syzbot


BUG: Bad page map

Status: auto-closed as invalid on 2020/11/16 16:05
Reported-by: syzbot+c1529d884ab8a6826a20@syzkaller.appspotmail.com
First crash: 705d, last: 705d
similar bugs (7):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: Bad page map (5) 11 19d 54d 0/22 upstream: reported on 2022/05/01 09:02
linux-4.19 BUG: Bad page map (2) 10 162d 342d 0/1 auto-closed as invalid on 2022/05/13 11:22
upstream BUG: Bad page map (2) syz 127 1388d 1444d 0/22 closed as invalid on 2018/09/05 12:51
upstream BUG: Bad page map 1 1447d 1447d 0/22 closed as invalid on 2018/07/08 13:28
upstream BUG: Bad page map (3) 4 1257d 1383d 0/22 auto-closed as invalid on 2019/07/13 00:02
linux-4.19 BUG: Bad page map 2 659d 718d 0/1 auto-closed as invalid on 2021/01/01 08:20
upstream BUG: Bad page map (4) 39 203d 840d 0/22 auto-closed as invalid on 2022/04/02 04:25

Sample crash report:
swap_info_get: Bad swap file entry 444447ffffff
BUG: Bad page map in process syz-executor.4  pte:777777000000000 pmd:0086d067
addr:0000000020a10000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a10
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Not tainted 4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47ffffffff
BUG: Bad page map in process syz-executor.4  pte:7700000000000 pmd:0086d067
addr:0000000020a24000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a24
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3c44447ffffff
BUG: Bad page map in process syz-executor.4  pte:77777000000000 pmd:0086d067
addr:0000000020a25000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a25
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47ffffffff
BUG: Bad page map in process syz-executor.4  pte:7700000000000 pmd:0086d067
addr:0000000020a38000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a38
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 47ffc47fffff
BUG: Bad page map in process syz-executor.4  pte:770007700000000 pmd:0086d067
addr:0000000020a39000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a39
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47ffffffff
BUG: Bad page map in process syz-executor.4  pte:7700000000000 pmd:0086d067
addr:0000000020a4c000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a4c
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 4444447fffff
BUG: Bad page map in process syz-executor.4  pte:777777700000000 pmd:0086d067
addr:0000000020a4d000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a4d
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47ffffffff
BUG: Bad page map in process syz-executor.4  pte:7700000000000 pmd:0086d067
addr:0000000020a60000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a60
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3ffffc47fffff
BUG: Bad page map in process syz-executor.4  pte:7700000000 pmd:0086d067
addr:0000000020a61000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a61
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47ffffffff
BUG: Bad page map in process syz-executor.4  pte:7700000000000 pmd:0086d067
addr:0000000020a74000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a74
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3ffffc47fffff
BUG: Bad page map in process syz-executor.4  pte:7700000000 pmd:0086d067
addr:0000000020a75000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a75
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47ffffffff
BUG: Bad page map in process syz-executor.4  pte:7700000000000 pmd:0086d067
addr:0000000020a88000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a88
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 47ffc47fffff
BUG: Bad page map in process syz-executor.4  pte:770007700000000 pmd:0086d067
addr:0000000020a89000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a89
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47ffffffff
BUG: Bad page map in process syz-executor.4  pte:7700000000000 pmd:0086d067
addr:0000000020a9c000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a9c
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3c44447ffffff
BUG: Bad page map in process syz-executor.4  pte:77777000000000 pmd:0086d067
addr:0000000020a9d000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20a9d
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020b00000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b00
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020b14000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b14
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
ip_tables: iptables: counters copy to user failed while replacing table
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
ip_tables: iptables: counters copy to user failed while replacing table
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
ip_tables: iptables: counters copy to user failed while replacing table
ip_tables: iptables: counters copy to user failed while replacing table
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
ip_tables: iptables: counters copy to user failed while replacing table
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
ip_tables: iptables: counters copy to user failed while replacing table
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020b28000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b28
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3ffffffffc47f
BUG: Bad page map in process syz-executor.4  pte:00770000 pmd:0086d067
addr:0000000020b29000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b29
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020b3c000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b3c
