syzkaller login: [ 300.922998][ T1858] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 300.999279][ T1858] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 353.353079][ T1858] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. Warning: Permanently added '[localhost]:45580' (ECDSA) to the list of known hosts. 1970/01/01 00:06:50 fuzzer started 1970/01/01 00:07:04 dialing manager at localhost:35225 [ 431.374313][ T2050] cgroup: Unknown subsys name 'net' [ 432.554159][ T2050] cgroup: Unknown subsys name 'rlimit' 1970/01/01 00:07:12 syscalls: 2918 1970/01/01 00:07:12 code coverage: enabled 1970/01/01 00:07:12 comparison tracing: enabled 1970/01/01 00:07:12 extra coverage: enabled 1970/01/01 00:07:12 delay kcov mmap: mmap returned an invalid pointer 1970/01/01 00:07:12 setuid sandbox: enabled 1970/01/01 00:07:12 namespace sandbox: enabled 1970/01/01 00:07:12 Android sandbox: /sys/fs/selinux/policy does not exist 1970/01/01 00:07:12 fault injection: enabled 1970/01/01 00:07:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:07:12 net packet injection: enabled 1970/01/01 00:07:12 net device setup: enabled 1970/01/01 00:07:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:07:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:07:12 NIC VF setup: PCI device 0000:00:11.0 is not available 1970/01/01 00:07:12 USB emulation: enabled 1970/01/01 00:07:12 hci packet injection: /dev/vhci does not exist 1970/01/01 00:07:12 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:07:12 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:07:12 fetching corpus: 0, signal 0/2000 (executing program) 1970/01/01 00:07:17 fetching corpus: 50, signal 35582/38376 (executing program) 1970/01/01 00:07:22 fetching corpus: 99, signal 48461/51953 (executing program) 1970/01/01 00:07:26 fetching corpus: 149, signal 56716/60747 (executing program) 1970/01/01 00:07:30 fetching corpus: 199, signal 63085/67570 (executing program) 1970/01/01 00:07:33 fetching corpus: 247, signal 69011/73765 (executing program) 1970/01/01 00:07:36 fetching corpus: 297, signal 75355/80188 (executing program) 1970/01/01 00:07:39 fetching corpus: 347, signal 81237/85945 (executing program) 1970/01/01 00:07:42 fetching corpus: 397, signal 84256/89038 (executing program) 1970/01/01 00:07:46 fetching corpus: 445, signal 89461/93848 (executing program) 1970/01/01 00:07:48 fetching corpus: 495, signal 91956/96298 (executing program) 1970/01/01 00:07:51 fetching corpus: 543, signal 94919/99053 (executing program) 1970/01/01 00:07:54 fetching corpus: 593, signal 97835/101663 (executing program) 1970/01/01 00:07:59 fetching corpus: 642, signal 101579/104787 (executing program) 1970/01/01 00:08:05 fetching corpus: 692, signal 103957/106748 (executing program) 1970/01/01 00:08:10 fetching corpus: 740, signal 106181/108561 (executing program) 1970/01/01 00:08:15 fetching corpus: 790, signal 108513/110389 (executing program) 1970/01/01 00:08:18 fetching corpus: 840, signal 110469/111839 (executing program) 1970/01/01 00:08:20 fetching corpus: 887, signal 112149/113032 (executing program) 1970/01/01 00:08:20 fetching corpus: 891, signal 112347/113241 (executing program) 1970/01/01 00:08:20 fetching corpus: 891, signal 112347/113282 (executing program) 1970/01/01 00:08:21 fetching corpus: 891, signal 112347/113335 (executing program) 1970/01/01 00:08:21 fetching corpus: 891, signal 112347/113389 (executing program) 1970/01/01 00:08:21 fetching corpus: 891, signal 112347/113423 (executing program) 1970/01/01 00:08:21 fetching corpus: 891, signal 112347/113468 (executing program) 1970/01/01 00:08:21 fetching corpus: 891, signal 112347/113514 (executing program) 1970/01/01 00:08:21 fetching corpus: 891, signal 112347/113577 (executing program) 1970/01/01 00:08:22 fetching corpus: 891, signal 112347/113632 (executing program) 1970/01/01 00:08:22 fetching corpus: 891, signal 112347/113686 (executing program) 1970/01/01 00:08:22 fetching corpus: 891, signal 112351/113738 (executing program) 1970/01/01 00:08:23 fetching corpus: 891, signal 112351/113808 (executing program) 1970/01/01 00:08:23 fetching corpus: 891, signal 112351/113855 (executing program) 1970/01/01 00:08:23 fetching corpus: 891, signal 112351/113896 (executing program) 1970/01/01 00:08:24 fetching corpus: 891, signal 112351/113954 (executing program) 1970/01/01 00:08:24 fetching corpus: 891, signal 112351/114012 (executing program) 1970/01/01 00:08:24 fetching corpus: 891, signal 112351/114045 (executing program) 1970/01/01 00:08:24 fetching corpus: 891, signal 112351/114086 (executing program) 1970/01/01 00:08:24 fetching corpus: 891, signal 112351/114131 (executing program) 1970/01/01 00:08:25 fetching corpus: 891, signal 112351/114170 (executing program) 1970/01/01 00:08:25 fetching corpus: 891, signal 112351/114214 (executing program) 1970/01/01 00:08:25 fetching corpus: 891, signal 112351/114254 (executing program) 1970/01/01 00:08:25 fetching corpus: 891, signal 112351/114298 (executing program) 1970/01/01 00:08:26 fetching corpus: 891, signal 112351/114341 (executing program) 1970/01/01 00:08:26 fetching corpus: 891, signal 112351/114393 (executing program) 1970/01/01 00:08:26 fetching corpus: 891, signal 112479/114481 (executing program) 1970/01/01 00:08:26 fetching corpus: 891, signal 112479/114542 (executing program) 1970/01/01 00:08:26 fetching corpus: 891, signal 112479/114587 (executing program) 1970/01/01 00:08:27 fetching corpus: 891, signal 112479/114620 (executing program) 1970/01/01 00:08:27 fetching corpus: 891, signal 112479/114662 (executing program) 1970/01/01 00:08:27 fetching corpus: 891, signal 112479/114703 (executing program) 1970/01/01 00:08:27 fetching corpus: 891, signal 112479/114741 (executing program) 1970/01/01 00:08:27 fetching corpus: 891, signal 112479/114781 (executing program) 1970/01/01 00:08:27 fetching corpus: 891, signal 112479/114819 (executing program) 1970/01/01 00:08:27 fetching corpus: 891, signal 112479/114859 (executing program) 1970/01/01 00:08:28 fetching corpus: 891, signal 112479/114913 (executing program) 1970/01/01 00:08:28 fetching corpus: 891, signal 112479/114962 (executing program) 1970/01/01 00:08:28 fetching corpus: 891, signal 112479/115013 (executing program) 1970/01/01 00:08:28 fetching corpus: 891, signal 112479/115045 (executing program) 1970/01/01 00:08:28 fetching corpus: 891, signal 112479/115045 (executing program) 1970/01/01 00:10:40 starting 2 fuzzer processes 00:10:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x26, 0x0, 0xffffffffffffffe0) 00:10:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 672.644011][ T2056] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 673.338536][ T2056] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 673.479706][ T2058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 674.000908][ T2058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 686.478628][ T2056] device hsr_slave_0 entered promiscuous mode [ 686.590592][ T2056] device hsr_slave_1 entered promiscuous mode [ 691.309516][ T2058] device hsr_slave_0 entered promiscuous mode [ 691.332984][ T2058] device hsr_slave_1 entered promiscuous mode [ 691.379886][ T2058] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 691.407376][ T2058] Cannot create hsr debugfs directory [ 702.483770][ T2056] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 703.081779][ T2056] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 703.582350][ T2056] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 704.200256][ T2056] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 705.671864][ T2058] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 706.081650][ T2058] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 706.682033][ T2058] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 706.979117][ T2058] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 725.222507][ T2056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 725.987926][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 726.183861][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 728.738321][ T2058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 729.301159][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 729.371640][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 735.962849][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 736.019474][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 736.327907][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 736.343044][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 736.633963][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 737.087878][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 738.104006][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 738.172267][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 738.533451][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 738.614098][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 738.990164][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 739.359910][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 739.450565][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 739.850876][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 739.908742][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 740.280573][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 740.702016][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 742.478036][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 742.562925][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 742.611710][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 742.647362][ T2052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 742.947306][ T2058] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 747.946973][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 747.952180][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 749.807422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 749.812610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 773.422417][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 773.483169][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 776.291853][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 776.363258][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 785.763163][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 785.859316][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 786.068654][ T2056] device veth0_vlan entered promiscuous mode [ 786.237883][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 786.300091][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 787.006454][ T2056] device veth1_vlan entered promiscuous mode [ 787.997534][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 788.033964][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 788.224188][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 788.268371][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 788.461716][ T2058] device veth0_vlan entered promiscuous mode [ 789.163221][ T2058] device veth1_vlan entered promiscuous mode [ 789.496797][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 789.539191][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 789.781683][ T2056] device veth0_macvtap entered promiscuous mode [ 790.093476][ T2056] device veth1_macvtap entered promiscuous mode [ 790.270069][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 790.330893][ T2111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 791.390372][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 791.428069][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 791.447644][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 791.481195][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 791.706581][ T2058] device veth0_macvtap entered promiscuous mode [ 791.864309][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 791.893229][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 791.921093][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 792.188241][ T2058] device veth1_macvtap entered promiscuous mode [ 792.308852][ T2056] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 792.311689][ T2056] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 792.312981][ T2056] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 792.314110][ T2056] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 793.973081][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 794.011263][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 794.821194][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 794.853627][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 795.516898][ T2058] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 795.518893][ T2058] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 795.520580][ T2058] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 795.698138][ T2058] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 800.780897][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 800.784283][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 800.790367][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 800.793795][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Not tainted 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 800.796665][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 800.798184][ T2058] Call Trace: [ 800.799247][ T2058] [] dump_backtrace+0x2e/0x3c [ 800.800800][ T2058] [] show_stack+0x34/0x40 [ 800.802123][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 800.803557][ T2058] [] dump_stack+0x1c/0x24 [ 800.805395][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 800.806963][ T2058] [] vm_normal_page+0x20c/0x22a [ 800.808306][ T2058] [] copy_page_range+0x828/0x236c [ 800.809760][ T2058] [] dup_mm+0xb5c/0xe10 [ 800.811087][ T2058] [] copy_process+0x25da/0x3c34 [ 800.812499][ T2058] [] kernel_clone+0xee/0x920 [ 800.813896][ T2058] [] __do_sys_clone+0xf2/0x12e [ 800.815959][ T2058] [] sys_clone+0x32/0x44 [ 800.817554][ T2058] [] ret_from_syscall+0x0/0x2 [ 800.822194][ T2058] Disabling lock debugging due to kernel taint 00:13:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x26, 0x0, 0xffffffffffffffe0) [ 801.848331][ T2751] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:28bc3001 [ 801.849785][ T2751] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 801.850705][ T2751] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 801.851859][ T2751] CPU: 0 PID: 2751 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 801.853304][ T2751] Hardware name: