swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00102067 addr:00000000dadbdd4b vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:157 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 8692 Comm: syz-executor.1 Not tainted 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00102067 addr:00000000aadc3daa vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:1ac file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00102067 addr:000000006faad664 vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:1 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 0 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: Bad RIP value. RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00102067 addr:0000000022c6a362 vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:56 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 0 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: Bad RIP value. RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00102067 addr:0000000073fbadd1 vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:ab file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 0 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: Bad RIP value. RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00103067 addr:00000000ca7fda0b vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:100 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 0 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00103067 addr:0000000038ccc736 vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:155 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 0 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00103067 addr:000000006902513d vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:1aa file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 0 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00103067 addr:000000005682d351 vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:1ff file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 0 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. audit: type=1804 audit(1594065220.445:342): pid=8703 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16851 res=1 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. audit: type=1800 audit(1594065220.535:343): pid=8704 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16712 res=0 audit: type=1800 audit(1594065220.725:344): pid=8719 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16818 res=0 swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00103067 addr:0000000014045523 vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:54 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c swap_info_get: Bad swap file entry 2003ffffffffffff BUG: Bad page map in process syz-executor.1 pte:8000000000000000 pmd:00103067 addr:000000006186ad27 vm_flags:180400fb anon_vma: (null) mapping:0000000093dde798 index:a9 file:kcov fault: (null) mmap:kcov_mmap readpage: (null) CPU: 1 PID: 8692 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_bad_pte.cold+0x1c5/0x222 mm/memory.c:773 zap_pte_range mm/memory.c:1385 [inline] zap_pmd_range mm/memory.c:1440 [inline] zap_pud_range mm/memory.c:1469 [inline] zap_p4d_range mm/memory.c:1490 [inline] unmap_page_range+0x1b1b/0x2a70 mm/memory.c:1511 unmap_single_vma+0x198/0x300 mm/memory.c:1556 unmap_vmas+0xa9/0x180 mm/memory.c:1586 exit_mmap+0x2b9/0x510 mm/mmap.c:3091 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cb29 Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb284f37cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 000000000078bf08 RCX: 000000000045cb29 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000078bf0c RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff365a70cf R14: 00007fb284f389c0 R15: 000000000078bf0c BUG: Bad rss-counter state mm:00000000814536dc idx:0 val:11 BUG: Bad rss-counter state mm:00000000814536dc idx:2 val:-11 audit: type=1804 audit(1594065223.316:345): pid=8736 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16764 res=1 audit: type=1800 audit(1594065223.326:346): pid=8735 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16765 res=0 audit: type=1804 audit(1594065223.706:347): pid=8761 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16764 res=1 audit: type=1804 audit(1594065224.186:348): pid=8768 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16774 res=1 audit: type=1800 audit(1594065224.416:349): pid=8780 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16758 res=0 audit: type=1800 audit(1594065224.516:350): pid=8783 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16768 res=0 audit: type=1804 audit(1594065225.056:351): pid=8794 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16798 res=1 kauditd_printk_skb: 3 callbacks suppressed audit: type=1804 audit(1594065225.496:355): pid=8818 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16790 res=1 audit: type=1800 audit(1594065225.606:356): pid=8825 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16791 res=0 audit: type=1800 audit(1594065225.796:357): pid=8834 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16783 res=0 audit: type=1804 audit(1594065225.916:358): pid=8841 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16776 res=1 audit: type=1804 audit(1594065226.336:359): pid=8852 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=17026 res=1 audit: type=1800 audit(1594065226.336:360): pid=8850 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=17046 res=0 audit: type=1800 audit(1594065226.566:361): pid=8864 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=17011 res=0 audit: type=1800 audit(1594065227.206:362): pid=8878 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=17139 res=0 audit: type=1804 audit(1594065227.246:363): pid=8881 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=17499 res=1 audit: type=1800 audit(1594065227.456:364): pid=8895 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=17495 res=0