa8\x2c\x26\x8b\xc9\x04\x99\x20\x4b"
      "\xc8\x12\xd2\x49\x27\x13\x65\xa2\x2c\x2d\x4b\xcb\x32\xb2\x8c\x2c\x2b\xef"
      "\x97\xe5\xe4\x03\xb2\xbc\xac\x20\xdb\xba\x4a\xb2\x92\xac\x2c\xdb\xb9\x2a"
      "\xf2\x61\x59\x55\x56\x95\xd5\x64\x75\x59\x43\xd6\x94\x35\x65\x2d\x59\x4b"
      "\xd6\x96\xb5\x65\x1d\x59\x47\xd6\x95\x75\x65\x3d\xf9\x94\xac\x2f\x7b\x43"
      "\x7f\x68\x28\xaf\x75\xa6\xb1\x1c\x0a\x4d\xe4\x30\x68\x26\x9b\xcb\x16\xb2"
      "\xa5\xfc\x10\x9e\x93\xad\xe5\x08\x68\x23\xdb\xca\x76\xf2\x05\x39\x0a\x46"
      "\x42\x07\xd9\xda\x25\xc9\x97\x65\x47\x39\x0e\x3a\xc9\x57\xe5\x78\x78\x4d"
      "\x76\x91\x13\xa1\xab\x7c\x43\x76\x93\x6f\xca\xee\xf2\x2d\xd9\x43\xb6\x71"
      "\x3d\x65\x2f\x39\x05\x7a\xcb\x3e\x72\x3a\xf4\x95\xfd\x64\x7f\x39\x40\xce"
      "\x84\xea\xf2\x5a\xc7\x6a\xc8\xf7\xe5\x10\x39\x54\x0e\x93\x1f\xc8\x05\xf0"
      "\xa1\x1c\x21\x3f\x92\x23\xe5\x28\x39\x5a\x7e\x2c\xc7\xc8\xb1\x72\x9c\x1c"
      "\x2f\x27\xc8\x89\x32\x45\x7e\x22\x27\xc9\x4f\xe5\x64\xf9\x99\x9c\x22\xa7"
      "\xca\x69\x72\xba\x4c\x95\x33\x64\x9a\xfc\x5c\xce\x94\xb3\xe4\x6c\xf9\x85"
      "\x9c\x23\xbf\x94\x73\xe5\x3c\x39\x5f\x2e\x90\xe9\x72\xa1\x5c\x24\x17\xcb"
      "\x0c\xf9\x95\x5c\x22\xbf\x96\x99\x72\xa9\x5c\x26\x97\xcb\x15\x72\xa5\x5c"
      "\x25\x57\xcb\x35\x72\xad\x5c\x27\xd7\xcb\x0d\x72\xa3\xdc\x24\x37\xcb\x2d"
      "\x72\xab\xdc\x26\xb7\xcb\x1d\x72\xa7\xdc\x25\x77\xcb\x3d\x72\xaf\xdc\x27"
      "\xf7\xcb\x03\xf2\x1b\x99\x25\xbf\x95\x07\xe5\x5f\xe4\x21\xf9\x9d\x3c\x2c"
      "\xbf\x97\x47\xe4\x0f\xf2\xa8\xfc\x51\x1e\x93\x3f\xc9\xe3\xf2\x67\x79\x42"
      "\xfe\x22\x4f\xca\x53\xf2\xb4\x3c\x23\xcf\xca\x5f\xe5\x39\x79\x5e\x5e\x90"
      "\x17\xe5\x25\xf9\x9b\xbc\x2c\xaf\xc8\xab\xd2\x4b\xa1\x40\x49\xa5\x94\x56"
      "\x81\xca\xa1\x72\xaa\x18\x95\x4b\xc5\xaa\x5b\x54\x9c\xba\x55\xe5\x56\xb7"
      "\xa9\x88\xba\x5d\xc5\xab\x3b\x54\x1e\x75\xa7\xca\xab\xf2\xa9\xfc\xaa\x80"
      "\x2a\xa8\x0a\xa9\xc2\xca\x28\x54\x56\x91\x0a\x55\x11\x55\x54\x45\xd5\x5d"
      "\xaa\x98\xba\x5b\x25\xa8\xe2\xaa\x84\x2a\xa9\x9c\x2a\xa5\x12\xd5\x3d\xaa"
      "\xb4\xba\x57\x95\x51\xf7\xa9\xb2\xea\x7e\x55\x4e\x3d\xa0\xca\xab\x0a\xaa"
      "\xa2\xaa\xa4\x1e\x54\x95\xd5\x43\xaa\x8a\x7a\x58\x55\x55\x8f\xa8\x6a\xaa"
      "\xba\xaa\xa1\x6a\xaa\x47\x55\x2d\xf5\x98\xaa\xad\x1e\x57\x75\xd4\x13\xaa"
      "\xae\x7a\x52\xd5\x53\x4f\xa9\xfa\xea\x69\xd5\x40\x35\x54\x8d\xd4\x33\xaa"
      "\xb1\x7a\x56\x35\x51\x4d\x55\x33\xd5\x5c\xb5\x50\x2d\x55\x2b\xf5\x9c\x6a"
      "\xad\x9e\x57\x6d\x54\x5b\xd5\x4e\xbd\xa0\xda\xab\x17\x55\x07\xf5\x92\x4a"
      "\x52\x2f\xab\x8e\xea\x15\xd5\x49\xbd\xaa\x3a\xab\xd7\x54\x17\xf5\xba\xea"
      "\xaa\xde\x50\xdd\xd4\x9b\xaa\xbb\xba\xa2\xae\x2a\xaf\x7a\xaa\x5e\x2a\x59"
      "\xf5\x56\x7d\xd4\x3b\xaa\xaf\xea\xa7\xfa\xab\x01\x6a\xa0\x7a\x57\x0d\x52"
      "\xef\xa9\xc1\xea\x7d\x35\x44\x0d\x55\xc3\xd4\x07\x6a\xb8\xfa\x50\x8d\x50"
      "\x1f\xa9\x91\x6a\x94\x1a\xad\x3e\x56\x63\xd4\x58\x35\x4e\x8d\x57\x13\xd4"
      "\x44\x95\xa2\x3e\x51\x93\xd4\xa7\x6a\xb2\xfa\x4c\x4d\x51\x53\xd5\x34\x35"
      "\x5d\xa5\xaa\x19\xaa\xff\x1f\x95\x66\xff\x37\xf2\x3f\xfd\x27\xf9\x83\x7f"
      "\x7f\xf7\xcd\x6a\x8b\xda\xaa\xb6\xa9\xed\x6a\x87\xda\xa9\x76\xa9\xdd\x6a"
      "\x8f\xda\xa3\xf6\xa9\x7d\xea\x80\x3a\xa0\xb2\x54\x96\x3a\xa8\x0e\xaa\x43"
      "\xea\x90\x3a\xac\x0e\xab\x23\xea\x88\x3a\xaa\x8e\xaa\x63\xea\x98\x3a\xae"
      "\x8e\xab\x13\xea\x84\x3a\xa9\x4e\xa9\x8b\xea\x8c\x3a\xab\x7e\x55\xe7\xd4"
      "\x79\x75\x5e\x5d\x54\x97\xd4\x25\x75\xf9\x8f\x9f\x81\xd0\xa0\xa5\x56\x5a"
      "\xeb\x40\xe7\xd0\x39\x75\x8c\xce\xa5\x63\xf5\x2d\x3a\x4e\xdf\xaa\x73\xeb"
      "\xdb\x74\x44\xdf\xae\xe3\xf5\x1d\x3a\x8f\xbe\x53\xe7\xd5\xf9\x74\x7e\x5d"
      "\x40\x17\xd4\x85\x74\x61\x6d\x34\x6a\xab\x49\x87\xba\x88\x2e\xaa\xa3\xfa"
      "\x2e\x5d\x4c\xdf\xad\x13\x74\x71\x5d\x42\x97\xd4\x4e\x97\xd2\x89\xfa\x9e"
      "\xff\xe7\xfc\x1b\xad\xaf\x95\x6e\xa5\x5b\xeb\xd6\xba\x8d\x6e\xa3\xdb\xe9"
