From: syzbot <syzbot+5f10718b9688f3ce609e@syzkaller.appspotmail.com>
To: akpm@linux-foundation.org, linux-kernel@vger.kernel.org,
linux-mm@kvack.org, syzkaller-bugs@googlegroups.com
Subject: BUG: Bad page map (4)
Date: Fri, 06 Mar 2020 09:24:08 -0800 [thread overview]
Message-ID: <000000000000d5157705a032eb4b@google.com> (raw)
Hello,
syzbot found the following crash on:
HEAD commit: c99b17ac Add linux-next specific files for 20200225
git tree: linux-next
console output: https://syzkaller.appspot.com/x/log.txt?x=1012fa81e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=6b7ebe4bd0931c45
dashboard link: https://syzkaller.appspot.com/bug?extid=5f10718b9688f3ce609e
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
Unfortunately, I don't have any reproducer for this crash yet.
IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+5f10718b9688f3ce609e@syzkaller.appspotmail.com
BUG: Bad page map in process udevd pte:77007770 pmd:00172067
addr:00007f08bce11000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979b1b10 index:1aa
file:libnss_nis-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Not tainted 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
vm_normal_page+0x244/0x3c0 mm/memory.c:609
zap_pte_range mm/memory.c:1053 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x98f/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd pte:00000700 pmd:00172067
addr:00007f08bcebb000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:49
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
vm_normal_page+0x244/0x3c0 mm/memory.c:609
zap_pte_range mm/memory.c:1053 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x98f/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
swap_info_get: Bad swap file entry 3ffffffc44447
BUG: Bad page map in process udevd pte:77777000 pmd:00172067
addr:00007f08bcf1b000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:a9
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
zap_pte_range mm/memory.c:1126 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd pte:00700777 pmd:00172067
addr:00007f08bcf65000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:f3
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
vm_normal_page+0x244/0x3c0 mm/memory.c:609
zap_pte_range mm/memory.c:1053 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x98f/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
swap_info_get: Bad swap file entry 3ffffffffc7ff
BUG: Bad page map in process udevd pte:00700000 pmd:00172067
addr:00007f08bcfba000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:148
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
zap_pte_range mm/memory.c:1126 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
swap_info_get: Bad swap file entry 3fffffffc7c47
BUG: Bad page map in process udevd pte:07077000 pmd:00173067
addr:00007f08bd00f000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:19d
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
zap_pte_range mm/memory.c:1126 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd pte:77770707 pmd:00173067
addr:00007f08bd064000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:1f2
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
vm_normal_page+0x244/0x3c0 mm/memory.c:609
zap_pte_range mm/memory.c:1053 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x98f/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
swap_info_get: Bad swap file entry 3ffffffc7c7ff
BUG: Bad page map in process udevd pte:70700000 pmd:00173067
addr:00007f08bd06f000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979aea50 index:1fd
file:libnsl-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
zap_pte_range mm/memory.c:1126 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x1cd6/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd pte:77000770 pmd:00173067
addr:00007f08bd10e000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979ac9d0 index:84
file:libnss_compat-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
vm_normal_page+0x244/0x3c0 mm/memory.c:609
zap_pte_range mm/memory.c:1053 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x98f/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f08bd760207
RDX: 0000000001f622f0 RSI: 00007fff1a787fc0 RDI: 00007fff1a788fd0
RBP: 0000000000625500 R08: 0000000000000ddf R09: 0000000000000ddf
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000001f622f0
R13: 0000000000000007 R14: 0000000001f50250 R15: 0000000000000005
BUG: Bad page map in process udevd pte:77770770 pmd:00173067
addr:00007f08bd163000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff8880979ac9d0 index:d9
file:libnss_compat-2.13.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage
CPU: 0 PID: 16669 Comm: udevd Tainted: G B 5.6.0-rc3-next-20200225-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
print_bad_pte.cold+0x1d5/0x232 mm/memory.c:546
vm_normal_page+0x244/0x3c0 mm/memory.c:609
zap_pte_range mm/memory.c:1053 [inline]
zap_pmd_range mm/memory.c:1184 [inline]
zap_pud_range mm/memory.c:1213 [inline]
zap_p4d_range mm/memory.c:1234 [inline]
unmap_page_range+0x98f/0x2820 mm/memory.c:1255
unmap_single_vma+0x19d/0x300 mm/memory.c:1300
unmap_vmas+0x184/0x2f0 mm/memory.c:1332
exit_mmap+0x2ba/0x530 mm/mmap.c:3141
__mmput kernel/fork.c:1090 [inline]
mmput+0x179/0x4d0 kernel/fork.c:1111
exec_mmap fs/exec.c:1077 [inline]
flush_old_exec+0x8ef/0x1e80 fs/exec.c:1310
load_elf_binary+0x8ae/0x4ab0 fs/binfmt_elf.c:846
search_binary_handler fs/exec.c:1688 [inline]
search_binary_handler+0x16d/0x570 fs/exec.c:1665
exec_binprm fs/exec.c:1731 [inline]
__do_execve_file.isra.0+0x12fc/0x2270 fs/exec.c:1851
do_execveat_common fs/exec.c:1897 [inline]
do_execve fs/exec.c:1914 [inline]
__do_sys_execve fs/exec.c:1990 [inline]
__se_sys_execve fs/exec.c:1985 [inline]
__x64_sys_execve+0x8f/0xc0 fs/exec.c:1985
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:295
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f08bd760207
Code: Bad RIP value.
RSP: 002b:00007fff1a787ec8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.
syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
next reply other threads:[~2020-03-06 17:24 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-03-06 17:24 syzbot [this message]
2020-03-06 17:24 ` BUG: Bad page map (4) syzbot
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=000000000000d5157705a032eb4b@google.com \
--to=syzbot+5f10718b9688f3ce609e@syzkaller.appspotmail.com \
--cc=akpm@linux-foundation.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=syzkaller-bugs@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.