__swap_info_get: Bad swap file entry 3ffc7ffffffff
BUG: Bad page map in process syz-executor.4 pte:700000000000 pmd:00102067
addr:00007f5daf668000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:1b4
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 0 PID: 19604 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 3fc447fffffff
BUG: Bad page map in process syz-executor.4 pte:7770000000000 pmd:00102067
addr:00007f5daf669000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:1b5
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:770077007700077 pmd:00102067
addr:00007f5daf66a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:1b6
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 3fc447fffffff
BUG: Bad page map in process syz-executor.4 pte:7770000000000 pmd:00102067
addr:00007f5daf6e0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:2c
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 3c47c47ffffff
BUG: Bad page map in process syz-executor.4 pte:77077000000000 pmd:00102067
addr:00007f5daf6e1000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:2d
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:770077007700077 pmd:00102067
addr:00007f5daf6e2000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:2e
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:77077007700077 pmd:00102067
addr:00007f5daf758000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:a4
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 47ffc47fffff
BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00102067
addr:00007f5daf759000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:a5
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:770077007700077 pmd:00102067
addr:00007f5daf75a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:a6
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:770007707700077 pmd:00102067
addr:00007f5daf7d0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:11c
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 47ffc47fffff
BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00102067
addr:00007f5daf7d1000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:11d
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:77770007700077 pmd:00102067
addr:00007f5daf7d2000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:11e
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:770007707700077 pmd:00103067
addr:00007f5daf848000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:194
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 4444447fffff
BUG: Bad page map in process syz-executor.4 pte:777777700000000 pmd:00103067
addr:00007f5daf849000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:195
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:7700007700077 pmd:00103067
addr:00007f5daf84a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:196
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:777777707700077 pmd:00103067
addr:00007f5daf8c0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:c
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 47ffc47fffff
BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00103067
addr:00007f5daf8c1000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:d
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:7700007700077 pmd:00103067
addr:00007f5daf8c2000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:e
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:770007707700077 pmd:00103067
addr:00007f5daf938000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:84
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 47ffc47fffff
BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00103067
addr:00007f5daf939000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:85
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:7700007700077 pmd:00103067
addr:00007f5daf93a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:86
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:770007707700077 pmd:00103067
addr:00007f5daf9b0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:fc
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 47ffc47fffff
BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00103067
addr:00007f5daf9b1000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:fd
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:7700007700077 pmd:00103067
addr:00007f5daf9b2000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:fe
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
vm_normal_page+0x10c/0x2a0 mm/memory.c:625
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
BUG: Bad page map in process syz-executor.4 pte:00777077 pmd:00109067
page:ffffea000001ddc0 refcount:0 mapcount:-1 mapping:0000000000000000 index:0x0 pfn:0x777
flags: 0x7ff0000000000a(referenced|dirty|node=0|zone=0|lastcpupid=0x7ff)
raw: 007ff0000000000a 0000000000000000 ffffea000001ddc8 0000000000000000
raw: 0000000000000000 0000000000000000 00000000fffffffe 0000000000000000
page dumped because: bad pte
page_owner tracks the page as freed
page last allocated via order 9, migratetype Movable, gfp_mask 0x13d20ca(GFP_TRANSHUGE_LIGHT|__GFP_NORETRY|__GFP_THISNODE), pid 18195, ts 1757140175950, free_ts 1760068569850
prep_new_page mm/page_alloc.c:2418 [inline]
get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4149
__alloc_pages+0x1b2/0x500 mm/page_alloc.c:5369
__alloc_pages_node include/linux/gfp.h:570 [inline]
alloc_pages_vma+0x6a7/0x7d0 mm/mempolicy.c:2133
do_huge_pmd_anonymous_page+0x439/0x2840 mm/huge_memory.c:777