      "\x76\xba\xbd\x6e\xaf\x3b\xe8\x0e\x3a\x49\x27\xe9\x8e\xba\xa3\xee\xa4\x3b"
      "\xe9\xce\xba\xb3\xee\xa2\xbb\xe8\xae\xba\xab\xee\xa6\xbb\xe9\xee\xba\xbb"
      "\xee\xa1\x7b\xe8\x9e\xba\xa7\x4e\xd6\xc9\xba\x8f\x7e\x47\xf7\xd5\xfd\x74"
      "\x7f\x3d\x40\x0f\xd4\xef\xea\x41\x7a\x90\x1e\xac\x07\xeb\x21\x7a\x88\x1e"
      "\xa6\x87\xe9\xe1\x7a\xb8\x1e\xa1\x47\xe8\x91\x7a\xa4\x1e\xad\x47\xeb\x31"
      "\x7a\x8c\x1e\xa7\xc7\xe9\x09\x7a\x82\x4e\xd1\x29\x7a\x92\x9e\xa4\x27\xeb"
      "\xc9\x7a\x8a\x9e\xa2\xa7\xe9\x69\x3a\x55\xa7\xea\x34\x9d\xa6\x67\xea\x99"
      "\x7a\xb6\x9e\xad\xe7\xe8\x39\x7a\xae\x9e\xab\xe7\xeb\xf9\x3a\x5d\xa7\xeb"
      "\x45\x7a\x91\xce\xd0\x19\x7a\x89\x5e\xa2\x33\xf5\x52\xbd\x54\x2f\xd7\xcb"
      "\xf5\x4a\xbd\x52\xaf\xd6\xab\xf5\x5a\xbd\x56\xaf\xd7\xeb\xf5\x46\xbd\x51"
      "\x67\xea\x2d\x7a\x8b\xde\xa6\xb7\xe9\x1d\x7a\x87\xde\xa5\x77\xe9\x3d\x7a"
      "\x8f\xde\xa7\xf7\xe9\x03\xfa\x80\xce\xd2\x59\xfa\xa0\x3e\xa8\x0f\xe9\x43"
      "\xfa\xb0\x3e\xac\x8f\xe8\x23\xfa\xa8\x3e\xaa\x8f\xe9\x63\xfa\xb8\x3e\xae"
      "\x4f\xe8\x13\xfa\xa4\x3e\xa9\x4f\xeb\xd3\xfa\xac\x3e\xab\xcf\xe9\x73\xfa"
      "\x82\xbe\xa0\x2f\xe9\x4b\xfa\xb2\xbe\xac\xaf\xea\xab\xd7\x2e\xfb\x02\x19"
      "\xc8\x40\x07\x3a\xc8\x11\xe4\x08\x62\x82\x98\x20\x36\x88\x0d\xe2\x82\xb8"
      "\x20\x77\x90\x3b\x88\x04\x91\x20\x3e\x88\x0f\xf2\x04\x77\x06\x79\x83\x7c"
      "\x41\xfe\xa0\x40\x50\x30\x28\x14\x14\x0e\x4c\x80\x81\x0d\x28\x08\x83\x22"
      "\x41\xd1\x20\x1a\xdc\x15\x14\x0b\xee\x0e\x12\x82\xe2\x41\x89\xa0\x64\xe0"
      "\x82\x52\x41\x62\x70\x4f\x50\x3a\xb8\x37\x28\x13\xdc\x17\x94\x0d\xee\x0f"
      "\xca\x05\x0f\x04\xe5\x83\x0a\x41\xc5\xa0\x52\xf0\x60\x50\x39\x78\x28\xa8"
      "\x12\x3c\x1c\x54\x0d\x1e\x09\xaa\x05\xd5\x83\x1a\x41\xcd\xe0\xd1\xa0\x56"
      "\xf0\x58\x50\x3b\x78\x3c\xa8\x13\x3c\x11\xd4\x0d\x9e\x0c\xea\x05\x4f\x05"
      "\xf5\x83\xa7\x83\x06\x41\xc3\xa0\x51\xf0\x4c\xd0\x38\x78\x36\x68\x12\x34"
      "\x0d\x9a\x05\xcd\x83\x16\x41\xcb\xa0\xd5\xbf\xb5\xbe\xf7\xe7\xf2\x3d\xef"
      "\x7a\x9a\x5e\x26\xd9\xf4\x36\x7d\xcc\x3b\xa6\xaf\xe9\x67\xfa\x9b\x01\x66"
      "\xa0\x79\xd7\x0c\x32\xef\x99\xc1\xe6\x7d\x33\xc4\x0c\x35\xc3\xcc\x07\x66"
      "\xb8\xf9\xd0\x8c\x30\x1f\x99\x91\x66\x94\x19\x6d\x3e\x36\x63\xcc\x58\x33"
      "\xce\x8c\x37\x13\xcc\x44\x93\x62\x3e\x31\x93\xcc\xa7\x66\xb2\xf9\xcc\x4c"
      "\x31\x53\xcd\x34\x33\xdd\xa4\x9a\x19\x26\xcd\x7c\x6e\x66\x9a\x59\x66\xb6"
      "\xf9\xc2\xcc\x31\x5f\x9a\xb9\x66\x9e\x99\x6f\x16\x98\x74\xb3\xd0\x2c\x32"
      "\x8b\x4d\x86\xf9\xca\x2c\x31\x5f\x9b\x4c\xb3\xd4\x2c\x33\xcb\xcd\x0a\xb3"
      "\xd2\xac\x32\xab\xcd\x1a\xb3\xd6\xac\x33\xeb\xcd\x06\xb3\xd1\x6c\x32\x9b"
      "\xcd\x16\xb3\xd5\x6c\x33\xdb\xcd\x0e\xb3\xd3\xec\x32\xbb\xcd\x1e\xb3\xd7"
      "\xec\x33\xfb\xcd\x01\xf3\x8d\xc9\x32\xdf\x9a\x83\xe6\x2f\xe6\x90\xf9\xce"
      "\x1c\x36\xdf\x9b\x23\xe6\x07\x73\xd4\xfc\x68\x8e\x99\x9f\xcc\x71\xf3\xb3"
      "\x39\x61\x7e\x31\x27\xcd\x29\x73\xda\x9c\x31\x67\xcd\xaf\xe6\x9c\x39\x6f"
      "\x2e\x98\x8b\xe6\x92\xf9\xcd\x5c\x36\x57\xcc\x55\xe3\xaf\x5d\xdc\x5f\x3b"
      "\xbd\xa3\x46\x8d\x39\x30\x07\xc6\x60\x0c\xc6\x62\x2c\xc6\x61\x1c\xe6\xc6"
      "\xdc\x18\xc1\x08\xc6\x63\x3c\xe6\xc1\x3c\x98\x17\xf3\x62\x7e\xcc\x8f\x05"
      "\xb1\x20\x16\xc6\xc2\x78\x0d\x21\x61\x11\x2c\x82\x51\x8c\x62\x31\x2c\x86"
      "\x09\x98\x80\x25\xb0\x04\x3a\x74\x98\x88\x89\x58\x1a\x4b\x63\x19\x2c\x83"
      "\x65\xb1\x2c\x96\xc3\x72\x58\x1e\xcb\x63\x45\xac\x88\x0f\xe2\x83\xf8\x10"
      "\x3e\x84\x0f\xe3\xc3\xf8\x08\x3e\x82\xd5\xb1\x3a\xd6\xc4\x9a\x58\x0b\x6b"
      "\x61\x6d\xac\x8d\x75\xb0\x0e\xd6\xc5\xba\x58\x0f\xeb\x61\x7d\xac\x8f\x0d"
      "\xb0\x01\x36\xc2\x46\xd8\x18\x1b\x63\x13\x6c\x82\xcd\xb0\x19\xb6\xc0\x16"
      "\xd8\x0a\x5b\x61\x6b\x6c\x8d\x6d\xb0\x0d\xb6\xc3\x76\xd8\x1e\xdb\x63\x07"
      "\xec\x80\x49\x98\x84\x1d\xb1\x23\x76\xc2\x4e\xd8\x19\x3b\x63\x17\xec\x82"
      "\x5d\xb1\x2b\x76\xc3\x6e\xd8\x1d\xbb\x63\x0f\xec\x81\x3d\xb1\x27\x26\x63"
      "\x32\xf6\xc1\x3e\xd8\x17\xfb\x62\x7f\xec\x8f\x03\x71\x20\x0e\xc2\x41\x38"
      "\x18\x07\xe3\x10\x1c\x82\xc3\x70\x18\x0e\xc7\xe1\x38\x02\x47\xe0\x48\x1c"
      "\x85\xa3\xf1\x63\x1c\x83\x63\x71\x1c\x8e\xc7\x09\x38\x11\x53\x30\x05\x27"
      "\xe1\x24\x9c\x8c\x93\x71\x0a\x4e\xc1\x69\x38\x0d\x53\x31\x15\xd3\x30\x0d"
      "\x67\xe2\x4c\x9c\x8d\xb3\x71\x0e\xce\xc1\xb9\x38\x17\xe7\xe3\x7c\x4c\xc7"
      "\x74\x5c\x84\x8b\x30\x03\x33\x70\x09\x2e\xc1\x4c\xcc\xc4\x65\xb8\x0c\x57"
      "\xe0\x0a\x5c\x85\xab\x70\x0d\xae\xc1\x75\xb8\x0e\x37\xe0\x06\xdc\x84\x9b"
      "\x70\x0b\x6e\xc1\x6d\xb8\x0d\x77\xe0\x0e\xdc\x85\xbb\x70\x0f\xee\xc1\x7d"
      "\xb8\x0f\x0f\xe0\x01\xcc\xc2\x2c\x3c\x88\x07\xf1\x10\x1e\xc2\xc3\x78\x18"
      "\x8f\xe0\x11\x3c\x8a\x47\xf1\x18\x1e\xc3\xe3\x78\x1c\x4f\xe0\x09\x3c\x89"
      "\x27\xf1\x34\x9e\xc6\xb3\x78\x16\xcf\xe1\x39\xbc\x80\x17\xf0\x12\xfe\x86"
      "\x97\xf1\x0a\x5e\x45\x8f\x31\x36\x97\x8d\xb5\xb7\xd8\x38\x7b\xab\xcd\x6d"
      "\x6f\xb3\xff\x18\xe7\xb7\x05\x6c\x41\x5b\xc8\x16\xb6\xc6\xe6\xb5\xf9\xfe"
      "\x2e\x46\x6b\x6d\x82\x2d\x6e\x4b\xd8\x92\xd6\xd9\x52\x36\xd1\xde\xf3\xa7"
      "\xb8\xbc\xad\x60\x2b\xda\x4a\xf6\x41\x5b\xd9\x3e\x64\xab\xfc\x29\xae\x65"
      "\x1f\xb3\xb5\xed\xe3\xb6\x8e\x7d\xc2\xd6\xb4\x8f\xfe\x5d\x5c\xd7\x3e\x69"
      "\xeb\xd9\x67\x6d\x7d\xdb\xd4\x36\xb0\xcd\x6d\x23\xdb\xd2\x36\xb6\xcf\xda"
      "\x26\xb6\xa9\x6d\x66\x9b\xdb\x16\xb6\xa5\x6d\x6f\x5f\xb4\x1d\xec\x4b\x36"
      "\xc9\xbe\x6c\x3b\xda\x57\xfe\x14\x2f\xb2\x8b\xed\x1a\xbb\xd6\xae\xb3\xeb"
      "\xed\x3e\xbb\xdf\x5e\xb0\x17\xed\x31\xfb\x93\xbd\x64\x7f\xb3\x3d\x6d\x2f"
      "\x3b\xd0\xbe\x6b\x07\xd9\xf7\xec\x60\xfb\xbe\x1d\x62\x87\xfe\x29\x1e\x6d"
      "\x3f\xb6\x63\xec\x58\x3b\xce\x8e\xb7\x13\xec\xc4\x3f\xc5\xd3\xec\x74\x9b"
      "\x6a\x67\xd8\x34\xfb\xb9\x9d\x69\x67\xfd\x29\x4e\xb7\x0b\xed\x1c\x9b\x61"
      "\xe7\xda\x79\x76\xbe\x5d\xf0\x7b\x7c\x6d\x4d\x19\xf6\x2b\xbb\xc4\x7e\x6d"
      "\x33\xed\x52\xbb\xcc\x2e\xb7\x2b\xec\x4a\xbb\xca\xae\xfe\x8f\xb5\x2e\xb7"
      "\x1b\xed\x26\xbb\xd9\xee\xb1\x7b\xed\x36\xbb\xdd\xee\xb0\x3b\xed\x2e\xbb"
      "\xfb\xf7\xf8\xda\x3e\x0e\xd8\x6f\x6c\x96\xfd\xd6\x1e\xb5\x3f\xda\x43\xf6"
      "\x3b\x7b\xd8\x1e\xb7\x47\xec\x0f\xbf\xc7\xd7\xf6\x77\xdc\xfe\x6c\x4f\xd8"
      "\x5f\xec\x49\x7b\xca\x9e\xb6\x67\xec\x59\xfb\xab\x3d\x67\xcf\xff\xbe\xff"
      "\x6b\x7b\x3f\x63\xaf\xd8\xab\xd6\x5b\x41\x40\x92\x14\x69\x0a\x28\x07\xe5"
      "\xa4\x18\xca\x45\xb1\x74\x0b\xc5\xd1\xad\x94\x9b\x6e\xa3\x08\xdd\x4e\xf1"
      "\x74\x07\xe5\xa1\x3b\x29\x2f\xe5\xa3\xfc\x54\x80\x0a\x52\x21\x2a\x4c\x86"
      "\x90\x2c\x11\x85\x54\x84\x8a\x52\x94\xee\xa2\x62\x74\x37\x25\x50\x71\x2a"
      "\x41\x25\xc9\x51\x29\x4a\xa4\x7b\xa8\x34\xdd\x4b\x65\xe8\x3e\x2a\x4b\xf7"
      "\x53\x39\x7a\x80\xca\x53\x05\xaa\x48\x95\xe8\x41\xaa\x4c\x0f\x51\x15\x7a"
      "\x98\xaa\xd2\x23\x54\x8d\xaa\x53\x0d\xaa\x49\x8f\x52\x2d\x7a\x8c\x6a\xd3"
      "\xe3\x54\x87\x9e\xa0\xba\xf4\x24\xd5\xa3\xa7\xa8\x3e\x3d\x4d\x0d\xa8\x21"
      "\x35\xa2\x67\xa8\x31\x3d\x4b\x4d\xa8\x29\x35\xa3\xe6\xd4\x82\x5a\x52\x2b"
      "\x7a\x8e\x5a\xd3\xf3\xd4\x86\xda\x52\x3b\x7a\x81\xda\xd3\x8b\xd4\x81\x5e"
      "\xa2\x24\x7a\x99\x3a\xd2\x2b\xd4\x89\x5e\xa5\xce\xf4\x1a\x75\xa1\xd7\xa9"
      "\x2b\xbd\x41\xdd\xe8\x4d\xea\x4e\x6f\x51\x0f\x7a\x9b\x7a\x52\x2f\x4a\xa6"
      "\xde\xd4\x87\xde\xa1\xbe\xd4\x8f\xfa\xd3\x00\x1a\x48\xef\xd2\x20\x7a\x8f"
      "\x06\xd3\xfb\x34\x84\x86\xd2\x30\xfa\x80\x86\xd3\x87\x34\x82\x3e\xa2\x91"
      "\x34\x8a\x46\xd3\xc7\x34\x86\xc6\xd2\x38\x1a\x4f\x13\x68\x22\xa5\xd0\x27"
      "\x34\x89\x3e\xa5\xc9\xf4\x19\x4d\xa1\xa9\x34\x8d\xa6\x53\x2a\xcd\xa0\x34"
      "\xfa\x9c\x66\xd2\x2c\x9a\x4d\x5f\xd0\x1c\xfa\x92\xe6\xd2\x3c\x9a\x4f\x0b"
      "\x28\x9d\x16\xd2\x22\x5a\x4c\x19\xf4\x15\x2d\xa1\xaf\x29\x93\x96\xd2\x32"
      "\x5a\x4e\x2b\x68\x25\xad\xa2\xd5\xb4\x86\xd6\xd2\x3a\x5a\x4f\x1b\x68\x23"
