Hello, syzbot found the following crash on: HEAD commit: c99b17ac Add linux-next specific files for 20200225 git tree: linux-next console output: https://syzkaller.appspot.com/x/log.txt?x=1012fa81e00000 kernel config: https://syzkaller.appspot.com/x/.config?x=6b7ebe4bd0931c45 dashboard link: https://syzkaller.appspot.com/bug?extid=5f10718b9688f3ce609e compiler: gcc (GCC) 9.0.0 20181231 (experimental) Unfortunately, I don't have any reproducer for this crash yet. IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+5f10718b9688f3ce609e@xxxxxxxxxxxxxxxxxxxxxxxxx BUG: Bad page map in process udevd pte:77007770 pmd:00172067 addr:00007f08bce11000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979b1b10 index:1aa file:libnss_nis-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 vm_normal_page+0x244/0x3c0 mm/memory.c:609 zap_pte_range mm/memory.c:1053 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x98f/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207 RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0 RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0 R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005 BUG: Bad page map in process udevd pte:00000700 pmd:00172067 addr:00007f08bcebb000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:49 file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 vm_normal_page+0x244/0x3c0 mm/memory.c:609 zap_pte_range mm/memory.c:1053 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x98f/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207 RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0 RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0 R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005 swap_info_get: Bad swap file entry 3ffffffc44447 BUG: Bad page map in process udevd pte:77777000 pmd:00172067 addr:00007f08bcf1b000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:a9 file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 zap_pte_range mm/memory.c:1126 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207 RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0 RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0 R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005 BUG: Bad page map in process udevd pte:00700777 pmd:00172067 addr:00007f08bcf65000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:f3 file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 vm_normal_page+0x244/0x3c0 mm/memory.c:609 zap_pte_range mm/memory.c:1053 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x98f/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207 RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0 RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0 R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005 swap_info_get: Bad swap file entry 3ffffffffc7ff BUG: Bad page map in process udevd pte:00700000 pmd:00172067 addr:00007f08bcfba000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:148 file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 zap_pte_range mm/memory.c:1126 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207 RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0 RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0 R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005 swap_info_get: Bad swap file entry 3fffffffc7c47 BUG: Bad page map in process udevd pte:07077000 pmd:00173067 addr:00007f08bd00f000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:19d file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 zap_pte_range mm/memory.c:1126 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207 RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0 RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0 R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005 BUG: Bad page map in process udevd pte:77770707 pmd:00173067 addr:00007f08bd064000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:1f2 file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 vm_normal_page+0x244/0x3c0 mm/memory.c:609 zap_pte_range mm/memory.c:1053 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x98f/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207 RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0 RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0 R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005 swap_info_get: Bad swap file entry 3ffffffc7c7ff BUG: Bad page map in process udevd pte:70700000 pmd:00173067 addr:00007f08bd06f000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:1fd file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 zap_pte_range mm/memory.c:1126 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207 RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0 RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0 R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005 BUG: Bad page map in process udevd pte:77000770 pmd:00173067 addr:00007f08bd10e000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979ac9d0 index:84 file:libnss_compat-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 vm_normal_page+0x244/0x3c0 mm/memory.c:609 zap_pte_range mm/memory.c:1053 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x98f/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207 RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0 RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0 R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005 BUG: Bad page map in process udevd pte:77770770 pmd:00173067 addr:00007f08bd163000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979ac9d0 index:d9 file:libnss_compat-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546 vm_normal_page+0x244/0x3c0 mm/memory.c:609 zap_pte_range mm/memory.c:1053 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x98f/0x2820 mm/memory.c:1255 unmap_single_vma+0x19d/0x300 mm/memory.c:1300 unmap_vmas+0x184/0x2f0 mm/memory.c:1332 exit_mmap+0x2ba/0x530 mm/mmap.c:3141 __mmput kernel/fork.c:1090 [inline] mmput+0x179/0x4d0 kernel/fork.c:1111 exec_mmap fs/exec.c:1077 [inline] flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846 search_binary_handler fs/exec.c:1688 [inline] search_binary_handler+0x16d/0x570 fs/exec.c:1665 exec_binprm fs/exec.c:1731 [inline] __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851 do_execveat_common fs/exec.c:1897 [inline] do_execve fs/exec.c:1914 [inline] __do_sys_execve fs/exec.c:1990 [inline] __se_sys_execve fs/exec.c:1985 [inline] __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f08bd760207 Code: Bad RIP value. RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@xxxxxxxxxxxxxxxx. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot.