Warning: Permanently added '[localhost]:64587' (ECDSA) to the list of known hosts.
2021/12/06 11:25:56 fuzzer started
2021/12/06 11:25:56 dialing manager at localhost:35719
2021/12/06 11:25:56 checking machine...
2021/12/06 11:25:56 checking revisions...
syzkaller login: [ 34.105096] kmemleak: Automatic memory scanning thread ended
2021/12/06 11:25:56 testing simple program...
[ 34.135359] cgroup: Unknown subsys name 'net'
[ 34.136719] cgroup: Unknown subsys name 'net_prio'
[ 34.137759] cgroup: Unknown subsys name 'devices'
[ 34.138894] cgroup: Unknown subsys name 'blkio'
[ 34.157790]
[ 34.158095] =========================
[ 34.158703] WARNING: held lock freed!
[ 34.159302] 5.16.0-rc3-next-20211203 #1 Not tainted
[ 34.160207] -------------------------
[ 34.161057] kworker/0:1/10 is freeing memory ffff88800ea39400-ffff88800ea395ff, with a lock still held there!
[ 34.162801] ffff88800ea39548 (&root->kernfs_rwsem){++++}-{3:3}, at: __kernfs_remove+0x627/0xb00
[ 34.164223] 3 locks held by kworker/0:1/10:
[ 34.164903] #0: ffff8880080a6138 ((wq_completion)cgroup_destroy){+.+.}-{0:0}, at: process_one_work+0x929/0x1710
[ 34.166542] #1: ffff888008197da8 ((work_completion)(&(&css->destroy_rwork)->work)){+.+.}-{0:0}, at: process_one_work+0x95d/0x1710
[ 34.168458] #2: ffff88800ea39548 (&root->kernfs_rwsem){++++}-{3:3}, at: __kernfs_remove+0x627/0xb00
[ 34.169993]
[ 34.169993] stack backtrace:
[ 34.170693] CPU: 0 PID: 10 Comm: kworker/0:1 Not tainted 5.16.0-rc3-next-20211203 #1
[ 34.172200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 34.173948] Workqueue: cgroup_destroy css_free_rwork_fn
[ 34.174691] Call Trace:
[ 34.175040]
[ 34.175354] dump_stack_lvl+0x8b/0xb3
[ 34.175895] debug_check_no_locks_freed.cold+0xa5/0xb1
[ 34.176631] ? kernfs_put.part.0+0x334/0x540
[ 34.177252] kfree+0xb3/0x5a0
[ 34.177693] ? kmem_cache_free+0xce/0x640
[ 34.178257] kernfs_put.part.0+0x334/0x540
[ 34.178840] kernfs_put+0x42/0x50
[ 34.179305] __kernfs_remove+0x7ce/0xb00
[ 34.179884] ? lock_is_held_type+0xd7/0x130
[ 34.180498] ? kernfs_next_descendant_post+0x2f0/0x2f0
[ 34.181228] ? down_write+0xde/0x150
[ 34.181753] ? down_write_killable_nested+0x180/0x180
[ 34.182480] kernfs_destroy_root+0x89/0xb0
[ 34.183068] css_free_rwork_fn+0xa28/0xf40
[ 34.183684] process_one_work+0xa30/0x1710
[ 34.184259] ? pwq_dec_nr_in_flight+0x2a0/0x2a0
[ 34.184920] ? rwlock_bug.part.0+0x90/0x90
[ 34.185511] ? _raw_spin_lock_irq+0x41/0x50
[ 34.186099] worker_thread+0x62a/0x13e0
[ 34.186651] ? process_one_work+0x1710/0x1710
[ 34.187290] kthread+0x40c/0x500
[ 34.187772] ? set_kthread_struct+0x130/0x130
[ 34.188403] ret_from_fork+0x22/0x30
[ 34.188919]
[ 34.189312] ==================================================================
[ 34.190303] BUG: KASAN: use-after-free in up_write+0x3ac/0x460
[ 34.191119] Read of size 8 at addr ffff88800ea39540 by task kworker/0:1/10
[ 34.192066]
[ 34.192287] CPU: 0 PID: 10 Comm: kworker/0:1 Not tainted 5.16.0-rc3-next-20211203 #1
[ 34.193400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 34.195030] Workqueue: cgroup_destroy css_free_rwork_fn
[ 34.195825] Call Trace:
[ 34.196174]
[ 34.196497] dump_stack_lvl+0x8b/0xb3
[ 34.197018] print_address_description.constprop.0+0x1f/0x180
[ 34.197830] ? up_write+0x3ac/0x460
[ 34.198335] ? up_write+0x3ac/0x460
[ 34.198832] kasan_report.cold+0x7f/0x11b
[ 34.199402] ? up_write+0x3ac/0x460
[ 34.199913] up_write+0x3ac/0x460
[ 34.200401] css_free_rwork_fn+0xa28/0xf40
[ 34.200982] process_one_work+0xa30/0x1710
[ 34.201568] ? pwq_dec_nr_in_flight+0x2a0/0x2a0
[ 34.202198] ? rwlock_bug.part.0+0x90/0x90
[ 34.202776] ? _raw_spin_lock_irq+0x41/0x50
[ 34.203371] worker_thread+0x62a/0x13e0
[ 34.203942] ? process_one_work+0x1710/0x1710
[ 34.204569] kthread+0x40c/0x500
[ 34.205032] ? set_kthread_struct+0x130/0x130
[ 34.205659] ret_from_fork+0x22/0x30
[ 34.206174]
[ 34.206497]
[ 34.206717] Allocated by task 279:
[ 34.207200] kasan_save_stack+0x1e/0x40
[ 34.207766] __kasan_kmalloc+0x81/0xa0
[ 34.208290] kernfs_create_root+0x4c/0x410
[ 34.208888] cgroup_setup_root+0x346/0xb60
[ 34.209470] cgroup1_get_tree+0xc1b/0x1370
[ 34.210041] vfs_get_tree+0x8e/0x2f0
[ 34.210559] path_mount+0x131b/0x1f80
[ 34.211079] __x64_sys_mount+0x27e/0x300
[ 34.211644] do_syscall_64+0x3b/0x90
[ 34.212146] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 34.212845]
[ 34.213066] Freed by task 10:
[ 34.213485] kasan_save_stack+0x1e/0x40
[ 34.214001] kasan_set_track+0x21/0x30
[ 34.214502] kasan_set_free_info+0x20/0x30
[ 34.215055] __kasan_slab_free+0x108/0x170
[ 34.215655] kfree+0xc5/0x5a0
[ 34.216080] kernfs_put.part.0+0x334/0x540
[ 34.216667] kernfs_put+0x42/0x50