      "\x6d\xa2\xcd\xb4\x85\xb6\xd2\x36\xda\x4e\x3b\x68\x27\xed\xa2\xdd\xb4\x87"
      "\xf6\xd2\x3e\xda\x4f\x07\xe8\x1b\xca\xa2\x6f\xe9\x20\xfd\x85\x0e\xd1\x77"
      "\x74\x98\xbe\xa7\x23\xf4\x03\x1d\xa5\x1f\xe9\x18\xfd\x44\xc7\xe9\x67\x3a"
      "\x41\xbf\xd0\x49\x3a\x45\xa7\xe9\x0c\x9d\xa5\x5f\xe9\x1c\x9d\xa7\x0b\x74"
      "\x91\x2e\xd1\x6f\x74\x99\xae\xd0\x55\xf2\x24\x42\x08\x65\xa8\x42\x1d\x06"
      "\x61\x8e\x30\x67\x18\x13\xe6\x0a\x63\xc3\x5b\xc2\xb8\xf0\xd6\x30\x77\x78"
      "\x5b\x18\x09\x6f\x0f\xe3\xc3\x3b\xc2\x3c\xe1\x9d\x61\xde\x30\x5f\x98\x3f"
      "\x2c\x10\x16\x0c\x0b\x85\x85\x43\x13\x62\x68\x43\x0a\xc3\xb0\x48\x58\x34"
      "\x8c\x86\x77\x85\xc5\xc2\xbb\xc3\x84\xb0\x78\x58\x22\x2c\x19\xba\xb0\x54"
      "\x98\x18\xde\x13\x96\x0e\xef\x0d\xcb\x84\xf7\x85\x65\xc3\xfb\xc3\x72\xe1"
      "\x03\x61\xf9\xb0\x42\x58\x31\xac\x14\x3e\x18\x56\x0e\x1f\x0a\xab\x84\x0f"
      "\x87\x55\xc3\x47\xc2\x6a\x61\xf5\xb0\x46\x58\x33\x7c\x34\xac\x15\x3e\x16"
      "\xd6\x0e\x1f\x0f\xeb\x84\x4f\x84\x65\xc2\x27\xc3\x7a\xe1\x53\x61\xfd\xf0"
      "\xe9\xb0\x41\xd8\x30\x6c\x14\x3e\x13\x36\x0e\x9f\x0d\x9b\x84\x4d\xc3\x66"
      "\x61\xf3\xb0\x45\xd8\x32\x6c\x15\x3e\x17\xb6\x0e\x9f\x0f\xdb\x84\x6d\xc3"
      "\x76\xe1\x0b\x61\xfb\xf0\xc5\xb0\x43\xf8\x52\x98\x14\xbe\x1c\x76\x0c\x5f"
      "\xb9\xe1\xf1\xe4\xb0\x77\xd8\x27\x7c\x27\x7c\x27\xf4\xfe\x71\x35\x3f\xba"
      "\x20\x9a\x1e\x5d\x18\x5d\x14\x5d\x1c\xcd\x88\x7e\x15\x5d\x12\xfd\x3a\x9a"
      "\x19\x5d\x1a\x5d\x16\x5d\x1e\x5d\x11\x5d\x19\x5d\x15\x5d\x1d\x5d\x13\x5d"
      "\x1b\x5d\x17\x5d\x1f\xdd\x10\xdd\x18\xdd\x14\xdd\x1c\xf5\xbe\x66\x4e\xe1"
      "\xc0\x49\xa7\x9c\x76\x81\xcb\xe1\x72\xba\x18\x97\xcb\xc5\xba\x5b\x5c\x9c"
      "\xbb\xd5\xe5\x76\xb7\xb9\x88\xbb\xdd\xc5\xbb\x3b\x5c\x1e\x77\xa7\xcb\xeb"
      "\xf2\xb9\xfc\xae\x80\x2b\xe8\x0a\xb9\xc2\xce\x38\x74\xd6\x91\x0b\x5d\x11"
      "\x57\xd4\x45\xdd\x5d\xae\x98\xbb\xdb\x25\xb8\xe2\xae\x84\x2b\xe9\x9c\x2b"
      "\xe5\x12\x5d\x4b\xd7\xca\xb5\x72\xad\xdd\xf3\xae\x8d\x6b\xeb\xda\xb9\x17"
      "\xdc\x0b\xee\x45\xf7\xa2\x7b\xc9\xbd\xe4\x5e\x76\x1d\xdd\x2b\xae\x93\x7b"
      "\xd5\x75\x76\xaf\xb9\x2e\xee\x75\xf7\xba\x7b\xc3\x75\x73\x6f\xba\xee\xee"
      "\x2d\xd7\xc3\xbd\xed\x7a\xba\x5e\x2e\xd9\x25\xbb\x3e\xae\x8f\xeb\xeb\xfa"
      "\xba\xfe\xae\xbf\x1b\xe8\x06\xba\x41\x6e\x90\x1b\xec\x06\xbb\x21\x6e\x88"
      "\x1b\xe6\x86\xb9\xe1\x6e\xb8\x1b\xe1\x46\xb8\x91\x6e\xa4\x1b\xed\x46\xbb"
      "\x31\x6e\x8c\x1b\xe7\xc6\xb9\x09\x6e\x82\x4b\x71\x29\x6e\x92\x9b\xe4\x26"
      "\xbb\xc9\x6e\x8a\x9b\xe2\xa6\xb9\x69\x2e\xd5\xa5\xba\x34\x97\xe6\x66\xba"
      "\x99\x6e\xb6\x9b\xed\xe6\xb8\x39\x6e\xae\x9b\xeb\xe6\xbb\xf9\x2e\xdd\xa5"
      "\xbb\x45\x6e\x91\xcb\x70\x19\x6e\x89\x5b\xe2\x32\x5d\xa6\x5b\xe6\x96\xb9"
      "\x15\x6e\x85\x5b\xe5\x56\xb9\x35\x6e\x8d\x5b\xe7\xd6\xb9\x0d\x6e\x83\xdb"
      "\xe4\x36\xb9\x2d\x6e\x8b\xdb\xe6\xb6\xb9\x1d\x6e\x87\xdb\xe5\x76\xb9\x3d"
      "\x6e\x8f\xdb\xe7\xf6\xb9\x03\xee\x80\xcb\x72\x59\xee\xa0\x3b\xe8\x0e\xb9"
      "\x43\xee\xb0\xfb\xde\x1d\x71\x3f\xb8\xa3\xee\x47\x77\xcc\xfd\xe4\x8e\xbb"
      "\x9f\xdd\x09\xf7\x8b\x3b\xe9\x4e\xb9\xd3\xee\x8c\x3b\xeb\x7e\x75\xe7\xdc"
      "\x79\x77\xc1\x5d\x74\x97\xdc\x6f\xee\xb2\xbb\xe2\xae\x3a\xef\x52\x22\x9f"
      "\x44\x26\x45\x3e\x8d\x4c\x8e\x7c\x16\x99\x12\x99\x1a\x99\x16\x99\x1e\x49"
      "\x8d\xcc\x88\xa4\x45\x3e\x8f\xcc\x8c\xcc\x8a\xcc\x8e\x7c\x11\x99\x13\xf9"
      "\x32\x32\x37\x32\x2f\x32\x3f\xb2\x20\x92\x1e\x59\x18\x59\x14\x59\x1c\xc9"
      "\x88\x7c\x15\x59\x12\xf9\x3a\x92\x19\x59\x1a\x59\x16\x59\x1e\x59\x11\x59"
      "\x19\xf1\xbe\xd0\xb6\xd0\x17\xf1\x45\x7d\xd4\xdf\xe5\x8b\xf9\xbb\x7d\x82"
      "\x2f\xee\x4b\xf8\x92\xde\xf9\x52\x3e\xd1\xdf\xe3\x4b\xfb\x7b\x7d\x19\x7f"
      "\x9f\x2f\xeb\xef\xf7\xe5\xfc\x03\xbe\xbc\xaf\xe0\x2b\xfa\xa6\xbe\x99\x6f"
      "\xee\x5b\xf8\x96\xbe\x95\x7f\xce\xb7\xf6\xcf\xfb\x36\xbe\xad\x6f\xe7\x5f"
