__swap_info_get: Bad swap file entry 4003ffffffffffff BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010f067 addr:00007fbc8a252000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:cd file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 0 PID: 7530 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc8ac0dae9 Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf. RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9 RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000 R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 4003ffffffffffff BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010f067 addr:00007fbc8a2ca000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:145 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 0 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc8ac0dae9 Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf. RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9 RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000 R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 4003ffffffffffff BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010f067 addr:00007fbc8a342000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:1bd file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 0 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc8ac0dae9 Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf. RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9 RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000 R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 4003ffffffffffff BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010f067 addr:00007fbc8a3ba000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:35 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 0 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc8ac0dae9 Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf. RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9 RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000 R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 4003ffffffffffff BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067 addr:00007fbc8a61a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:95 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc8ac0dae9 Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf. RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9 RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000 R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 4003ffffffffffff BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067 addr:00007fbc8a692000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:10d file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc8ac0dae9 Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf. RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9 RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000 R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 4003ffffffffffff BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067 addr:00007fbc8a70a000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:185 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc8ac0dae9 Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf. RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9 RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000 R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 4003ffffffffffff BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067 addr:00007fbc8a782000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:1fd file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 1 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc8ac0dae9 Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf. RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9 RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000 R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000 __swap_info_get: Bad swap file entry 4003ffffffffffff BUG: Bad page map in process syz-executor.4 pte:8000000000000000 pmd:0010d067 addr:00007fbc8a7fa000 vm_flags:180400fb anon_vma:0000000000000000 mapping:ffff8880170dd158 index:75 file:kcov fault:0x0 mmap:kcov_mmap readpage:0x0 CPU: 0 PID: 7530 Comm: syz-executor.4 Tainted: G B 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_bad_pte.cold+0x2bc/0x2e5 mm/memory.c:562 zap_pte_range mm/memory.c:1398 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x2016/0x29f0 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput+0x122/0x4b0 kernel/fork.c:1113 mmput+0x56/0x60 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2b40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc8ac0dae9 Code: Unable to access opcode bytes at RIP 0x7fbc8ac0dabf. RSP: 002b:00007fbc88162188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: fffffffffffffffe RBX: 00007fbc8ad21020 RCX: 00007fbc8ac0dae9 RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 RBP: 00007fbc8ac67f6d R08: 0000000000000278 R09: 0000000000000000 R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fbc8b254b2f R14: 00007fbc88162300 R15: 0000000000022000 BUG: Bad rss-counter state mm:ffff88823bd00980 type:MM_FILEPAGES val:9 BUG: Bad rss-counter state mm:ffff88823bd00980 type:MM_SWAPENTS val:-9