swap_dup: Bad swap file entry 2003ffffffffffff swap_dup: Bad swap file entry 2003ffffffffffff swap_dup: Bad swap file entry 2003ffffffffffff swap_dup: Bad swap file entry 2003ffffffffffff swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:229d6e067 addr:0000000066257424 vm_flags:08100073 anon_vma:00000000a8983284 mapping: (null) index:7ffa42346 swap_dup: Bad swap file entry 2003ffffffffffff file: (null) fault: (null) mmap: (null) readpage: (null) CPU: 0 PID: 14105 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:22d02a067 addr:0000000018600c2b vm_flags:180400fb anon_vma: (null) mapping:00000000b5166841 index:86 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: Bad RIP value. RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: fffffffffffffff4 RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 CPU: 1 PID: 13638 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:22d02a067 addr:000000005edb1aca vm_flags:180400fb anon_vma: (null) mapping:00000000b5166841 index:fd file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 13638 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:22d02a067 addr:0000000039284a5e vm_flags:180400fb anon_vma: (null) mapping:00000000b5166841 index:174 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 13638 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:22d02a067 addr:00000000301f6a13 vm_flags:180400fb anon_vma: (null) mapping:00000000b5166841 index:1eb file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 13638 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 dup_mm kernel/fork.c:1301 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 Bluetooth: hci3: command 0x0407 tx timeout swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:0011c067 addr:0000000066257424 vm_flags:08100073 anon_vma:00000000eca5357a mapping: (null) index:7ffa42346 file: (null) fault: (null) mmap: (null) readpage: (null) CPU: 0 PID: 13578 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: Bad RIP value. RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: fffffffffffffff4 RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 BUG: Bad rss-counter state mm:00000000630558a1 idx:1 val:1 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:0011d067 addr:0000000018600c2b vm_flags:180400fb anon_vma: (null) mapping:00000000b5166841 index:86 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 13638 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: fffffffffffffff4 RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:0011d067 addr:000000005edb1aca vm_flags:180400fb anon_vma: (null) mapping:00000000b5166841 index:fd file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 13638 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: fffffffffffffff4 RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:0011d067 addr:0000000039284a5e vm_flags:180400fb anon_vma: (null) mapping:00000000b5166841 index:174 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 13638 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 BUG: Bad rss-counter state mm:00000000630558a1 idx:2 val:-1 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: fffffffffffffff4 RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.3 pte:8000000000000000 pmd:0011d067 addr:00000000301f6a13 vm_flags:180400fb anon_vma: (null) mapping:00000000b5166841 index:1eb file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 13638 Comm: syz-executor.3 Tainted: G B 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:785 zap_pte_range mm/memory.c:1397 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1cbb/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7ffa42236e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffa40bac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: fffffffffffffff4 RBX: 00007ffa42349f60 RCX: 00007ffa42236e99 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffa42290ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca8fdc0ef R14: 00007ffa40bac300 R15: 0000000000022000 BUG: Bad rss-counter state mm:0000000071db99df idx:0 val:4 BUG: Bad rss-counter state mm:0000000071db99df idx:2 val:-4 audit: type=1800 audit(1641814689.997:10282): pid=14373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14373 res=0 netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. IPVS: ftp: loaded support on port[0] = 21 nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. IPVS: ftp: loaded support on port[0] = 21 netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. IPVS: ftp: loaded support on port[0] = 21