      "\xf0\xed\xfd\x8b\xbe\x83\x7f\xc9\x27\xf9\x97\x7d\x47\xff\x8a\xef\xe4\x5f"
      "\xf5\x9d\xfd\x6b\xbe\x8b\x7f\xdd\x77\xf5\x6f\xf8\x6e\xfe\x4d\xdf\xdd\xbf"
      "\xe5\x7b\xf8\xb7\x7d\x4f\xdf\xcb\x27\xfb\xde\xbe\x8f\x7f\xc7\xf7\xf5\xfd"
      "\x7c\x7f\x3f\xc0\x0f\xf4\xef\xfa\x41\xfe\x3d\x3f\xd8\xbf\xef\x87\xf8\xa1"
      "\x7e\x98\xff\xc0\x0f\xf7\x1f\xfa\x11\xfe\x23\x3f\xd2\x8f\xf2\xa3\xfd\xc7"
      "\x7e\x8c\x1f\xeb\xc7\xf9\xf1\x7e\x82\x9f\xe8\x53\xfc\x27\x7e\x92\xff\xd4"
      "\x4f\xf6\x9f\xf9\x29\x7e\xaa\x9f\xe6\xa7\xfb\x54\x3f\xc3\xa7\xf9\xcf\xfd"
      "\x4c\x3f\xcb\xcf\xf6\x5f\xf8\x39\xfe\x4b\x3f\xd7\xcf\xf3\xf3\xfd\x02\x9f"
      "\xee\x17\xfa\x45\x7e\xb1\xcf\xf0\x5f\xf9\x25\xfe\x6b\x9f\xe9\x97\xfa\x65"
      "\x7e\xb9\x5f\xe1\x57\xfa\x55\x7e\xb5\x5f\xe3\xd7\xfa\x75\x7e\xbd\xdf\xe0"
      "\x37\xfa\x4d\x7e\xb3\xdf\xe2\xb7\xfa\x6d\x7e\xbb\xdf\xe1\x77\xfa\x5d\x7e"
      "\xb7\xdf\xe3\xf7\xfa\x7d\x7e\xbf\x3f\xe0\xbf\xf1\x59\xfe\x5b\x7f\xd0\xff"
      "\xc5\x1f\xf2\xdf\xf9\xc3\xfe\x7b\x7f\xc4\xff\xe0\x8f\xfa\x1f\xfd\x31\xff"
      "\x93\x3f\xee\x7f\xf6\x27\xfc\x2f\xfe\xa4\x3f\xe5\x4f\xfb\x33\xfe\xac\xff"
      "\xd5\x9f\xf3\xe7\xfd\x05\x7f\xd1\x5f\xf2\xbf\xf9\xcb\xfe\x8a\xbf\xca\xff"
      "\xb3\xc6\x18\x63\x8c\x31\xf6\xdf\xa2\x6e\x70\xbc\xf7\x3f\xf9\x9e\xfc\x63"
      "\x5c\xd3\x47\x08\x71\xeb\xf6\x02\x47\xfe\xb1\xe6\x86\xbc\x7f\x9d\xf7\x93"
      "\xfb\x3a\x46\x84\x10\x2f\xf7\xea\xda\xf0\x6f\xa3\x61\xc3\xe4\xe4\xe4\x3f"
      "\x5e\x9b\xa9\x44\x50\x74\x9e\x10\x22\x72\x3d\x3f\x87\xb8\x1e\x2f\x15\xed"
      "\xc4\x8b\x22\x49\xb4\x15\xa5\xff\xe9\xfa\xfa\xc9\x8a\x40\x37\xa8\x1f\xbd"
      "\x5f\x88\xd8\xff\x94\x13\x23\xae\xc7\xd7\xeb\xdf\xfb\x5f\xd4\x6f\xba\xf0"
      "\x86\xf5\xe7\x09\x91\x50\xf4\x7a\x4e\x2e\x71\x3d\xbe\x5e\xbf\xcc\x7f\x51"
      "\x7f\x77\xfb\x1b\xd4\xcf\xf5\x5d\x8a\x10\x6d\xfe\x53\x4e\x9c\xb8\x1e\x5f"
      "\xaf\x9f\x28\x9e\x17\xaf\x88\xa4\xbf\x7b\x25\x63\x8c\x31\xc6\x18\x63\x8c"
      "\x31\xf6\x57\xfd\xe4\xa5\x6e\x37\xba\xbf\xbd\x76\x7f\x5e\x50\x5f\xcf\xc9"
      "\x29\xae\xc7\x37\xba\x3f\x67\x8c\x31\xc6\x18\x63\x8c\x31\xc6\xd8\xcd\xf7"
      "\xda\x9b\xdd\x5f\x7a\x2e\x29\xa9\x6d\x67\x9e\xf0\x84\x27\x3c\xf9\x8f\xc9"
      "\xcd\xfe\xcb\xc4\x18\x63\x8c\x31\xc6\x18\xfb\x77\xbb\x7e\xd1\x7f\xb3\x57"
      "\xc2\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63"
      "\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6"
      "\x18\x63\x8c\x65\x5f\xff\x1b\x1f\x27\x76\xb3\xf7\xc8\x18\x63\x8c\x31\xc6"
      "\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c"
      "\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18\x63\x8c\x31\xc6\x18"
      "\x63\x8c\x31\xc6\x18\x63\x8c\xdd\x6c\xff\x27\x00\x00\xff\xff\x7c\xc8\x67"
      "\xff",
      5329);
  syz_mount_image(/*fs=*/0x20001500, /*dir=*/0x20001540, /*flags=*/0,
                  /*opts=*/0x20001580, /*chdir=*/1, /*size=*/0x14d1,
                  /*img=*/0x200015c0);
  memcpy((void*)0x20000100, "/dev/loop#\000", 11);
  res = -1;
  res = syz_open_dev(/*dev=*/0x20000100, /*id=*/1, /*flags=O_DIRECT*/ 0x4000);
  if (res != -1)
    r[0] = res;
  syscall(__NR_ioctl, /*fd=*/r[0], /*cmd=*/0x1264, /*arg=*/0ul);
}
int main(void)
{
  syscall(__NR_mmap, /*addr=*/0x1ffff000ul, /*len=*/0x1000ul, /*prot=*/0ul,
          /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1,
          /*offset=*/0ul);
  syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x1000000ul,
          /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul,
          /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1,
          /*offset=*/0ul);
  syscall(__NR_mmap, /*addr=*/0x21000000ul, /*len=*/0x1000ul, /*prot=*/0ul,
          /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1,
          /*offset=*/0ul);
  const char* reason;
  (void)reason;
  for (procid = 0; procid < 8; procid++) {
    if (fork() == 0) {
      loop();
    }
  }
  sleep(1000000);
  return 0;
}

