Warning: Permanently added '[localhost]:64587' (ECDSA) to the list of known hosts. 2021/12/06 11:25:56 fuzzer started 2021/12/06 11:25:56 dialing manager at localhost:35719 2021/12/06 11:25:56 checking machine... 2021/12/06 11:25:56 checking revisions... syzkaller login: [ 34.105096] kmemleak: Automatic memory scanning thread ended 2021/12/06 11:25:56 testing simple program... [ 34.135359] cgroup: Unknown subsys name 'net' [ 34.136719] cgroup: Unknown subsys name 'net_prio' [ 34.137759] cgroup: Unknown subsys name 'devices' [ 34.138894] cgroup: Unknown subsys name 'blkio' [ 34.157790] [ 34.158095] ========================= [ 34.158703] WARNING: held lock freed! [ 34.159302] 5.16.0-rc3-next-20211203 #1 Not tainted [ 34.160207] ------------------------- [ 34.161057] kworker/0:1/10 is freeing memory ffff88800ea39400-ffff88800ea395ff, with a lock still held there! [ 34.162801] ffff88800ea39548 (&root->kernfs_rwsem){++++}-{3:3}, at: __kernfs_remove+0x627/0xb00 [ 34.164223] 3 locks held by kworker/0:1/10: [ 34.164903] #0: ffff8880080a6138 ((wq_completion)cgroup_destroy){+.+.}-{0:0}, at: process_one_work+0x929/0x1710 [ 34.166542] #1: ffff888008197da8 ((work_completion)(&(&css->destroy_rwork)->work)){+.+.}-{0:0}, at: process_one_work+0x95d/0x1710 [ 34.168458] #2: ffff88800ea39548 (&root->kernfs_rwsem){++++}-{3:3}, at: __kernfs_remove+0x627/0xb00 [ 34.169993] [ 34.169993] stack backtrace: [ 34.170693] CPU: 0 PID: 10 Comm: kworker/0:1 Not tainted 5.16.0-rc3-next-20211203 #1 [ 34.172200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 34.173948] Workqueue: cgroup_destroy css_free_rwork_fn [ 34.174691] Call Trace: [ 34.175040] [ 34.175354] dump_stack_lvl+0x8b/0xb3 [ 34.175895] debug_check_no_locks_freed.cold+0xa5/0xb1 [ 34.176631] ? kernfs_put.part.0+0x334/0x540 [ 34.177252] kfree+0xb3/0x5a0 [ 34.177693] ? kmem_cache_free+0xce/0x640 [ 34.178257] kernfs_put.part.0+0x334/0x540 [ 34.178840] kernfs_put+0x42/0x50 [ 34.179305] __kernfs_remove+0x7ce/0xb00 [ 34.179884] ? lock_is_held_type+0xd7/0x130 [ 34.180498] ? kernfs_next_descendant_post+0x2f0/0x2f0 [ 34.181228] ? down_write+0xde/0x150 [ 34.181753] ? down_write_killable_nested+0x180/0x180 [ 34.182480] kernfs_destroy_root+0x89/0xb0 [ 34.183068] css_free_rwork_fn+0xa28/0xf40 [ 34.183684] process_one_work+0xa30/0x1710 [ 34.184259] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 34.184920] ? rwlock_bug.part.0+0x90/0x90 [ 34.185511] ? _raw_spin_lock_irq+0x41/0x50 [ 34.186099] worker_thread+0x62a/0x13e0 [ 34.186651] ? process_one_work+0x1710/0x1710 [ 34.187290] kthread+0x40c/0x500 [ 34.187772] ? set_kthread_struct+0x130/0x130 [ 34.188403] ret_from_fork+0x22/0x30 [ 34.188919] [ 34.189312] ================================================================== [ 34.190303] BUG: KASAN: use-after-free in up_write+0x3ac/0x460 [ 34.191119] Read of size 8 at addr ffff88800ea39540 by task kworker/0:1/10 [ 34.192066] [ 34.192287] CPU: 0 PID: 10 Comm: kworker/0:1 Not tainted 5.16.0-rc3-next-20211203 #1 [ 34.193400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 34.195030] Workqueue: cgroup_destroy css_free_rwork_fn [ 34.195825] Call Trace: [ 34.196174] [ 34.196497] dump_stack_lvl+0x8b/0xb3 [ 34.197018] print_address_description.constprop.0+0x1f/0x180 [ 34.197830] ? up_write+0x3ac/0x460 [ 34.198335] ? up_write+0x3ac/0x460 [ 34.198832] kasan_report.cold+0x7f/0x11b [ 34.199402] ? up_write+0x3ac/0x460 [ 34.199913] up_write+0x3ac/0x460 [ 34.200401] css_free_rwork_fn+0xa28/0xf40 [ 34.200982] process_one_work+0xa30/0x1710 [ 34.201568] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 34.202198] ? rwlock_bug.part.0+0x90/0x90 [ 34.202776] ? _raw_spin_lock_irq+0x41/0x50 [ 34.203371] worker_thread+0x62a/0x13e0 [ 34.203942] ? process_one_work+0x1710/0x1710 [ 34.204569] kthread+0x40c/0x500 [ 34.205032] ? set_kthread_struct+0x130/0x130 [ 34.205659] ret_from_fork+0x22/0x30 [ 34.206174] [ 34.206497] [ 34.206717] Allocated by task 279: [ 34.207200] kasan_save_stack+0x1e/0x40 [ 34.207766] __kasan_kmalloc+0x81/0xa0 [ 34.208290] kernfs_create_root+0x4c/0x410 [ 34.208888] cgroup_setup_root+0x346/0xb60 [ 34.209470] cgroup1_get_tree+0xc1b/0x1370 [ 34.210041] vfs_get_tree+0x8e/0x2f0 [ 34.210559] path_mount+0x131b/0x1f80 [ 34.211079] __x64_sys_mount+0x27e/0x300 [ 34.211644] do_syscall_64+0x3b/0x90 [ 34.212146] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 34.212845] [ 34.213066] Freed by task 10: [ 34.213485] kasan_save_stack+0x1e/0x40 [ 34.214001] kasan_set_track+0x21/0x30 [ 34.214502] kasan_set_free_info+0x20/0x30 [ 34.215055] __kasan_slab_free+0x108/0x170 [ 34.215655] kfree+0xc5/0x5a0 [ 34.216080] kernfs_put.part.0+0x334/0x540 [ 34.216667] kernfs_put+0x42/0x50 [ 34.217132] __kernfs_remove+0x7ce/0xb00 [ 34.217676] kernfs_destroy_root+0x89/0xb0 [ 34.218227] css_free_rwork_fn+0xa28/0xf40 [ 34.218821] process_one_work+0xa30/0x1710 [ 34.219407] worker_thread+0x62a/0x13e0 [ 34.219961] kthread+0x40c/0x500 [ 34.220446] ret_from_fork+0x22/0x30 [ 34.220971] [ 34.221187] The buggy address belongs to the object at ffff88800ea39400 [ 34.221187] which belongs to the cache kmalloc-512 of size 512 [ 34.222925] The buggy address is located 320 bytes inside of [ 34.222925] 512-byte region [ffff88800ea39400, ffff88800ea39600) [ 34.224549] The buggy address belongs to the page: [ 34.225217] page:000000001ff6e919 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea38 [ 34.226461] head:000000001ff6e919 order:2 compound_mapcount:0 compound_pincount:0 [ 34.227482] flags: 0x100000000010200(slab|head|node=0|zone=1) [ 34.228293] raw: 0100000000010200 ffffea0000219900 dead000000000002 ffff888007841c80 [ 34.229341] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 34.230346] page dumped because: kasan: bad access detected [ 34.231056] [ 34.231278] Memory state around the buggy address: [ 34.231937] ffff88800ea39400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.232899] ffff88800ea39480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.233868] >ffff88800ea39500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.234778] ^ [ 34.235492] ffff88800ea39580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.236494] ffff88800ea39600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.237490] ================================================================== [ 34.264160] cgroup: Unknown subsys name 'hugetlb' [ 34.264852] cgroup: Unknown subsys name 'rlimit' executing program executing program executing program [ 43.775290] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 43.858069] audit: type=1400 audit(1638789966.652:6): avc: denied { execmem } for pid=281 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 VM DIAGNOSIS: 11:25:57 Registers: info registers vcpu 0 RAX=000000000000002d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823640e1 RDI=ffffffff87381a60 RBP=ffffffff87381a20 RSP=ffff888008197648 R8 =0000000000000000 R9 =000000000000002d R10=ffffffff82365d23 R11=000000000000000a R12=000000000000002d R13=000000000000002d R14=ffffffff87381a20 R15=dffffc0000000000 RIP=ffffffff82364138 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffcbd90e000 CR3=000000000d91e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 41405d188ed8512a YMM01=0000000000000000 0000000000000000 0000000000000000 3f847ae147ae147b YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 3f743a748b00b570 YMM04=0000000000000000 0000000000000000 00007f7890ce1300 0000000000415710 YMM05=0000000000000000 0000000000000000 0000000000b12758 000000c0002430c8 YMM06=0000000000000000 0000000000000000 0000000000505007 000000c000287fc0 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 00000000004643c6 0000000000000000 YMM09=0000000000000000 0000000000000000 00000000004643c1 0000000000000000 YMM10=0000000000000000 0000000000000000 000000c00008a140 000000c00018eb00 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 000000c0002433e8 000000c000333ad0 YMM14=0000000000000000 0000000000000000 000000c0002433f8 000000c000333ae0 YMM15=0000000000000000 0000000000000000 000000c000243408 000000c000333af0 info registers vcpu 1 RAX=ffffffff84078af0 RBX=ffff8880081a9ac0 RCX=ffffffff8405abe1 RDX=ffffed100d9e7143 RSI=0000000000000001 RDI=ffffffff84078eaf RBP=0000000000000001 RSP=ffff888008207e78 R8 =0000000000000000 R9 =ffff88806cf38a13 R10=ffffed100d9e7142 R11=0000000000000001 R12=ffffed1001035358 R13=ffffffff858bd8d0 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff84078afb RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f67c098bd40 CR3=0000000009144000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 7465677261742e79 636e656772656d65 YMM02=0000000000000000 0000000000000000 ffffffffffffffff 0f0e0d0c0b0a0908 YMM03=0000000000000000 0000000000000000 0000000000000073 66626c7465677568 YMM04=0000000000000000 0000000000000000 2e2e2e2e2e2e2e2e 2e2e2e2e2e2e2e2e YMM05=0000000000000000 0000000000000000 69642f7665642f20 312d6174612d312e YMM06=0000000000000000 0000000000000000 0000000000000000 6c6562616c636573 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 6564636261393837 3635343332313040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000