__swap_info_get: Bad swap file entry 4003ffffffffffff
BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010f067
addr:00007fbc8a252000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:cd
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 0 PID: 7530 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc8ac0dae9
Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf.
RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9
RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003
RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000
R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 4003ffffffffffff
BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010f067
addr:00007fbc8a2ca000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:145
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 0 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc8ac0dae9
Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf.
RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9
RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003
RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000
R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 4003ffffffffffff
BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010f067
addr:00007fbc8a342000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:1bd
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 0 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc8ac0dae9
Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf.
RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9
RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003
RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000
R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 4003ffffffffffff
BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010f067
addr:00007fbc8a3ba000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:35
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 0 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc8ac0dae9
Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf.
RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9
RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003
RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000
R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 4003ffffffffffff
BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067
addr:00007fbc8a61a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:95
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc8ac0dae9
Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf.
RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9
RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003
RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000
R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 4003ffffffffffff
BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067
addr:00007fbc8a692000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:10d
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc8ac0dae9
Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf.
RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9
RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003
RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000
R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 4003ffffffffffff
BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067
addr:00007fbc8a70a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:185
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc8ac0dae9
Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf.
RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9
RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003
RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000
R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 4003ffffffffffff
BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067
addr:00007fbc8a782000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:1fd
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 1 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc8ac0dae9
Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf.
RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9
RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003
RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000
R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000
__swap_info_get: Bad swap file entry 4003ffffffffffff
BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067
addr:00007fbc8a7fa000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:75
file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0
CPU: 0 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562
zap_pte_range mm/memory.c:1398 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x2016/0x29f0 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput+0x122/0x4b0 kernel/fork.c:1113
mmput+0x56/0x60 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2b40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc8ac0dae9
Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf.
RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9
RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003
RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000
R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000
BUG: Bad rss-counter state mm:ffff88823bd00980 type:MM_FILEPAGES val:9
BUG: Bad rss-counter state mm:ffff88823bd00980 type:MM_SWAPENTS val:-9