[-- Attachment #3: report --]
[-- Type: application/octet-stream, Size: 4415 bytes --]

loop1: detected capacity change from 0 to 256
Oops: divide error: 0000 [#1] SMP KASAN NOPTI
CPU: 1 UID: 0 PID: 9708 Comm: repro.out Not tainted 6.18.0-rc6 #22 PREEMPT(full) 
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
RIP: 0010:exfat_allocate_bitmap fs/exfat/balloc.c:109 [inline]
RIP: 0010:exfat_load_bitmap+0x69d/0x10c0 fs/exfat/balloc.c:159
Code: 24 78 45 31 ff 48 89 44 24 28 48 c1 e8 03 48 89 84 24 88 00 00 00 4c 89 e8 48 c1 e8 03 48 89 84 24 80 00 00 00 44 89 f8 31 d2 <f7> 74 24 30 41 89 d6 31 ff 89 d6 e8 e3 b0 24 ff 45 85 f6 4c 89 fb
RSP: 0018:ffffc90011b9f860 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90011b9fa10 R08: 0000000000000cc0 R09: 00000000ffffffff
R10: 000000000000000b R11: ffffffff81c646c6 R12: dffffc0000000000
R13: ffff8880522d8018 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000010746300(0000) GS:ffff8880ec992000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004bf938 CR3: 000000001c7c6000 CR4: 0000000000752ef0
PKRU: 55555554
Call Trace:
 <TASK>
 __exfat_fill_super fs/exfat/super.c:623 [inline]
 exfat_fill_super+0x12c6/0x29c0 fs/exfat/super.c:668
 get_tree_bdev_flags+0x40e/0x4d0 fs/super.c:1691
 vfs_get_tree+0x92/0x2b0 fs/super.c:1751
 fc_mount fs/namespace.c:1208 [inline]
 do_new_mount_fc fs/namespace.c:3651 [inline]
 do_new_mount+0x302/0xa10 fs/namespace.c:3727
 do_mount fs/namespace.c:4050 [inline]
 __do_sys_mount fs/namespace.c:4238 [inline]
 __se_sys_mount+0x313/0x410 fs/namespace.c:4215
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf3/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x45234a
Code: 48 c7 c2 c0 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 a8 00 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd5246d6f8 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00000000004004a0 RCX: 000000000045234a
RDX: 0000000020001500 RSI: 0000000020001540 RDI: 00007ffd5246d840
RBP: 00007ffd5246d8d0 R08: 00007ffd5246d740 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000286 R12: 0000000000409da0
R13: 0000000000000000 R14: 00000000004bd018 R15: 00000000004004a0
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:exfat_allocate_bitmap fs/exfat/balloc.c:109 [inline]
RIP: 0010:exfat_load_bitmap+0x69d/0x10c0 fs/exfat/balloc.c:159
Code: 24 78 45 31 ff 48 89 44 24 28 48 c1 e8 03 48 89 84 24 88 00 00 00 4c 89 e8 48 c1 e8 03 48 89 84 24 80 00 00 00 44 89 f8 31 d2 <f7> 74 24 30 41 89 d6 31 ff 89 d6 e8 e3 b0 24 ff 45 85 f6 4c 89 fb
RSP: 0018:ffffc90011b9f860 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90011b9fa10 R08: 0000000000000cc0 R09: 00000000ffffffff
R10: 000000000000000b R11: ffffffff81c646c6 R12: dffffc0000000000
R13: ffff8880522d8018 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000010746300(0000) GS:ffff8880ec992000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004bf938 CR3: 000000001c7c6000 CR4: 0000000000752ef0
PKRU: 55555554
----------------
Code disassembly (best guess):
   0:   24 78                   and    $0x78,%al
   2:   45 31 ff                xor    %r15d,%r15d
   5:   48 89 44 24 28          mov    %rax,0x28(%rsp)
   a:   48 c1 e8 03             shr    $0x3,%rax
   e:   48 89 84 24 88 00 00    mov    %rax,0x88(%rsp)
  15:   00
  16:   4c 89 e8                mov    %r13,%rax
  19:   48 c1 e8 03             shr    $0x3,%rax
  1d:   48 89 84 24 80 00 00    mov    %rax,0x80(%rsp)
  24:   00
  25:   44 89 f8                mov    %r15d,%eax
  28:   31 d2                   xor    %edx,%edx
* 2a:   f7 74 24 30             divl   0x30(%rsp) <-- trapping instruction
  2e:   41 89 d6                mov    %edx,%r14d
  31:   31 ff                   xor    %edi,%edi
  33:   89 d6                   mov    %edx,%esi
  35:   e8 e3 b0 24 ff          call   0xff24b11d
  3a:   45 85 f6                test   %r14d,%r14d
  3d:   4c 89 fb                mov    %r15,%rbx