[ 34.217132] __kernfs_remove+0x7ce/0xb00
[ 34.217676] kernfs_destroy_root+0x89/0xb0
[ 34.218227] css_free_rwork_fn+0xa28/0xf40
[ 34.218821] process_one_work+0xa30/0x1710
[ 34.219407] worker_thread+0x62a/0x13e0
[ 34.219961] kthread+0x40c/0x500
[ 34.220446] ret_from_fork+0x22/0x30
[ 34.220971]
[ 34.221187] The buggy address belongs to the object at ffff88800ea39400
[ 34.221187] which belongs to the cache kmalloc-512 of size 512
[ 34.222925] The buggy address is located 320 bytes inside of
[ 34.222925] 512-byte region [ffff88800ea39400, ffff88800ea39600)
[ 34.224549] The buggy address belongs to the page:
[ 34.225217] page:000000001ff6e919 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea38
[ 34.226461] head:000000001ff6e919 order:2 compound_mapcount:0 compound_pincount:0
[ 34.227482] flags: 0x100000000010200(slab|head|node=0|zone=1)
[ 34.228293] raw: 0100000000010200 ffffea0000219900 dead000000000002 ffff888007841c80
[ 34.229341] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 34.230346] page dumped because: kasan: bad access detected
[ 34.231056]
[ 34.231278] Memory state around the buggy address:
[ 34.231937] ffff88800ea39400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.232899] ffff88800ea39480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.233868] >ffff88800ea39500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.234778] ^
[ 34.235492] ffff88800ea39580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.236494] ffff88800ea39600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.237490] ==================================================================
[ 34.264160] cgroup: Unknown subsys name 'hugetlb'
[ 34.264852] cgroup: Unknown subsys name 'rlimit'
executing program
executing program
executing program
[ 43.775290] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[ 43.858069] audit: type=1400 audit(1638789966.652:6): avc: denied { execmem } for pid=281 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
VM DIAGNOSIS:
11:25:57 Registers:
info registers vcpu 0
RAX=000000000000002d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8
RSI=ffffffff823640e1 RDI=ffffffff87381a60 RBP=ffffffff87381a20 RSP=ffff888008197648
R8 =0000000000000000 R9 =000000000000002d R10=ffffffff82365d23 R11=000000000000000a
R12=000000000000002d R13=000000000000002d R14=ffffffff87381a20 R15=dffffc0000000000
RIP=ffffffff82364138 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000000000000000 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007ffcbd90e000 CR3=000000000d91e000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 41405d188ed8512a
YMM01=0000000000000000 0000000000000000 0000000000000000 3f847ae147ae147b
YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM03=0000000000000000 0000000000000000 0000000000000000 3f743a748b00b570
YMM04=0000000000000000 0000000000000000 00007f7890ce1300 0000000000415710
YMM05=0000000000000000 0000000000000000 0000000000b12758 000000c0002430c8
YMM06=0000000000000000 0000000000000000 0000000000505007 000000c000287fc0
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 00000000004643c6 0000000000000000
YMM09=0000000000000000 0000000000000000 00000000004643c1 0000000000000000
YMM10=0000000000000000 0000000000000000 000000c00008a140 000000c00018eb00
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 000000c0002433e8 000000c000333ad0
YMM14=0000000000000000 0000000000000000 000000c0002433f8 000000c000333ae0
YMM15=0000000000000000 0000000000000000 000000c000243408 000000c000333af0
info registers vcpu 1
RAX=ffffffff84078af0 RBX=ffff8880081a9ac0 RCX=ffffffff8405abe1 RDX=ffffed100d9e7143
RSI=0000000000000001 RDI=ffffffff84078eaf RBP=0000000000000001 RSP=ffff888008207e78
R8 =0000000000000000 R9 =ffff88806cf38a13 R10=ffffed100d9e7142 R11=0000000000000001
R12=ffffed1001035358 R13=ffffffff858bd8d0 R14=0000000000000000 R15=dffffc0000000000
RIP=ffffffff84078afb RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000000000000000 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f67c098bd40 CR3=0000000009144000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 7465677261742e79 636e656772656d65
YMM02=0000000000000000 0000000000000000 ffffffffffffffff 0f0e0d0c0b0a0908
YMM03=0000000000000000 0000000000000000 0000000000000073 66626c7465677568
YMM04=0000000000000000 0000000000000000 2e2e2e2e2e2e2e2e 2e2e2e2e2e2e2e2e
YMM05=0000000000000000 0000000000000000 69642f7665642f20 312d6174612d312e
YMM06=0000000000000000 0000000000000000 0000000000000000 6c6562616c636573
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 6564636261393837 3635343332313040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000