riscv-virtio,qemu (DT) [ 801.857055][ T2751] Call Trace: [ 801.857928][ T2751] [] dump_backtrace+0x2e/0x3c [ 801.858842][ T2751] [] show_stack+0x34/0x40 [ 801.859549][ T2751] [] dump_stack_lvl+0xe4/0x150 [ 801.861043][ T2751] [] dump_stack+0x1c/0x24 [ 801.861976][ T2751] [] print_bad_pte+0x3d4/0x4a0 [ 801.862885][ T2751] [] vm_normal_page+0x20c/0x22a [ 801.864354][ T2751] [] unmap_page_range+0x6d0/0x13f0 [ 801.865450][ T2751] [] unmap_vmas+0x1d0/0x366 [ 801.866287][ T2751] [] exit_mmap+0x15c/0x412 [ 801.867104][ T2751] [] mmput+0xee/0x2c2 [ 801.867879][ T2751] [] do_exit+0x6f2/0x18fc [ 801.868686][ T2751] [] do_group_exit+0x90/0x17e [ 801.869656][ T2751] [] __wake_up_parent+0x0/0x4a [ 801.870545][ T2751] [] ret_from_syscall+0x0/0x2 00:13:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 802.399554][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 802.401132][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 802.402412][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 802.404260][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 802.406634][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 802.407347][ T2058] Call Trace: [ 802.407881][ T2058] [] dump_backtrace+0x2e/0x3c [ 802.408942][ T2058] [] show_stack+0x34/0x40 [ 802.409908][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 802.411039][ T2058] [] dump_stack+0x1c/0x24 [ 802.412099][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 802.413263][ T2058] [] vm_normal_page+0x20c/0x22a [ 802.414272][ T2058] [] copy_page_range+0x828/0x236c [ 802.415707][ T2058] [] dup_mm+0xb5c/0xe10 [ 802.416718][ T2058] [] copy_process+0x25da/0x3c34 [ 802.417800][ T2058] [] kernel_clone+0xee/0x920 [ 802.418793][ T2058] [] __do_sys_clone+0xf2/0x12e [ 802.419824][ T2058] [] sys_clone+0x32/0x44 [ 802.420894][ T2058] [] ret_from_syscall+0x0/0x2 00:13:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x26, 0x0, 0xffffffffffffffe0) [ 802.998106][ T2756] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:22e33401 [ 802.999322][ T2756] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 803.000190][ T2756] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 803.001483][ T2756] CPU: 1 PID: 2756 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 803.002542][ T2756] Hardware name: riscv-virtio,qemu (DT) [ 803.003029][ T2756] Call Trace: [ 803.003493][ T2756] [] dump_backtrace+0x2e/0x3c [ 803.004246][ T2756] [] show_stack+0x34/0x40 [ 803.005463][ T2756] [] dump_stack_lvl+0xe4/0x150 [ 803.006279][ T2756] [] dump_stack+0x1c/0x24 [ 803.007257][ T2756] [] print_bad_pte+0x3d4/0x4a0 [ 803.008453][ T2756] [] vm_normal_page+0x20c/0x22a [ 803.009823][ T2756] [] unmap_page_range+0x6d0/0x13f0 [ 803.010920][ T2756] [] unmap_vmas+0x1d0/0x366 [ 803.011959][ T2756] [] exit_mmap+0x15c/0x412 [ 803.013836][ T2756] [] mmput+0xee/0x2c2 [ 803.014750][ T2756] [] do_exit+0x6f2/0x18fc [ 803.015879][ T2756] [] do_group_exit+0x90/0x17e [ 803.016716][ T2756] [] __wake_up_parent+0x0/0x4a [ 803.018090][ T2756] [] ret_from_syscall+0x0/0x2 00:13:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 803.620925][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 803.624146][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 803.626996][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 803.628492][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 803.630359][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 803.631571][ T2058] Call Trace: [ 803.632133][ T2058] [] dump_backtrace+0x2e/0x3c [ 803.633287][ T2058] [] show_stack+0x34/0x40 [ 803.634170][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 803.635841][ T2058] [] dump_stack+0x1c/0x24 [ 803.636888][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 803.637968][ T2058] [] vm_normal_page+0x20c/0x22a [ 803.639399][ T2058] [] copy_page_range+0x828/0x236c [ 803.640347][ T2058] [] dup_mm+0xb5c/0xe10 [ 803.641327][ T2058] [] copy_process+0x25da/0x3c34 [ 803.642396][ T2058] [] kernel_clone+0xee/0x920 [ 803.643446][ T2058] [] __do_sys_clone+0xf2/0x12e [ 803.645311][ T2058] [] sys_clone+0x32/0x44 [ 803.646467][ T2058] [] ret_from_syscall+0x0/0x2 00:13:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x26, 0x0, 0xffffffffffffffe0) [ 804.253643][ T2760] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:23b3b001 [ 804.256152][ T2760] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 804.257897][ T2760] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 804.259977][ T2760] CPU: 1 PID: 2760 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 804.262061][ T2760] Hardware name: riscv-virtio,qemu (DT) [ 804.262745][ T2760] Call Trace: [ 804.263584][ T2760] [] dump_backtrace+0x2e/0x3c [ 804.265071][ T2760] [] show_stack+0x34/0x40 [ 804.266040][ T2760] [] dump_stack_lvl+0xe4/0x150 [ 804.267863][ T2760] [] dump_stack+0x1c/0x24 [ 804.269111][ T2760] [] print_bad_pte+0x3d4/0x4a0 [ 804.270175][ T2760] [] vm_normal_page+0x20c/0x22a [ 804.271105][ T2760] [] unmap_page_range+0x6d0/0x13f0 [ 804.272032][ T2760] [] unmap_vmas+0x1d0/0x366 [ 804.273563][ T2760] [] exit_mmap+0x15c/0x412 [ 804.274925][ T2760] [] mmput+0xee/0x2c2 [ 804.276153][ T2760] [] do_exit+0x6f2/0x18fc [ 804.278928][ T2760] [] do_group_exit+0x90/0x17e [ 804.280018][ T2760] [] __wake_up_parent+0x0/0x4a [ 804.281055][ T2760] [] ret_from_syscall+0x0/0x2 00:13:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 805.119465][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 805.121442][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 805.123882][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 805.127685][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 805.129140][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 805.130321][ T2058] Call Trace: [ 805.130970][ T2058] [] dump_backtrace+0x2e/0x3c [ 805.132604][ T2058] [] show_stack+0x34/0x40 [ 805.134201][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 805.135482][ T2058] [] dump_stack+0x1c/0x24 [ 805.136627][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 805.137806][ T2058] [] vm_normal_page+0x20c/0x22a [ 805.138923][ T2058] [] copy_page_range+0x828/0x236c [ 805.140019][ T2058] [] dup_mm+0xb5c/0xe10 [ 805.141104][ T2058] [] copy_process+0x25da/0x3c34 [ 805.142331][ T2058] [] kernel_clone+0xee/0x920 [ 805.143585][ T2058] [] __do_sys_clone+0xf2/0x12e [ 805.145040][ T2058] [] sys_clone+0x32/0x44 [ 805.146158][ T2058] [] ret_from_syscall+0x0/0x2 00:13:24 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 805.913317][ T2765] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:23b3a401 [ 805.917237][ T2765] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 805.918543][ T2765] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 805.919871][ T2765] CPU: 0 PID: 2765 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 805.921983][ T2765] Hardware name: riscv-virtio,qemu (DT) [ 805.922604][ T2765] Call Trace: [ 805.923048][ T2765] [] dump_backtrace+0x2e/0x3c [ 805.923891][ T2765] [] show_stack+0x34/0x40 [ 805.925114][ T2765] [] dump_stack_lvl+0xe4/0x150 [ 805.926300][ T2765] [] dump_stack+0x1c/0x24 [ 805.927930][ T2765] [] print_bad_pte+0x3d4/0x4a0 [ 805.928919][ T2765] [] vm_normal_page+0x20c/0x22a [ 805.930431][ T2765] [] unmap_page_range+0x6d0/0x13f0 [ 805.931330][ T2765] [] unmap_vmas+0x1d0/0x366 [ 805.932281][ T2765] [] exit_mmap+0x15c/0x412 [ 805.933690][ T2765] [] mmput+0xee/0x2c2 [ 805.934776][ T2765] [] do_exit+0x6f2/0x18fc [ 805.935939][ T2765] [] do_group_exit+0x90/0x17e [ 805.936886][ T2765] [] get_signal+0x3b8/0x1754 [ 805.939049][ T2765] [] do_notify_resume+0x11a/0xa56 [ 805.939943][ T2765] [] ret_from_exception+0x0/0x10 00:13:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x26, 0x0, 0xffffffffffffffe0) 00:13:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 807.246399][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 807.247939][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 807.249504][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 807.251530][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 807.253114][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 807.253904][ T2058] Call Trace: [ 807.254552][ T2058] [] dump_backtrace+0x2e/0x3c [ 807.255775][ T2058] [] show_stack+0x34/0x40 [ 807.256907][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 807.258099][ T2058] [] dump_stack+0x1c/0x24 [ 807.259222][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 807.260358][ T2058] [] vm_normal_page+0x20c/0x22a [ 807.261488][ T2058] [] copy_page_range+0x828/0x236c [ 807.262575][ T2058] [] dup_mm+0xb5c/0xe10 [ 807.263661][ T2058] [] copy_process+0x25da/0x3c34 [ 807.265128][ T2058] [] kernel_clone+0xee/0x920 [ 807.266305][ T2058] [] __do_sys_clone+0xf2/0x12e [ 807.267505][ T2058] [] sys_clone+0x32/0x44 [ 807.268724][ T2058] [] ret_from_syscall+0x0/0x2 [ 808.349366][ T2768] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:22ea0401 [ 808.350793][ T2768] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 808.352193][ T2768] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 808.353620][ T2768] CPU: 1 PID: 2768 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 808.355256][ T2768] Hardware name: riscv-virtio,qemu (DT) [ 808.355984][ T2768] Call Trace: [ 808.356703][ T2768] [] dump_backtrace+0x2e/0x3c [ 808.357877][ T2768] [] show_stack+0x34/0x40 [ 808.358905][ T2768] [] dump_stack_lvl+0xe4/0x150 [ 808.360023][ T2768] [] dump_stack+0x1c/0x24 [ 808.361182][ T2768] [] print_bad_pte+0x3d4/0x4a0 [ 808.362401][ T2768] [] vm_normal_page+0x20c/0x22a [ 808.363460][ T2768] [] unmap_page_range+0x6d0/0x13f0 [ 808.365001][ T2768] [] unmap_vmas+0x1d0/0x366 [ 808.366418][ T2768] [] exit_mmap+0x15c/0x412 [ 808.367653][ T2768] [] mmput+0xee/0x2c2 [ 808.369468][ T2768] [] do_exit+0x6f2/0x18fc [ 808.371714][ T2768] [] do_group_exit+0x90/0x17e [ 808.373874][ T2768] [] __wake_up_parent+0x0/0x4a [ 808.375232][ T2768] [] ret_from_syscall+0x0/0x2 00:13:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x26, 0x0, 0xffffffffffffffe0) 00:13:28 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 809.437147][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 809.439744][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 809.443690][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 809.446848][ T2058] CPU: 0 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 809.448611][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 809.449920][ T2058] Call Trace: [ 809.450623][ T2058] [] dump_backtrace+0x2e/0x3c [ 809.451726][ T2058] [] show_stack+0x34/0x40 [ 809.452747][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 809.453861][ T2058] [] dump_stack+0x1c/0x24 [ 809.456085][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 809.457235][ T2058] [] vm_normal_page+0x20c/0x22a [ 809.458708][ T2058] [] copy_page_range+0x828/0x236c [ 809.459765][ T2058] [] dup_mm+0xb5c/0xe10 [ 809.460797][ T2058] [] copy_process+0x25da/0x3c34 [ 809.461953][ T2058] [] kernel_clone+0xee/0x920 [ 809.463084][ T2058] [] __do_sys_clone+0xf2/0x12e [ 809.464217][ T2058] [] sys_clone+0x32/0x44 [ 809.465810][ T2058] [] ret_from_syscall+0x0/0x2 [ 810.251009][ T2772] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:22fa5001 [ 810.252998][ T2772] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 810.254400][ T2772] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 810.257515][ T2772] CPU: 1 PID: 2772 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 810.259560][ T2772] Hardware name: riscv-virtio,qemu (DT) [ 810.261371][ T2772] Call Trace: [ 810.262641][ T2772] [] dump_backtrace+0x2e/0x3c [ 810.264243][ T2772] [] show_stack+0x34/0x40 [ 810.265489][ T2772] [] dump_stack_lvl+0xe4/0x150 [ 810.267826][ T2772] [] dump_stack+0x1c/0x24 [ 810.270489][ T2772] [] print_bad_pte+0x3d4/0x4a0 [ 810.271705][ T2772] [] vm_normal_page+0x20c/0x22a [ 810.273385][ T2772] [] unmap_page_range+0x6d0/0x13f0 [ 810.274458][ T2772] [] unmap_vmas+0x1d0/0x366 [ 810.275439][ T2772] [] exit_mmap+0x15c/0x412 [ 810.276531][ T2772] [] mmput+0xee/0x2c2 [ 810.277608][ T2772] [] do_exit+0x6f2/0x18fc [ 810.278666][ T2772] [] do_group_exit+0x90/0x17e [ 810.279777][ T2772] [] __wake_up_parent+0x0/0x4a [ 810.280938][ T2772] [] ret_from_syscall+0x0/0x2 00:13:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x26, 0x0, 0xffffffffffffffe0) [ 811.245902][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 811.247390][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 811.248606][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 811.249905][ T2058] CPU: 0 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 811.251184][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 811.251935][ T2058] Call Trace: [ 811.252560][ T2058] [] dump_backtrace+0x2e/0x3c [ 811.253587][ T2058] [] show_stack+0x34/0x40 [ 811.254699][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 811.263509][ T2058] [] dump_stack+0x1c/0x24 [ 811.265572][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 811.266768][ T2058] [] vm_normal_page+0x20c/0x22a [ 811.267706][ T2058] [] copy_page_range+0x828/0x236c [ 811.268732][ T2058] [] dup_mm+0xb5c/0xe10 [ 811.269683][ T2058] [] copy_process+0x25da/0x3c34 [ 811.270614][ T2058] [] kernel_clone+0xee/0x920 [ 811.271749][ T2058] [] __do_sys_clone+0xf2/0x12e [ 811.272703][ T2058] [] sys_clone+0x32/0x44 [ 811.273773][ T2058] [] ret_from_syscall+0x0/0x2 00:13:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) [ 811.917146][ T2778] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:2863c801 [ 811.918732][ T2778] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 811.920281][ T2778] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 811.922308][ T2778] CPU: 1 PID: 2778 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 811.924305][ T2778] Hardware name: riscv-virtio,qemu (DT) [ 811.928890][ T2778] Call Trace: [ 811.929558][ T2778] [] dump_backtrace+0x2e/0x3c [ 811.930704][ T2778] [] show_stack+0x34/0x40 [ 811.931725][ T2778] [] dump_stack_lvl+0xe4/0x150 [ 811.932846][ T2778] [] dump_stack+0x1c/0x24 [ 811.933863][ T2778] [] print_bad_pte+0x3d4/0x4a0 [ 811.935234][ T2778] [] vm_normal_page+0x20c/0x22a [ 811.936870][ T2778] [] unmap_page_range+0x6d0/0x13f0 [ 811.937899][ T2778] [] unmap_vmas+0x1d0/0x366 [ 811.939146][ T2778] [] exit_mmap+0x15c/0x412 [ 811.940935][ T2778] [] mmput+0xee/0x2c2 [ 811.942002][ T2778] [] do_exit+0x6f2/0x18fc [ 811.943149][ T2778] [] do_group_exit+0x90/0x17e [ 811.944846][ T2778] [] get_signal+0x3b8/0x1754 [ 811.946155][ T2778] [] do_notify_resume+0x11a/0xa56 [ 811.947432][ T2778] [] ret_from_exception+0x0/0x10 00:13:31 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000001540)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@hopopts={{0x18}}, @rthdr={{0x0, 0x29, 0x39, {0x0, 0x0, 0x0, 0x0, 0x0, [@mcast1, @private2, @loopback, @mcast2, @mcast1, @mcast2, @ipv4={'\x00', '\xff\xff', @loopback}]}}}], 0x30}}], 0x2, 0x0) [ 812.719866][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 812.722944][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 812.726023][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 812.727598][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 812.729071][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 812.729887][ T2058] Call Trace: [ 812.730566][ T2058] [] dump_backtrace+0x2e/0x3c [ 812.731726][ T2058] [] show_stack+0x34/0x40 [ 812.732790][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 812.733961][ T2058] [] dump_stack+0x1c/0x24 [ 812.735685][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 812.737016][ T2058] [] vm_normal_page+0x20c/0x22a [ 812.738193][ T2058] [] copy_page_range+0x828/0x236c [ 812.739466][ T2058] [] dup_mm+0xb5c/0xe10 [ 812.740622][ T2058] [] copy_process+0x25da/0x3c34 [ 812.741867][ T2058] [] kernel_clone+0xee/0x920 [ 812.743074][ T2058] [] __do_sys_clone+0xf2/0x12e [ 812.744299][ T2058] [] sys_clone+0x32/0x44 [ 812.745866][ T2058] [] ret_from_syscall+0x0/0x2 00:13:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) [ 813.687517][ T2783] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:23a9dc01 [ 813.689581][ T2783] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 813.691791][ T2783] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 813.693796][ T2783] CPU: 0 PID: 2783 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 813.696355][ T2783] Hardware name: riscv-virtio,qemu (DT) [ 813.697727][ T2783] Call Trace: [ 813.698447][ T2783] [] dump_backtrace+0x2e/0x3c [ 813.699737][ T2783] [] show_stack+0x34/0x40 [ 813.701302][ T2783] [] dump_stack_lvl+0xe4/0x150 [ 813.702612][ T2783] [] dump_stack+0x1c/0x24 [ 813.703791][ T2783] [] print_bad_pte+0x3d4/0x4a0 [ 813.705485][ T2783] [] vm_normal_page+0x20c/0x22a [ 813.706771][ T2783] [] unmap_page_range+0x6d0/0x13f0 [ 813.707936][ T2783] [] unmap_vmas+0x1d0/0x366 [ 813.708982][ T2783] [] exit_mmap+0x15c/0x412 [ 813.710612][ T2783] [] mmput+0xee/0x2c2 [ 813.711728][ T2783] [] do_exit+0x6f2/0x18fc [ 813.712841][ T2783] [] do_group_exit+0x90/0x17e [ 813.713915][ T2783] [] get_signal+0x3b8/0x1754 [ 813.715409][ T2783] [] do_notify_resume+0x11a/0xa56 [ 813.717256][ T2783] [] ret_from_exception+0x0/0x10 00:13:32 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000001540)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@hopopts={{0x18}}, @rthdr={{0x0, 0x29, 0x39, {0x0, 0x0, 0x0, 0x0, 0x0, [@mcast1, @private2, @loopback, @mcast2, @mcast1, @mcast2, @ipv4={'\x00', '\xff\xff', @loopback}]}}}], 0x30}}], 0x2, 0x0) [ 814.438643][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 814.440898][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 814.442498][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 814.444501][ T2058] CPU: 0 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 814.446052][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 814.446833][ T2058] Call Trace: [ 814.447717][ T2058] [] dump_backtrace+0x2e/0x3c [ 814.449065][ T2058] [] show_stack+0x34/0x40 [ 814.450523][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 814.451798][ T2058] [] dump_stack+0x1c/0x24 [ 814.453330][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 814.454768][ T2058] [] vm_normal_page+0x20c/0x22a [ 814.456316][ T2058] [] copy_page_range+0x828/0x236c [ 814.457480][ T2058] [] dup_mm+0xb5c/0xe10 [ 814.458606][ T2058] [] copy_process+0x25da/0x3c34 [ 814.459860][ T2058] [] kernel_clone+0xee/0x920 [ 814.461514][ T2058] [] __do_sys_clone+0xf2/0x12e [ 814.462763][ T2058] [] sys_clone+0x32/0x44 [ 814.464007][ T2058] [] ret_from_syscall+0x0/0x2 00:13:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) [ 815.031051][ T2786] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:28a2e801 [ 815.033347][ T2786] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 815.036895][ T2786] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 815.038533][ T2786] CPU: 1 PID: 2786 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 815.040067][ T2786] Hardware name: riscv-virtio,qemu (DT) [ 815.040921][ T2786] Call Trace: [ 815.041543][ T2786] [] dump_backtrace+0x2e/0x3c [ 815.042734][ T2786] [] show_stack+0x34/0x40 [ 815.043782][ T2786] [] dump_stack_lvl+0xe4/0x150 [ 815.045550][ T2786] [] dump_stack+0x1c/0x24 [ 815.046699][ T2786] [] print_bad_pte+0x3d4/0x4a0 [ 815.047672][ T2786] [] vm_normal_page+0x20c/0x22a [ 815.048770][ T2786] [] unmap_page_range+0x6d0/0x13f0 [ 815.049709][ T2786] [] unmap_vmas+0x1d0/0x366 [ 815.050780][ T2786] [] exit_mmap+0x15c/0x412 [ 815.051810][ T2786] [] mmput+0xee/0x2c2 [ 815.052881][ T2786] [] do_exit+0x6f2/0x18fc [ 815.053890][ T2786] [] do_group_exit+0x90/0x17e [ 815.055477][ T2786] [] __wake_up_parent+0x0/0x4a [ 815.056663][ T2786] [] ret_from_syscall+0x0/0x2 00:13:33 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000001540)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@hopopts={{0x18}}, @rthdr={{0x0, 0x29, 0x39, {0x0, 0x0, 0x0, 0x0, 0x0, [@mcast1, @private2, @loopback, @mcast2, @mcast1, @mcast2, @ipv4={'\x00', '\xff\xff', @loopback}]}}}], 0x30}}], 0x2, 0x0) [ 815.689854][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 815.692758][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 815.694137][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 815.696529][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 815.697569][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 815.698085][ T2058] Call Trace: [ 815.698508][ T2058] [] dump_backtrace+0x2e/0x3c [ 815.699266][ T2058] [] show_stack+0x34/0x40 [ 815.699935][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 815.700810][ T2058] [] dump_stack+0x1c/0x24 [ 815.701582][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 815.702432][ T2058] [] vm_normal_page+0x20c/0x22a [ 815.703192][ T2058] [] copy_page_range+0x828/0x236c [ 815.703925][ T2058] [] dup_mm+0xb5c/0xe10 [ 815.705169][ T2058] [] copy_process+0x25da/0x3c34 [ 815.705985][ T2058] [] kernel_clone+0xee/0x920 [ 815.706825][ T2058] [] __do_sys_clone+0xf2/0x12e [ 815.707649][ T2058] [] sys_clone+0x32/0x44 [ 815.708825][ T2058] [] ret_from_syscall+0x0/0x2 00:13:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) [ 816.413727][ T2790] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:22ff8001 [ 816.416620][ T2790] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 816.418089][ T2790] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 816.419515][ T2790] CPU: 1 PID: 2790 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 816.421489][ T2790] Hardware name: riscv-virtio,qemu (DT) [ 816.422346][ T2790] Call Trace: [ 816.422942][ T2790] [] dump_backtrace+0x2e/0x3c [ 816.424693][ T2790] [] show_stack+0x34/0x40 [ 816.427447][ T2790] [] dump_stack_lvl+0xe4/0x150 [ 816.430440][ T2790] [] dump_stack+0x1c/0x24 [ 816.431870][ T2790] [] print_bad_pte+0x3d4/0x4a0 [ 816.433170][ T2790] [] vm_normal_page+0x20c/0x22a [ 816.434307][ T2790] [] unmap_page_range+0x6d0/0x13f0 [ 816.436537][ T2790] [] unmap_vmas+0x1d0/0x366 [ 816.438442][ T2790] [] exit_mmap+0x15c/0x412 [ 816.440354][ T2790] [] mmput+0xee/0x2c2 [ 816.441729][ T2790] [] do_exit+0x6f2/0x18fc [ 816.443101][ T2790] [] do_group_exit+0x90/0x17e [ 816.444317][ T2790] [] __wake_up_parent+0x0/0x4a [ 816.446175][ T2790] [] ret_from_syscall+0x0/0x2 00:13:35 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000001540)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@hopopts={{0x18}}, @rthdr={{0x0, 0x29, 0x39, {0x0, 0x0, 0x0, 0x0, 0x0, [@mcast1, @private2, @loopback, @mcast2, @mcast1, @mcast2, @ipv4={'\x00', '\xff\xff', @loopback}]}}}], 0x30}}], 0x2, 0x0) 00:13:35 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000001540)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@hopopts={{0x18}}, @rthdr={{0x0, 0x29, 0x39, {0x0, 0x0, 0x0, 0x0, 0x0, [@mcast1, @private2, @loopback, @mcast2, @mcast1, @mcast2, @ipv4={'\x00', '\xff\xff', @loopback}]}}}], 0x30}}], 0x2, 0x0) [ 817.223307][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 817.227393][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 817.228948][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 817.230548][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 817.232111][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 817.232881][ T2058] Call Trace: [ 817.233465][ T2058] [] dump_backtrace+0x2e/0x3c [ 817.235369][ T2058] [] show_stack+0x34/0x40 [ 817.236501][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 817.237738][ T2058] [] dump_stack+0x1c/0x24 [ 817.238841][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 817.240005][ T2058] [] vm_normal_page+0x20c/0x22a [ 817.241060][ T2058] [] copy_page_range+0x828/0x236c [ 817.242138][ T2058] [] dup_mm+0xb5c/0xe10 [ 817.243195][ T2058] [] copy_process+0x25da/0x3c34 [ 817.244264][ T2058] [] kernel_clone+0xee/0x920 [ 817.246007][ T2058] [] __do_sys_clone+0xf2/0x12e [ 817.247143][ T2058] [] sys_clone+0x32/0x44 [ 817.248215][ T2058] [] ret_from_syscall+0x0/0x2 [ 817.717323][ T2794] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:224f9c01 [ 817.721504][ T2794] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 817.723014][ T2794] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 817.725755][ T2794] CPU: 0 PID: 2794 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 817.727447][ T2794] Hardware name: riscv-virtio,qemu (DT) [ 817.728768][ T2794] Call Trace: [ 817.729676][ T2794] [] dump_backtrace+0x2e/0x3c [ 817.730997][ T2794] [] show_stack+0x34/0x40 [ 817.732638][ T2794] [] dump_stack_lvl+0xe4/0x150 [ 817.733827][ T2794] [] dump_stack+0x1c/0x24 [ 817.735593][ T2794] [] print_bad_pte+0x3d4/0x4a0 [ 817.737450][ T2794] [] vm_normal_page+0x20c/0x22a [ 817.739198][ T2794] [] unmap_page_range+0x6d0/0x13f0 [ 817.740539][ T2794] [] unmap_vmas+0x1d0/0x366 [ 817.741884][ T2794] [] exit_mmap+0x15c/0x412 [ 817.743093][ T2794] [] mmput+0xee/0x2c2 [ 817.744676][ T2794] [] do_exit+0x6f2/0x18fc [ 817.746308][ T2794] [] do_group_exit+0x90/0x17e [ 817.747487][ T2794] [] __wake_up_parent+0x0/0x4a [ 817.748592][ T2794] [] ret_from_syscall+0x0/0x2 00:13:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) [ 818.872114][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 818.873261][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 818.874168][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 818.876023][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 818.876984][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 818.877488][ T2058] Call Trace: [ 818.877934][ T2058] [] dump_backtrace+0x2e/0x3c [ 818.878745][ T2058] [] show_stack+0x34/0x40 [ 818.879591][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 818.880669][ T2058] [] dump_stack+0x1c/0x24 [ 818.881715][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 818.882869][ T2058] [] vm_normal_page+0x20c/0x22a [ 818.883864][ T2058] [] copy_page_range+0x828/0x236c [ 818.885530][ T2058] [] dup_mm+0xb5c/0xe10 [ 818.886606][ T2058] [] copy_process+0x25da/0x3c34 [ 818.887705][ T2058] [] kernel_clone+0xee/0x920 [ 818.888834][ T2058] [] __do_sys_clone+0xf2/0x12e [ 818.889934][ T2058] [] sys_clone+0x32/0x44 [ 818.891023][ T2058] [] ret_from_syscall+0x0/0x2 00:13:37 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000001540)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@hopopts={{0x18}}, @rthdr={{0x0, 0x29, 0x39, {0x0, 0x0, 0x0, 0x0, 0x0, [@mcast1, @private2, @loopback, @mcast2, @mcast1, @mcast2, @ipv4={'\x00', '\xff\xff', @loopback}]}}}], 0x30}}], 0x2, 0x0) [ 819.821592][ T2798] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:23124001 [ 819.822897][ T2798] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 819.823759][ T2798] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 819.825520][ T2798] CPU: 1 PID: 2798 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 819.826492][ T2798] Hardware name: riscv-virtio,qemu (DT) [ 819.826988][ T2798] Call Trace: [ 819.827622][ T2798] [] dump_backtrace+0x2e/0x3c [ 819.828485][ T2798] [] show_stack+0x34/0x40 [ 819.830222][ T2798] [] dump_stack_lvl+0xe4/0x150 [ 819.831414][ T2798] [] dump_stack+0x1c/0x24 [ 819.833189][ T2798] [] print_bad_pte+0x3d4/0x4a0 [ 819.834298][ T2798] [] vm_normal_page+0x20c/0x22a [ 819.836075][ T2798] [] unmap_page_range+0x6d0/0x13f0 [ 819.837204][ T2798] [] unmap_vmas+0x1d0/0x366 [ 819.838967][ T2798] [] exit_mmap+0x15c/0x412 [ 819.840087][ T2798] [] mmput+0xee/0x2c2 [ 819.841717][ T2798] [] do_exit+0x6f2/0x18fc [ 819.842843][ T2798] [] do_group_exit+0x90/0x17e [ 819.844471][ T2798] [] __wake_up_parent+0x0/0x4a [ 819.845664][ T2798] [] ret_from_syscall+0x0/0x2 00:13:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) 00:13:38 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000001540)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@hopopts={{0x18}}, @rthdr={{0x0, 0x29, 0x39, {0x0, 0x0, 0x0, 0x0, 0x0, [@mcast1, @private2, @loopback, @mcast2, @mcast1, @mcast2, @ipv4={'\x00', '\xff\xff', @loopback}]}}}], 0x30}}], 0x2, 0x0) [ 820.506752][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 820.508142][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 820.509447][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 820.510745][ T2058] CPU: 0 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 820.512094][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 820.512832][ T2058] Call Trace: [ 820.513408][ T2058] [] dump_backtrace+0x2e/0x3c [ 820.514578][ T2058] [] show_stack+0x34/0x40 [ 820.515513][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 820.517305][ T2058] [] dump_stack+0x1c/0x24 [ 820.519558][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 820.520746][ T2058] [] vm_normal_page+0x20c/0x22a [ 820.521772][ T2058] [] copy_page_range+0x828/0x236c [ 820.522794][ T2058] [] dup_mm+0xb5c/0xe10 [ 820.523826][ T2058] [] copy_process+0x25da/0x3c34 [ 820.525378][ T2058] [] kernel_clone+0xee/0x920 [ 820.528072][ T2058] [] __do_sys_clone+0xf2/0x12e [ 820.529264][ T2058] [] sys_clone+0x32/0x44 [ 820.530329][ T2058] [] ret_from_syscall+0x0/0x2 [ 821.303217][ T2807] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:2282d801 [ 821.305588][ T2807] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 821.306884][ T2807] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 821.308175][ T2807] CPU: 1 PID: 2807 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 821.309499][ T2807] Hardware name: riscv-virtio,qemu (DT) [ 821.310171][ T2807] Call Trace: [ 821.310727][ T2807] [] dump_backtrace+0x2e/0x3c [ 821.311377][ T2807] [] show_stack+0x34/0x40 [ 821.312686][ T2807] [] dump_stack_lvl+0xe4/0x150 [ 821.313753][ T2807] [] dump_stack+0x1c/0x24 [ 821.315354][ T2807] [] print_bad_pte+0x3d4/0x4a0 [ 821.316577][ T2807] [] vm_normal_page+0x20c/0x22a [ 821.317508][ T2807] [] unmap_page_range+0x6d0/0x13f0 [ 821.319153][ T2807] [] unmap_vmas+0x1d0/0x366 [ 821.320234][ T2807] [] exit_mmap+0x15c/0x412 [ 821.321311][ T2807] [] mmput+0xee/0x2c2 [ 821.322705][ T2807] [] do_exit+0x6f2/0x18fc [ 821.323701][ T2807] [] do_group_exit+0x90/0x17e [ 821.325081][ T2807] [] get_signal+0x3b8/0x1754 [ 821.326253][ T2807] [] do_notify_resume+0x11a/0xa56 [ 821.327269][ T2807] [] ret_from_exception+0x0/0x10 00:13:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) syncfs(r0) 00:13:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) [ 822.191087][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 822.197189][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 822.199394][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 822.201038][ T2058] CPU: 0 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 822.202507][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 822.203887][ T2058] Call Trace: [ 822.204656][ T2058] [] dump_backtrace+0x2e/0x3c [ 822.205822][ T2058] [] show_stack+0x34/0x40 [ 822.206937][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 822.208993][ T2058] [] dump_stack+0x1c/0x24 [ 822.210500][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 822.211651][ T2058] [] vm_normal_page+0x20c/0x22a [ 822.212738][ T2058] [] copy_page_range+0x828/0x236c [ 822.213744][ T2058] [] dup_mm+0xb5c/0xe10 [ 822.215697][ T2058] [] copy_process+0x25da/0x3c34 [ 822.216920][ T2058] [] kernel_clone+0xee/0x920 [ 822.218240][ T2058] [] __do_sys_clone+0xf2/0x12e [ 822.219785][ T2058] [] sys_clone+0x32/0x44 [ 822.221037][ T2058] [] ret_from_syscall+0x0/0x2 [ 823.024317][ T2811] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:239e9c01 [ 823.026473][ T2811] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 823.028145][ T2811] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 823.029570][ T2811] CPU: 0 PID: 2811 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 823.031222][ T2811] Hardware name: riscv-virtio,qemu (DT) [ 823.032028][ T2811] Call Trace: [ 823.032731][ T2811] [] dump_backtrace+0x2e/0x3c [ 823.034295][ T2811] [] show_stack+0x34/0x40 [ 823.035805][ T2811] [] dump_stack_lvl+0xe4/0x150 [ 823.037036][ T2811] [] dump_stack+0x1c/0x24 [ 823.038087][ T2811] [] print_bad_pte+0x3d4/0x4a0 [ 823.039434][ T2811] [] vm_normal_page+0x20c/0x22a [ 823.040526][ T2811] [] unmap_page_range+0x6d0/0x13f0 [ 823.041589][ T2811] [] unmap_vmas+0x1d0/0x366 [ 823.042537][ T2811] [] exit_mmap+0x15c/0x412 [ 823.043604][ T2811] [] mmput+0xee/0x2c2 [ 823.044842][ T2811] [] do_exit+0x6f2/0x18fc [ 823.046341][ T2811] [] do_group_exit+0x90/0x17e [ 823.047649][ T2811] [] get_signal+0x3b8/0x1754 [ 823.049303][ T2811] [] do_notify_resume+0x11a/0xa56 [ 823.050410][ T2811] [] ret_from_exception+0x0/0x10 00:13:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) syncfs(r0) 00:13:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) syncfs(r0) [ 823.884175][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 823.886755][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 823.888183][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 823.889592][ T2058] CPU: 0 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 823.890996][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 823.891750][ T2058] Call Trace: [ 823.892380][ T2058] [] dump_backtrace+0x2e/0x3c [ 823.893543][ T2058] [] show_stack+0x34/0x40 [ 823.894618][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 823.895916][ T2058] [] dump_stack+0x1c/0x24 [ 823.897232][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 823.898585][ T2058] [] vm_normal_page+0x20c/0x22a [ 823.900518][ T2058] [] copy_page_range+0x828/0x236c [ 823.901655][ T2058] [] dup_mm+0xb5c/0xe10 [ 823.902799][ T2058] [] copy_process+0x25da/0x3c34 [ 823.904573][ T2058] [] kernel_clone+0xee/0x920 [ 823.905785][ T2058] [] __do_sys_clone+0xf2/0x12e [ 823.907176][ T2058] [] sys_clone+0x32/0x44 [ 823.908786][ T2058] [] ret_from_syscall+0x0/0x2 [ 824.642644][ T2814] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:223ebc01 [ 824.645435][ T2814] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 824.647996][ T2814] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 824.649435][ T2814] CPU: 0 PID: 2814 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 824.650769][ T2814] Hardware name: riscv-virtio,qemu (DT) [ 824.651449][ T2814] Call Trace: [ 824.652207][ T2814] [] dump_backtrace+0x2e/0x3c [ 824.653690][ T2814] [] show_stack+0x34/0x40 [ 824.654960][ T2814] [] dump_stack_lvl+0xe4/0x150 [ 824.656111][ T2814] [] dump_stack+0x1c/0x24 [ 824.657155][ T2814] [] print_bad_pte+0x3d4/0x4a0 [ 824.658321][ T2814] [] vm_normal_page+0x20c/0x22a [ 824.659392][ T2814] [] unmap_page_range+0x6d0/0x13f0 [ 824.661017][ T2814] [] unmap_vmas+0x1d0/0x366 [ 824.662169][ T2814] [] exit_mmap+0x15c/0x412 [ 824.663729][ T2814] [] mmput+0xee/0x2c2 [ 824.665217][ T2814] [] do_exit+0x6f2/0x18fc [ 824.666253][ T2814] [] do_group_exit+0x90/0x17e [ 824.667283][ T2814] [] get_signal+0x3b8/0x1754 [ 824.668266][ T2814] [] do_notify_resume+0x11a/0xa56 [ 824.669876][ T2814] [] ret_from_exception+0x0/0x10 00:13:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) syncfs(r0) 00:13:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) syncfs(r0) [ 825.296825][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 825.298304][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 825.299587][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 825.300898][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 825.302238][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 825.302999][ T2058] Call Trace: [ 825.303658][ T2058] [] dump_backtrace+0x2e/0x3c [ 825.305527][ T2058] [] show_stack+0x34/0x40 [ 825.306609][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 825.307817][ T2058] [] dump_stack+0x1c/0x24 [ 825.308988][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 825.310056][ T2058] [] vm_normal_page+0x20c/0x22a [ 825.311037][ T2058] [] copy_page_range+0x828/0x236c [ 825.312033][ T2058] [] dup_mm+0xb5c/0xe10 [ 825.313048][ T2058] [] copy_process+0x25da/0x3c34 [ 825.314160][ T2058] [] kernel_clone+0xee/0x920 [ 825.316052][ T2058] [] __do_sys_clone+0xf2/0x12e [ 825.317191][ T2058] [] sys_clone+0x32/0x44 [ 825.318308][ T2058] [] ret_from_syscall+0x0/0x2 00:13:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) syncfs(r0) [ 826.323408][ T2817] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:21f77c01 [ 826.327778][ T2817] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 826.329118][ T2817] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 826.330437][ T2817] CPU: 1 PID: 2817 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 826.331697][ T2817] Hardware