[-- Attachment #4: repro.syz --]
[-- Type: application/octet-stream, Size: 7352 bytes --]

syz_mount_image$exfat(&(0x7f0000001500), &(0x7f0000001540)='./file0\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='\x00'], 0x1, 0x14d1, &(0x7f00000015c0)="$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")
r0 = syz_open_dev$loop(&(0x7f0000000100), 0x1, 0x4000)
ioctl$BLKFRASET(r0, 0x1264, 0x0)

[-- Attachment #5: kernel.log --]
[-- Type: application/octet-stream, Size: 189428 bytes --]

[-- Attachment #6: .config --]
[-- Type: application/xml, Size: 272414 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [Linux Kernel Bug] divide error in exfat_load_bitmap
  2025-11-17  6:54 [Linux Kernel Bug] divide error in exfat_load_bitmap Jiaming Zhang
@ 2025-11-17  8:18 ` Namjae Jeon
  2025-11-18  7:33   ` [PATCH 0/1] exfat: fix divide error in exfat_allocate_bitmap() Jiaming Zhang
  0 siblings, 1 reply; 4+ messages in thread
From: Namjae Jeon @ 2025-11-17  8:18 UTC (permalink / raw)
  To: Jiaming Zhang
  Cc: linux-fsdevel, sj1557.seo, linux-kernel, yuezhang.mo, syzkaller