create_huge_pmd mm/memory.c:4422 [inline]
__handle_mm_fault+0x2a2a/0x5120 mm/memory.c:4657
handle_mm_fault+0x1c8/0x790 mm/memory.c:4784
do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397
handle_page_fault arch/x86/mm/fault.c:1485 [inline]
exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1541
asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568
page last free stack trace:
reset_page_owner include/linux/page_owner.h:24 [inline]
free_pages_prepare mm/page_alloc.c:1338 [inline]
free_pcp_prepare+0x374/0x870 mm/page_alloc.c:1389
free_unref_page_prepare mm/page_alloc.c:3309 [inline]
free_unref_page+0x19/0x690 mm/page_alloc.c:3388
release_pages+0x825/0x1480 mm/swap.c:956
tlb_batch_pages_flush mm/mmu_gather.c:49 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:242 [inline]
tlb_flush_mmu+0xe9/0x6b0 mm/mmu_gather.c:249
zap_pte_range mm/memory.c:1418 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x1cac/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
addr:00007f5dafcf0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:3c
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1359 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x1fe1/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
page:ffffea000001ddc0 refcount:0 mapcount:-1 mapping:0000000000000000 index:0x0 pfn:0x777
flags: 0x7ff0000000000a(referenced|dirty|node=0|zone=0|lastcpupid=0x7ff)
raw: 007ff0000000000a 0000000000000000 ffffea000001ddc8 0000000000000000
raw: 0000000000000000 0000000000000000 00000000fffffffe 0000000000000000
page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0)
page_owner tracks the page as freed
page last allocated via order 9, migratetype Movable, gfp_mask 0x13d20ca(GFP_TRANSHUGE_LIGHT|__GFP_NORETRY|__GFP_THISNODE), pid 18195, ts 1757140175950, free_ts 1760068569850
prep_new_page mm/page_alloc.c:2418 [inline]
get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4149
__alloc_pages+0x1b2/0x500 mm/page_alloc.c:5369
__alloc_pages_node include/linux/gfp.h:570 [inline]
alloc_pages_vma+0x6a7/0x7d0 mm/mempolicy.c:2133
do_huge_pmd_anonymous_page+0x439/0x2840 mm/huge_memory.c:777
create_huge_pmd mm/memory.c:4422 [inline]
__handle_mm_fault+0x2a2a/0x5120 mm/memory.c:4657
handle_mm_fault+0x1c8/0x790 mm/memory.c:4784
do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397
handle_page_fault arch/x86/mm/fault.c:1485 [inline]
exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1541
asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568
page last free stack trace:
reset_page_owner include/linux/page_owner.h:24 [inline]
free_pages_prepare mm/page_alloc.c:1338 [inline]
free_pcp_prepare+0x374/0x870 mm/page_alloc.c:1389
free_unref_page_prepare mm/page_alloc.c:3309 [inline]
free_unref_page+0x19/0x690 mm/page_alloc.c:3388
release_pages+0x825/0x1480 mm/swap.c:956
tlb_batch_pages_flush mm/mmu_gather.c:49 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:242 [inline]
tlb_flush_mmu+0xe9/0x6b0 mm/mmu_gather.c:249
zap_pte_range mm/memory.c:1418 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x1cac/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
------------[ cut here ]------------
kernel BUG at include/linux/mm.h:737!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:put_page_testzero include/linux/mm.h:737 [inline]
RIP: 0010:put_page_testzero include/linux/mm.h:735 [inline]
RIP: 0010:release_pages+0x854/0x1480 mm/swap.c:948
Code: 00 00 00 e9 4d fb ff ff e8 d9 c8 d6 ff 4c 8d 75 ff e9 e2 f8 ff ff e8 cb c8 d6 ff 48 c7 c6 00 8b b5 89 4c 89 f7 e8 7c f7 09 00 <0f> 0b e8 b5 c8 d6 ff 48 c7 c6 00 8b b5 89 4c 89 f7 e8 66 f7 09 00
RSP: 0018:ffffc9000b2b7650 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff888082370180 RCX: 0000000000000000
RDX: ffff88807c78ba00 RSI: ffffffff81a0d0a4 RDI: 0000000000000003
RBP: ffffea000001ddc0 R08: 0000000000000024 R09: 00000000ffffffff
R10: ffffffff8902825d R11: 00000000ffffffff R12: ffffea000001ddf4
R13: 000000000000002e R14: ffffea000001ddc0 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2ffd2df000 CR3: 00000000225f3000 CR4: 00000000003506e0
Call Trace:
tlb_batch_pages_flush mm/mmu_gather.c:49 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:242 [inline]
tlb_flush_mmu+0xe9/0x6b0 mm/mmu_gather.c:249
zap_pte_range mm/memory.c:1418 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x1cac/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5db153cae9
Code: Unable to access opcode bytes at RIP 0x7f5db153cabf.
RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9
RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003
RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000
Modules linked in:
---[ end trace 3c977110bf8e7001 ]---
RIP: 0010:put_page_testzero include/linux/mm.h:737 [inline]
RIP: 0010:put_page_testzero include/linux/mm.h:735 [inline]
RIP: 0010:release_pages+0x854/0x1480 mm/swap.c:948
Code: 00 00 00 e9 4d fb ff ff e8 d9 c8 d6 ff 4c 8d 75 ff e9 e2 f8 ff ff e8 cb c8 d6 ff 48 c7 c6 00 8b b5 89 4c 89 f7 e8 7c f7 09 00 <0f> 0b e8 b5 c8 d6 ff 48 c7 c6 00 8b b5 89 4c 89 f7 e8 66 f7 09 00
RSP: 0018:ffffc9000b2b7650 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff888082370180 RCX: 0000000000000000
RDX: ffff88807c78ba00 RSI: ffffffff81a0d0a4 RDI: 0000000000000003
RBP: ffffea000001ddc0 R08: 0000000000000024 R09: 00000000ffffffff
R10: ffffffff8902825d R11: 00000000ffffffff R12: ffffea000001ddf4
R13: 000000000000002e R14: ffffea000001ddc0 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2ffd2df000 CR3: 00000000225f3000 CR4: 00000000003506e0