name: riscv-virtio,qemu (DT) [ 826.332449][ T2817] Call Trace: [ 826.333023][ T2817] [] dump_backtrace+0x2e/0x3c [ 826.334097][ T2817] [] show_stack+0x34/0x40 [ 826.335808][ T2817] [] dump_stack_lvl+0xe4/0x150 [ 826.336971][ T2817] [] dump_stack+0x1c/0x24 [ 826.338018][ T2817] [] print_bad_pte+0x3d4/0x4a0 [ 826.339111][ T2817] [] vm_normal_page+0x20c/0x22a [ 826.340181][ T2817] [] unmap_page_range+0x6d0/0x13f0 [ 826.341283][ T2817] [] unmap_vmas+0x1d0/0x366 [ 826.342238][ T2817] [] exit_mmap+0x15c/0x412 [ 826.343222][ T2817] [] mmput+0xee/0x2c2 [ 826.344116][ T2817] [] do_exit+0x6f2/0x18fc [ 826.345742][ T2817] [] do_group_exit+0x90/0x17e [ 826.347323][ T2817] [] __wake_up_parent+0x0/0x4a [ 826.348324][ T2817] [] ret_from_syscall+0x0/0x2 00:13:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) syncfs(r0) [ 826.940625][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 826.942102][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 826.943329][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 826.945284][ T2058] CPU: 1 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 826.946588][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 826.947679][ T2058] Call Trace: [ 826.948232][ T2058] [] dump_backtrace+0x2e/0x3c [ 826.949341][ T2058] [] show_stack+0x34/0x40 [ 826.950720][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 826.951820][ T2058] [] dump_stack+0x1c/0x24 [ 826.953086][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 826.954146][ T2058] [] vm_normal_page+0x20c/0x22a [ 826.955734][ T2058] [] copy_page_range+0x828/0x236c [ 826.956830][ T2058] [] dup_mm+0xb5c/0xe10 [ 826.957793][ T2058] [] copy_process+0x25da/0x3c34 [ 826.958855][ T2058] [] kernel_clone+0xee/0x920 [ 826.960128][ T2058] [] __do_sys_clone+0xf2/0x12e [ 826.961204][ T2058] [] sys_clone+0x32/0x44 [ 826.962227][ T2058] [] ret_from_syscall+0x0/0x2 [ 827.602385][ T2823] BUG: Bad page map in process syz-executor.1 pte:ffffffff80111024 pmd:2396b801 [ 827.603830][ T2823] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 827.606661][ T2823] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 827.607806][ T2823] CPU: 1 PID: 2823 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 827.609484][ T2823] Hardware name: riscv-virtio,qemu (DT) [ 827.610756][ T2823] Call Trace: [ 827.611260][ T2823] [] dump_backtrace+0x2e/0x3c [ 827.611996][ T2823] [] show_stack+0x34/0x40 [ 827.612960][ T2823] [] dump_stack_lvl+0xe4/0x150 [ 827.614037][ T2823] [] dump_stack+0x1c/0x24 [ 827.615670][ T2823] [] print_bad_pte+0x3d4/0x4a0 [ 827.617496][ T2823] [] vm_normal_page+0x20c/0x22a [ 827.618299][ T2823] [] unmap_page_range+0x6d0/0x13f0 [ 827.619226][ T2823] [] unmap_vmas+0x1d0/0x366 [ 827.619950][ T2823] [] exit_mmap+0x15c/0x412 [ 827.620803][ T2823] [] mmput+0xee/0x2c2 [ 827.621535][ T2823] [] do_exit+0x6f2/0x18fc [ 827.622295][ T2823] [] do_group_exit+0x90/0x17e [ 827.623048][ T2823] [] get_signal+0x3b8/0x1754 [ 827.623780][ T2823] [] do_notify_resume+0x11a/0xa56 [ 827.624619][ T2823] [] ret_from_exception+0x0/0x10 00:13:47 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x7, 0x0, "4690d74804ec8210e3f348945ddc7dfaecbe66cdbfb72235350aeb00aa5ffd2eaaf4059fe1d1a3a015d76a151db14a35e8f33971cbbf1fd5218392d57c826f"}, 0x60) 00:13:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x40806685, &(0x7f00000000c0)=@v1={0x0, @adiantum, 0x0, @desc3}) [ 829.773510][ T2058] BUG: Bad page map in process syz-executor.1 pte:ffffffff801110e4 pmd:28627c01 [ 829.776777][ T2058] addr:00007fffa75ff000 vm_flags:100400fb anon_vma:0000000000000000 mapping:ffffaf800ab62a68 index:186 [ 829.777665][ T2058] file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 [ 829.778576][ T2058] CPU: 0 PID: 2058 Comm: syz-executor.1 Tainted: G B 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 829.779531][ T2058] Hardware name: riscv-virtio,qemu (DT) [ 829.780003][ T2058] Call Trace: [ 829.780474][ T2058] [] dump_backtrace+0x2e/0x3c [ 829.781219][ T2058] [] show_stack+0x34/0x40 [ 829.781854][ T2058] [] dump_stack_lvl+0xe4/0x150 [ 829.782596][ T2058] [] dump_stack+0x1c/0x24 [ 829.783391][ T2058] [] print_bad_pte+0x3d4/0x4a0 [ 829.784289][ T2058] [] vm_normal_page+0x20c/0x22a [ 829.785356][ T2058] [] copy_page_range+0x828/0x236c [ 829.786130][ T2058] [] dup_mm+0xb5c/0xe10 [ 829.787010][ T2058] [] copy_process+0x25da/0x3c34 [ 829.787784][ T2058] [] kernel_clone+0xee/0x920 [ 829.788568][ T2058] [] __do_sys_clone+0xf2/0x12e [ 829.789393][ T2058] [] sys_clone+0x32/0x44 [ 829.790109][ T2058] [] ret_from_syscall+0x0/0x2 00:13:49 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x7, 0x0, "4690d74804ec8210e3f348945ddc7dfaecbe66cdbfb72235350aeb00aa5ffd2eaaf4059fe1d1a3a015d76a151db14a35e8f33971cbbf1fd5218392d57c826f"}, 0x60) VM DIAGNOSIS: 09:17:32 Registers: info registers vcpu 0 pc ffffffff8010beec mhartid 0000000000000000 mstatus 00000000000001a0 mip 00000000000000a0 mie 000000000000020a mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff800055d4 mepc ffffffff80c386c2 sepc ffffffff80121626 mcause 8000000000000007 scause 8000000000000005 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra ffffffff8010bede x2/sp ffffaf80216a2a80 x3/gp ffffffff85863ac0 x4/tp ffffaf800e656100 x5/t0 0000000000046000 x6/t1 fffff5ef04530028 x7/t2 0000000000000000 x8/s0 ffffaf80216a2b80 x9/s1 ffffaf80216a2b00 x10/a0 ffffaf800e656b1c x11/a1 0000000000000007 x12/a2 1ffff5f001ccad63 x13/a3 ffffffff8010bede x14/a4 0000000000000000 x15/a5 0000000000000000 x16/a6 0000000000f00000 x17/a7 ffffaf8022980147 x18/s2 0000000000001000 x19/s3 ffffaf805a9f4c98 x20/s4 ffffaf800e657100 x21/s5 ffffffff8586fd20 x22/s6 ffffffff8343c840 x23/s7 0000000000000120 x24/s8 ffffffff86c1a620 x25/s9 ffffffff85889780 x26/s10 1ffff5f0042d4554 x27/s11 ffffffff8465b2d0 x28/t3 fffffffff3f3f300 x29/t4 fffff5ef04530028 x30/t5 fffff5ef04530029 x31/t6 ffffffff86bda98f f0/ft0 0000000000000000 f1/ft1 0000000000000000 f2/ft2 0000000000000000 f3/ft3 0000000000000000 f4/ft4 0000000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000 info registers vcpu 1 pc ffffffff8010b22c mhartid 0000000000000001 mstatus 00000000000001a0 mip 00000000000000a0 mie 000000000000020a mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff800055d4 mepc ffffffff803dbbf2 sepc ffffffff803dbbf2 mcause 8000000000000007 scause 8000000000000005 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra ffffffff831a18d8 x2/sp ffffaf800ca831f0 x3/gp ffffffff85863ac0 x4/tp ffffaf800e6548c0 x5/t0 0000000000046000 x6/t1 37824f74c75aee00 x7/t2 0000000064fb914f x8/s0 ffffaf800ca83200 x9/s1 0000000000001000 x10/a0 0000000000000120 x11/a1 ffffffffffffffff x12/a2 1ffff5f001cca919 x13/a3 ffffffff80146d84 x14/a4 0000000000010004 x15/a5 0000000000000000 x16/a6 0000000000f00000 x17/a7 ffffffff80b09d26 x18/s2 ffffaf800ca83320 x19/s3 ffffffff84b73ec0 x20/s4 0000000000000000 x21/s5 ffffffff8343c840 x22/s6 ffffffffffffffff x23/s7 ffffaf805a9cb5e8 x24/s8 ffffffff86c1a620 x25/s9 1ffff5f001950654 x26/s10 ffffaf805a9cb418 x27/s11 ffffffff8016f4de x28/t3 fffffffff3f3f300 x29/t4 ffffffff80112282 x30/t5 1ffff5f0019505d0 x31/t6 0000000000000004 f0/ft0 0000000000000000 f1/ft1 0000000000000000 f2/ft2 0000000000000000 f3/ft3 0000000000000000 f4/ft4 0000000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000