BUG: Bad page map (4)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

syzbot found the following crash on:

HEAD commit:    c99b17ac Add linux-next specific files for 20200225
git tree:       linux-next
console output: https://syzkaller.appspot.com/x/log.txt?x=1012fa81e00000
kernel config:  https://syzkaller.appspot.com/x/.config?x=6b7ebe4bd0931c45
dashboard link: https://syzkaller.appspot.com/bug?extid=5f10718b9688f3ce609e
compiler:       gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+5f10718b9688f3ce609e@xxxxxxxxxxxxxxxxxxxxxxxxx

BUG: Bad page map in process udevd  pte:77007770 pmd:00172067
addr:00007f08bce11000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979b1b10 index:1aa
file:libnss_nis-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Not tainted 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 vm_normal_page+0x244/0x3c0 mm/memory.c:609
 zap_pte_range mm/memory.c:1053 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x98f/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd  pte:00000700 pmd:00172067
addr:00007f08bcebb000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:49
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G    B             5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 vm_normal_page+0x244/0x3c0 mm/memory.c:609
 zap_pte_range mm/memory.c:1053 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x98f/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
swap_info_get: Bad swap file entry 3ffffffc44447
BUG: Bad page map in process udevd  pte:77777000 pmd:00172067
addr:00007f08bcf1b000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:a9
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G    B             5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 zap_pte_range mm/memory.c:1126 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd  pte:00700777 pmd:00172067
addr:00007f08bcf65000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:f3
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G    B             5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 vm_normal_page+0x244/0x3c0 mm/memory.c:609
 zap_pte_range mm/memory.c:1053 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x98f/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
swap_info_get: Bad swap file entry 3ffffffffc7ff
BUG: Bad page map in process udevd  pte:00700000 pmd:00172067
addr:00007f08bcfba000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:148
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G    B             5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 zap_pte_range mm/memory.c:1126 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
swap_info_get: Bad swap file entry 3fffffffc7c47
BUG: Bad page map in process udevd  pte:07077000 pmd:00173067
addr:00007f08bd00f000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:19d
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G    B             5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 zap_pte_range mm/memory.c:1126 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd  pte:77770707 pmd:00173067
addr:00007f08bd064000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:1f2
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G    B             5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 vm_normal_page+0x244/0x3c0 mm/memory.c:609
 zap_pte_range mm/memory.c:1053 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x98f/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
swap_info_get: Bad swap file entry 3ffffffc7c7ff
BUG: Bad page map in process udevd  pte:70700000 pmd:00173067
addr:00007f08bd06f000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:1fd
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G    B             5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 zap_pte_range mm/memory.c:1126 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd  pte:77000770 pmd:00173067
addr:00007f08bd10e000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979ac9d0 index:84
file:libnss_compat-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G    B             5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 vm_normal_page+0x244/0x3c0 mm/memory.c:609
 zap_pte_range mm/memory.c:1053 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x98f/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd  pte:77770770 pmd:00173067
addr:00007f08bd163000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979ac9d0 index:d9
file:libnss_compat-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G    B             5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
 vm_normal_page+0x244/0x3c0 mm/memory.c:609
 zap_pte_range mm/memory.c:1053 [inline]
 zap_pmd_range mm/memory.c:1184 [inline]
 zap_pud_range mm/memory.c:1213 [inline]
 zap_p4d_range mm/memory.c:1234 [inline]
 unmap_page_range+0x98f/0x2820 mm/memory.c:1255
 unmap_single_vma+0x19d/0x300 mm/memory.c:1300
 unmap_vmas+0x184/0x2f0 mm/memory.c:1332
 exit_mmap+0x2ba/0x530 mm/mmap.c:3141
 __mmput kernel/fork.c:1090 [inline]
 mmput+0x179/0x4d0 kernel/fork.c:1111
 exec_mmap fs/exec.c:1077 [inline]
 flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
 load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
 search_binary_handler fs/exec.c:1688 [inline]
 search_binary_handler+0x16d/0x570 fs/exec.c:1665
 exec_binprm fs/exec.c:1731 [inline]
 __do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
 do_execveat_common fs/exec.c:1897 [inline]
 do_execve fs/exec.c:1914 [inline]
 __do_sys_execve fs/exec.c:1990 [inline]
 __se_sys_execve fs/exec.c:1985 [inline]
 __x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@xxxxxxxxxxxxxxxx.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.




[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux