__swap_info_get: Bad swap file entry 3ffc7ffffffff BUG: Bad page map in process syz-executor.4 pte:700000000000 pmd:00102067 addr:00007f5daf668000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:1b4 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 0 PID: 19604 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 3fc447fffffff BUG: Bad page map in process syz-executor.4 pte:7770000000000 pmd:00102067 addr:00007f5daf669000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:1b5 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:770077007700077 pmd:00102067 addr:00007f5daf66a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:1b6 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 3fc447fffffff BUG: Bad page map in process syz-executor.4 pte:7770000000000 pmd:00102067 addr:00007f5daf6e0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:2c file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 3c47c47ffffff BUG: Bad page map in process syz-executor.4 pte:77077000000000 pmd:00102067 addr:00007f5daf6e1000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:2d file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:770077007700077 pmd:00102067 addr:00007f5daf6e2000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:2e file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:77077007700077 pmd:00102067 addr:00007f5daf758000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:a4 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 47ffc47fffff BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00102067 addr:00007f5daf759000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:a5 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:770077007700077 pmd:00102067 addr:00007f5daf75a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:a6 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:770007707700077 pmd:00102067 addr:00007f5daf7d0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:11c file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 47ffc47fffff BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00102067 addr:00007f5daf7d1000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:11d file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:77770007700077 pmd:00102067 addr:00007f5daf7d2000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:11e file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:770007707700077 pmd:00103067 addr:00007f5daf848000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:194 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 4444447fffff BUG: Bad page map in process syz-executor.4 pte:777777700000000 pmd:00103067 addr:00007f5daf849000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:195 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:7700007700077 pmd:00103067 addr:00007f5daf84a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:196 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:777777707700077 pmd:00103067 addr:00007f5daf8c0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:c file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 47ffc47fffff BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00103067 addr:00007f5daf8c1000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:d file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:7700007700077 pmd:00103067 addr:00007f5daf8c2000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:e file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:770007707700077 pmd:00103067 addr:00007f5daf938000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:84 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 47ffc47fffff BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00103067 addr:00007f5daf939000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:85 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:7700007700077 pmd:00103067 addr:00007f5daf93a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:86 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:770007707700077 pmd:00103067 addr:00007f5daf9b0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:fc file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 47ffc47fffff BUG: Bad page map in process syz-executor.4 pte:770007700000000 pmd:00103067 addr:00007f5daf9b1000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:fd file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:7700007700077 pmd:00103067 addr:00007f5daf9b2000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:fe file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 vm_normal_page+0x10c/0x2a0 mm/memory.c:625 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0xb0e/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 BUG: Bad page map in process syz-executor.4 pte:00777077 pmd:00109067 page:ffffea000001ddc0 refcount:0 mapcount:-1 mapping:0000000000000000 index:0x0 pfn:0x777 flags: 0x7ff0000000000a(referenced|dirty|node=0|zone=0|lastcpupid=0x7ff) raw: 007ff0000000000a 0000000000000000 ffffea000001ddc8 0000000000000000 raw: 0000000000000000 0000000000000000 00000000fffffffe 0000000000000000 page dumped because: bad pte page_owner tracks the page as freed page last allocated via order 9, migratetype Movable, gfp_mask 0x13d20ca(GFP_TRANSHUGE_LIGHT|__GFP_NORETRY|__GFP_THISNODE), pid 18195, ts 1757140175950, free_ts 1760068569850 prep_new_page mm/page_alloc.c:2418 [inline] get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4149 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5369 __alloc_pages_node include/linux/gfp.h:570 [inline] alloc_pages_vma+0x6a7/0x7d0 mm/mempolicy.c:2133 do_huge_pmd_anonymous_page+0x439/0x2840 mm/huge_memory.c:777 create_huge_pmd mm/memory.c:4422 [inline] __handle_mm_fault+0x2a2a/0x5120 mm/memory.c:4657 handle_mm_fault+0x1c8/0x790 mm/memory.c:4784 do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397 handle_page_fault arch/x86/mm/fault.c:1485 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1541 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1338 [inline] free_pcp_prepare+0x374/0x870 mm/page_alloc.c:1389 free_unref_page_prepare mm/page_alloc.c:3309 [inline] free_unref_page+0x19/0x690 mm/page_alloc.c:3388 release_pages+0x825/0x1480 mm/swap.c:956 tlb_batch_pages_flush mm/mmu_gather.c:49 [inline] tlb_flush_mmu_free mm/mmu_gather.c:242 [inline] tlb_flush_mmu+0xe9/0x6b0 mm/mmu_gather.c:249 zap_pte_range mm/memory.c:1418 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x1cac/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 addr:00007f5dafcf0000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8881458d0c48 index:3c file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1359 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x1fe1/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 page:ffffea000001ddc0 refcount:0 mapcount:-1 mapping:0000000000000000 index:0x0 pfn:0x777 flags: 0x7ff0000000000a(referenced|dirty|node=0|zone=0|lastcpupid=0x7ff) raw: 007ff0000000000a 0000000000000000 ffffea000001ddc8 0000000000000000 raw: 0000000000000000 0000000000000000 00000000fffffffe 0000000000000000 page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) page_owner tracks the page as freed page last allocated via order 9, migratetype Movable, gfp_mask 0x13d20ca(GFP_TRANSHUGE_LIGHT|__GFP_NORETRY|__GFP_THISNODE), pid 18195, ts 1757140175950, free_ts 1760068569850 prep_new_page mm/page_alloc.c:2418 [inline] get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4149 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5369 __alloc_pages_node include/linux/gfp.h:570 [inline] alloc_pages_vma+0x6a7/0x7d0 mm/mempolicy.c:2133 do_huge_pmd_anonymous_page+0x439/0x2840 mm/huge_memory.c:777 create_huge_pmd mm/memory.c:4422 [inline] __handle_mm_fault+0x2a2a/0x5120 mm/memory.c:4657 handle_mm_fault+0x1c8/0x790 mm/memory.c:4784 do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397 handle_page_fault arch/x86/mm/fault.c:1485 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1541 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1338 [inline] free_pcp_prepare+0x374/0x870 mm/page_alloc.c:1389 free_unref_page_prepare mm/page_alloc.c:3309 [inline] free_unref_page+0x19/0x690 mm/page_alloc.c:3388 release_pages+0x825/0x1480 mm/swap.c:956 tlb_batch_pages_flush mm/mmu_gather.c:49 [inline] tlb_flush_mmu_free mm/mmu_gather.c:242 [inline] tlb_flush_mmu+0xe9/0x6b0 mm/mmu_gather.c:249 zap_pte_range mm/memory.c:1418 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x1cac/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 ------------[ cut here ]------------ kernel BUG at include/linux/mm.h:737! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 19604 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:put_page_testzero include/linux/mm.h:737 [inline] RIP: 0010:put_page_testzero include/linux/mm.h:735 [inline] RIP: 0010:release_pages+0x854/0x1480 mm/swap.c:948 Code: 00 00 00 e9 4d fb ff ff e8 d9 c8 d6 ff 4c 8d 75 ff e9 e2 f8 ff ff e8 cb c8 d6 ff 48 c7 c6 00 8b b5 89 4c 89 f7 e8 7c f7 09 00 <0f> 0b e8 b5 c8 d6 ff 48 c7 c6 00 8b b5 89 4c 89 f7 e8 66 f7 09 00 RSP: 0018:ffffc9000b2b7650 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff888082370180 RCX: 0000000000000000 RDX: ffff88807c78ba00 RSI: ffffffff81a0d0a4 RDI: 0000000000000003 RBP: ffffea000001ddc0 R08: 0000000000000024 R09: 00000000ffffffff R10: ffffffff8902825d R11: 00000000ffffffff R12: ffffea000001ddf4 R13: 000000000000002e R14: ffffea000001ddc0 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2ffd2df000 CR3: 00000000225f3000 CR4: 00000000003506e0 Call Trace: tlb_batch_pages_flush mm/mmu_gather.c:49 [inline] tlb_flush_mmu_free mm/mmu_gather.c:242 [inline] tlb_flush_mmu+0xe9/0x6b0 mm/mmu_gather.c:249 zap_pte_range mm/memory.c:1418 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x1cac/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5db153cae9 Code: Unable to access opcode bytes at RIP 0x7f5db153cabf. RSP: 002b:00007f5daeab2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f5db164ff60 RCX: 00007f5db153cae9 RDX: 0000000020000040 RSI: 0000000000004601 RDI: 0000000000000003 RBP: 00007f5db1596f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5db1b83b2f R14: 00007f5daeab2300 R15: 0000000000022000 Modules linked in: ---[ end trace 3c977110bf8e7001 ]--- RIP: 0010:put_page_testzero include/linux/mm.h:737 [inline] RIP: 0010:put_page_testzero include/linux/mm.h:735 [inline] RIP: 0010:release_pages+0x854/0x1480 mm/swap.c:948 Code: 00 00 00 e9 4d fb ff ff e8 d9 c8 d6 ff 4c 8d 75 ff e9 e2 f8 ff ff e8 cb c8 d6 ff 48 c7 c6 00 8b b5 89 4c 89 f7 e8 7c f7 09 00 <0f> 0b e8 b5 c8 d6 ff 48 c7 c6 00 8b b5 89 4c 89 f7 e8 66 f7 09 00 RSP: 0018:ffffc9000b2b7650 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff888082370180 RCX: 0000000000000000 RDX: ffff88807c78ba00 RSI: ffffffff81a0d0a4 RDI: 0000000000000003 RBP: ffffea000001ddc0 R08: 0000000000000024 R09: 00000000ffffffff R10: ffffffff8902825d R11: 00000000ffffffff R12: ffffea000001ddf4 R13: 000000000000002e R14: ffffea000001ddc0 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2ffd2df000 CR3: 00000000225f3000 CR4: 00000000003506e0