swap_info_get: Bad swap file entry 1c004444447fffff BUG: Bad page map in process systemd-udevd pte:7777777700000000 pmd:00135067 addr:00000000255eea80 vm_flags:08000070 anon_vma: (null) mapping:0000000049310761 index:f1 file:libdl-2.24.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16918 Comm: systemd-udevd Not tainted 4.19.208-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 __do_sys_exit_group kernel/exit.c:978 [inline] __se_sys_exit_group kernel/exit.c:976 [inline] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:976 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f7416f0e618 Code: 00 00 be 3c 00 00 00 eb 19 66 0f 1f 84 00 00 00 00 00 48 89 d7 89 f0 0f 05 48 3d 00 f0 ff ff 77 21 f4 48 89 d7 44 89 c0 0f 05 <48> 3d 00 f0 ff ff 76 e0 f7 d8 64 41 89 01 eb d8 0f 1f 84 00 00 00 RSP: 002b:00007ffebd3fe768 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007ffebd3fe830 RCX: 00007f7416f0e618 RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 RBP: 00007ffebd3fe8e0 R08: 00000000000000e7 R09: fffffffffffffe50 R10: 000055ab5ae59c30 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000003 R15: 000000000000000e swap_info_get: Bad swap file entry 1c004444447fffff BUG: Bad page map in process systemd-udevd pte:7777777700000000 pmd:00135067 addr:000000005cb30632 vm_flags:08000070 anon_vma: (null) mapping:0000000049310761 index:191 file:libdl-2.24.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16918 Comm: systemd-udevd Tainted: G B 4.19.208-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 __do_sys_exit_group kernel/exit.c:978 [inline] __se_sys_exit_group kernel/exit.c:976 [inline] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:976 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f7416f0e618 Code: 00 00 be 3c 00 00 00 eb 19 66 0f 1f 84 00 00 00 00 00 48 89 d7 89 f0 0f 05 48 3d 00 f0 ff ff 77 21 f4 48 89 d7 44 89 c0 0f 05 <48> 3d 00 f0 ff ff 76 e0 f7 d8 64 41 89 01 eb d8 0f 1f 84 00 00 00 RSP: 002b:00007ffebd3fe768 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007ffebd3fe830 RCX: 00007f7416f0e618 RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 RBP: 00007ffebd3fe8e0 R08: 00000000000000e7 R09: fffffffffffffe50 R10: 000055ab5ae59c30 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000003 R15: 000000000000000e BUG: Bad rss-counter state mm:000000000f84dbf6 idx:2 val:-2 FAT-fs (loop1): Unrecognized mount option "nnonumtail=1" or missing value ptrace attach of "/root/syz-executor.2 exec"[17007] was attempted by "/root/syz-executor.2 exec"[17009] ptrace attach of "/root/syz-executor.0 exec"[17010] was attempted by "/root/syz-executor.0 exec"[17013] sctp: [Deprecated]: syz-executor.0 (pid 17053) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead VFS: could not find a valid V7 on loop1. VFS: could not find a valid V7 on loop1. x_tables: duplicate underflow at hook 2 IPVS: length: 176 != 8 x_tables: duplicate underflow at hook 2