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3ffffffffc447
BUG: Bad page map in process syz-executor.4  pte:00777000 pmd:0086d067
addr:0000000020b3d000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b3d
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020b50000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b50
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
BUG: Bad page map in process syz-executor.4  pte:00777700 pmd:0086d067
addr:0000000020b51000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b51
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 _vm_normal_page+0x134/0x3b0 mm/memory.c:891
 zap_pte_range mm/memory.c:1315 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0xc0f/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020b64000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b64
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
BUG: Bad page map in process syz-executor.4  pte:00770770 pmd:0086d067
addr:0000000020b65000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b65
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 _vm_normal_page+0x134/0x3b0 mm/memory.c:891
 zap_pte_range mm/memory.c:1315 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0xc0f/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020b78000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b78
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
BUG: Bad page map in process syz-executor.4  pte:00770077 pmd:0086d067
page:ffffea000001dc00 count:0 mapcount:-1 mapping:          (null) index:0x0
flags: 0x7ffe0000000014(referenced|dirty)
raw: 007ffe0000000014 0000000000000000 0000000000000000 00000000fffffffe
raw: ffffea000001dc20 ffffea000001dc20 0000000000000000 0000000000000000
page dumped because: bad pte
addr:0000000020b79000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b79
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1344 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x1810/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 1c004447fffffc47
BUG: Bad page map in process syz-executor.4  pte:7777700000077000 pmd:0086d067
addr:0000000020b8c000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b8c
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
BUG: Bad page map in process syz-executor.4  pte:07777777 pmd:0086d067
addr:0000000020b8d000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20b8d
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 _vm_normal_page+0x134/0x3b0 mm/memory.c:891
 zap_pte_range mm/memory.c:1315 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0xc0f/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020ba0000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20ba0
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3ffffffffc47f
BUG: Bad page map in process syz-executor.4  pte:00770000 pmd:0086d067
addr:0000000020ba1000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20ba1
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020bb4000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20bb4
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3ffffffffc47f
BUG: Bad page map in process syz-executor.4  pte:00770000 pmd:0086d067
addr:0000000020bb5000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20bb5
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020bc8000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20bc8
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3ffffffffc47f
BUG: Bad page map in process syz-executor.4  pte:00770000 pmd:0086d067
addr:0000000020bc9000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20bc9
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fc47fffffc47
BUG: Bad page map in process syz-executor.4  pte:7700000077000 pmd:0086d067
addr:0000000020bdc000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20bdc
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x3a0 kernel/fork.c:946
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x93c/0x2ae0 kernel/exit.c:845
 do_group_exit+0x100/0x2e0 kernel/exit.c:955
 get_signal+0x385/0x1c90 kernel/signal.c:2423
 do_signal+0x7c/0x15d0 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45c1d9
RSP: 002b:00007f356349dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000078c188 RCX: 000000000045c1d9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078c18c
RBP: 000000000078c180 R08: 000000000000000e R09: 0000000000000000
R10: 000000000000001c R11: 0000000000000246 R12: 000000000078c18c
R13: 00007ffd711ecb1f R14: 00007f356349e9c0 R15: 000000000078c18c
swap_info_get: Bad swap file entry 3fffffffc4447
BUG: Bad page map in process syz-executor.4  pte:07777000 pmd:0086d067
addr:0000000020bdd000 vm_flags:08100077 anon_vma:ffff888054fc3ec0 mapping:          (null) index:20bdd
file:          (null) fault:          (null) mmap:          (null) readpage:          (null)
CPU: 1 PID: 24287 Comm: syz-executor.4 Tainted: G    B           4.14.184-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x283 lib/dump_stack.c:58
 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:779
 zap_pte_range mm/memory.c:1389 [inline]
 zap_pmd_range mm/memory.c:1444 [inline]
 zap_pud_range mm/memory.c:1473 [inline]
 zap_p4d_range mm/memory.c:1494 [inline]
 unmap_page_range+0x15a3/0x1d80 mm/memory.c:1515
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1560
 unmap_vmas+0x9d/0x160 mm/memory.c:1590
 exit_mmap+0x271/0x4b0 mm/mmap.c:3056

Crashes (1):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci2-linux-4-14 2020/07/19 16:05 linux-4.14.y b850307b279c 9c812472 .config log report