On Mon, Nov 17, 2025 at 3:55 PM Jiaming Zhang <r772577952@gmail.com> wrote:
>
> Dear Linux kernel developers and maintainers,
>
> We are writing to report a divide error bug discovered in the exfat
> subsystem. This bug is reproducible on the latest version (v6.18-rc6,
> commit 6a23ae0a96a600d1d12557add110e0bb6e32730c).
>
> The root cause is in exfat_allocate_bitmap(), the variable
> max_ra_count can be 0, which causes a divide-by-zero error in the
> subsequent modulo operation (i % max_ra_count), leading to a system
> crash.
>
> As a potential fix, we can add a zero check before the loop, for example:
>
> ```
> static int exfat_allocate_bitmap(struct super_block *sb,
>     struct exfat_dentry *ep)
> {
>   struct exfat_sb_info *sbi = EXFAT_SB(sb);
>
>     ...
>
>   sector = exfat_cluster_to_sector(sbi, sbi->map_clu);
>   max_ra_count = min(sb->s_bdi->ra_pages, sb->s_bdi->io_pages) <<
>     (PAGE_SHIFT - sb->s_blocksize_bits);
> + if (!max_ra_count) {
> +   i = 0;
> +   goto err_out;
> + }
>   for (i = 0; i < sbi->map_sectors; i++) {
>     /* Trigger the next readahead in advance. */
>     if (0 == (i % max_ra_count)) {
>             ...
> ```
>
> If this solution is acceptable, we are happy to prepare and submit a
> patch immediately.
Rather than handling it as an error, it is better to not use readahead as below.
Please review it.

diff --git a/fs/exfat/balloc.c b/fs/exfat/balloc.c
index 2d2d510f2372..0b6466b3490a 100644
--- a/fs/exfat/balloc.c
+++ b/fs/exfat/balloc.c
@@ -106,7 +106,7 @@ static int exfat_allocate_bitmap(struct super_block *sb,
                (PAGE_SHIFT - sb->s_blocksize_bits);
        for (i = 0; i < sbi->map_sectors; i++) {
                /* Trigger the next readahead in advance. */
-               if (0 == (i % max_ra_count)) {
+               if (max_ra_count && 0 == (i % max_ra_count)) {
                        blk_start_plug(&plug);
                        for (j = i; j < min(max_ra_count,
sbi->map_sectors - i) + i; j++)
                                sb_breadahead(sb, sector + j);

Thank you for reporting this issue!

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [PATCH 0/1] exfat: fix divide error in exfat_allocate_bitmap()
  2025-11-17  8:18 ` Namjae Jeon
@ 2025-11-18  7:33   ` Jiaming Zhang
  2025-11-18  7:33     ` [PATCH 1/1] " Jiaming Zhang
  0 siblings, 1 reply; 4+ messages in thread
From: Jiaming Zhang @ 2025-11-18  7:33 UTC (permalink / raw)
  To: linkinjeon
  Cc: linux-fsdevel, linux-kernel, r772577952, sj1557.seo, syzkaller,
	yuezhang.mo

Hi Namjae,

Thank you for your suggestions! I have created a patch, please let me
know if any change is needed.

Best regards,
Jiaming Zhang

Jiaming Zhang (1):
  exfat: fix divide error in exfat_allocate_bitmap()

 fs/exfat/balloc.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

-- 
2.34.1


^ permalink raw reply	[flat|nested] 4+ messages in thread

* [PATCH 1/1] exfat: fix divide error in exfat_allocate_bitmap()
  2025-11-18  7:33   ` [PATCH 0/1] exfat: fix divide error in exfat_allocate_bitmap() Jiaming Zhang
@ 2025-11-18  7:33     ` Jiaming Zhang
  0 siblings, 0 replies; 4+ messages in thread
From: Jiaming Zhang @ 2025-11-18  7:33 UTC (permalink / raw)
  To: linkinjeon
  Cc: linux-fsdevel, linux-kernel, r772577952, sj1557.seo, syzkaller,
	yuezhang.mo

The variable max_ra_count in exfat_allocate_bitmap() can be 0, leading
to a divide-by-zero error in the modulo operation (i % max_ra_count)
inside the loop. Avoid this by adding a check for max_ra_count before
performing the modulo operation.

Fixes: 9fd688678dd8
Closes: https://lore.kernel.org/lkml/CANypQFb0NeToJrTY5PQi57K_440xQJ1uUS2pMOKqLsqTdEGbRw@mail.gmail.com/
Suggested-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Jiaming Zhang <r772577952@gmail.com>
---
 fs/exfat/balloc.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/fs/exfat/balloc.c b/fs/exfat/balloc.c
index 2d2d510f2372..0b6466b3490a 100644
--- a/fs/exfat/balloc.c
+++ b/fs/exfat/balloc.c
@@ -106,7 +106,7 @@ static int exfat_allocate_bitmap(struct super_block *sb,
 		(PAGE_SHIFT - sb->s_blocksize_bits);
 	for (i = 0; i < sbi->map_sectors; i++) {
 		/* Trigger the next readahead in advance. */
-		if (0 == (i % max_ra_count)) {
+		if (max_ra_count && 0 == (i % max_ra_count)) {
 			blk_start_plug(&plug);
 			for (j = i; j < min(max_ra_count, sbi->map_sectors - i) + i; j++)
 				sb_breadahead(sb, sector + j);
-- 
2.34.1


^ permalink raw reply related	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2025-11-18  7:33 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-11-17  6:54 [Linux Kernel Bug] divide error in exfat_load_bitmap Jiaming Zhang
2025-11-17  8:18 ` Namjae Jeon
2025-11-18  7:33   ` [PATCH 0/1] exfat: fix divide error in exfat_allocate_bitmap() Jiaming Zhang
2025-11-18  7:33     ` [PATCH 1/1] " Jiaming Zhang

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).