Warning: Permanently added '[localhost]:47247' (ECDSA) to the list of known hosts.
2021/12/06 11:34:53 fuzzer started
2021/12/06 11:34:53 dialing manager at localhost:35719
2021/12/06 11:34:53 checking machine...
2021/12/06 11:34:53 checking revisions...
syzkaller login: [ 34.088945] kmemleak: Automatic memory scanning thread ended
2021/12/06 11:34:53 testing simple program...
[ 34.121732] cgroup: Unknown subsys name 'net'
[ 34.122530] cgroup: Unknown subsys name 'net_prio'
[ 34.123544] cgroup: Unknown subsys name 'devices'
[ 34.124349] cgroup: Unknown subsys name 'blkio'
[ 34.135521]
[ 34.135727] =========================
[ 34.136143] WARNING: held lock freed!
[ 34.136563] 5.16.0-rc3-next-20211203 #1 Not tainted
[ 34.137091] -------------------------
[ 34.137494] kworker/1:2/82 is freeing memory ffff8880084d9000-ffff8880084d91ff, with a lock still held there!
[ 34.139203] ffff8880084d9148 (&root->kernfs_rwsem){++++}-{3:3}, at: __kernfs_remove+0x627/0xb00
[ 34.140512] 3 locks held by kworker/1:2/82:
[ 34.140985] #0: ffff8880080a6138 ((wq_completion)cgroup_destroy){+.+.}-{0:0}, at: process_one_work+0x929/0x1710
[ 34.142128] #1: ffff88800f7bfda8 ((work_completion)(&(&css->destroy_rwork)->work)){+.+.}-{0:0}, at: process_one_work+0x95d/0x1710
[ 34.143438] #2: ffff8880084d9148 (&root->kernfs_rwsem){++++}-{3:3}, at: __kernfs_remove+0x627/0xb00
[ 34.144450]
[ 34.144450] stack backtrace:
[ 34.144922] CPU: 1 PID: 82 Comm: kworker/1:2 Not tainted 5.16.0-rc3-next-20211203 #1
[ 34.145769] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 34.147020] Workqueue: cgroup_destroy css_free_rwork_fn
[ 34.147592] Call Trace:
[ 34.147866]
[ 34.148109] dump_stack_lvl+0x8b/0xb3
[ 34.148519] debug_check_no_locks_freed.cold+0xa5/0xb1
[ 34.149097] ? kernfs_put.part.0+0x334/0x540
[ 34.149579] kfree+0xb3/0x5a0
[ 34.149920] ? kmem_cache_free+0xce/0x640
[ 34.150378] kernfs_put.part.0+0x334/0x540
[ 34.150857] kernfs_put+0x42/0x50
[ 34.151230] __kernfs_remove+0x7ce/0xb00
[ 34.151675] ? lock_is_held_type+0xd7/0x130
[ 34.152143] ? kernfs_next_descendant_post+0x2f0/0x2f0
[ 34.152707] ? down_write+0xde/0x150
[ 34.153102] ? down_write_killable_nested+0x180/0x180
[ 34.153672] kernfs_destroy_root+0x89/0xb0
[ 34.154134] css_free_rwork_fn+0xa28/0xf40
[ 34.154597] process_one_work+0xa30/0x1710
[ 34.155069] ? pwq_dec_nr_in_flight+0x2a0/0x2a0
[ 34.155564] ? rwlock_bug.part.0+0x90/0x90
[ 34.156029] ? _raw_spin_lock_irq+0x41/0x50
[ 34.156496] worker_thread+0x62a/0x13e0
[ 34.156924] ? process_one_work+0x1710/0x1710
[ 34.157410] kthread+0x40c/0x500
[ 34.157775] ? set_kthread_struct+0x130/0x130
[ 34.158264] ret_from_fork+0x22/0x30
[ 34.158676]
[ 34.159001] ==================================================================
[ 34.159782] BUG: KASAN: use-after-free in up_write+0x3ac/0x460
[ 34.160419] Read of size 8 at addr ffff8880084d9140 by task kworker/1:2/82
[ 34.161182]
[ 34.161359] CPU: 1 PID: 82 Comm: kworker/1:2 Not tainted 5.16.0-rc3-next-20211203 #1
[ 34.162200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 34.163439] Workqueue: cgroup_destroy css_free_rwork_fn
[ 34.164011] Call Trace:
[ 34.164281]
[ 34.164523] dump_stack_lvl+0x8b/0xb3
[ 34.164935] print_address_description.constprop.0+0x1f/0x180
[ 34.165566] ? up_write+0x3ac/0x460
[ 34.165952] ? up_write+0x3ac/0x460
[ 34.166339] kasan_report.cold+0x7f/0x11b
[ 34.166790] ? up_write+0x3ac/0x460
[ 34.167183] up_write+0x3ac/0x460
[ 34.167556] css_free_rwork_fn+0xa28/0xf40
[ 34.168019] process_one_work+0xa30/0x1710
[ 34.168470] ? pwq_dec_nr_in_flight+0x2a0/0x2a0
[ 34.168974] ? rwlock_bug.part.0+0x90/0x90
[ 34.169423] ? _raw_spin_lock_irq+0x41/0x50
[ 34.169892] worker_thread+0x62a/0x13e0
[ 34.170320] ? process_one_work+0x1710/0x1710
[ 34.170821] kthread+0x40c/0x500
[ 34.171188] ? set_kthread_struct+0x130/0x130
[ 34.171671] ret_from_fork+0x22/0x30
[ 34.172085]
[ 34.172333]
[ 34.172511] Allocated by task 281:
[ 34.172886] kasan_save_stack+0x1e/0x40
[ 34.173325] __kasan_kmalloc+0x81/0xa0
[ 34.173748] kernfs_create_root+0x4c/0x410
[ 34.174198] cgroup_setup_root+0x346/0xb60
[ 34.174644] cgroup1_get_tree+0xc1b/0x1370
[ 34.175121] vfs_get_tree+0x8e/0x2f0
[ 34.175530] path_mount+0x131b/0x1f80
[ 34.175942] __x64_sys_mount+0x27e/0x300
[ 34.176377] do_syscall_64+0x3b/0x90
[ 34.176776] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 34.177334]
[ 34.177506] Freed by task 82:
[ 34.177834] kasan_save_stack+0x1e/0x40
[ 34.178268] kasan_set_track+0x21/0x30
[ 34.178695] kasan_set_free_info+0x20/0x30
[ 34.179162] __kasan_slab_free+0x108/0x170
[ 34.179612] kfree+0xc5/0x5a0
[ 34.179955] kernfs_put.part.0+0x334/0x540
[ 34.180415] kernfs_put+0x42/0x50
[ 34.180786] __kernfs_remove+0x7ce/0xb00
[ 34.181218] kernfs_destroy_root+0x89/0xb0
[ 34.181672] css_free_rwork_fn+0xa28/0xf40
[ 34.182113] process_one_work+0xa30/0x1710
[ 34.182568] worker_thread+0x62a/0x13e0
[ 34.182993] kthread+0x40c/0x500
[ 34.183357] ret_from_fork+0x22/0x30
[ 34.183759]
[ 34.183939] The buggy address belongs to the object at ffff8880084d9000
[ 34.183939] which belongs to the cache kmalloc-512 of size 512
[ 34.185274] The buggy address is located 320 bytes inside of
[ 34.185274] 512-byte region [ffff8880084d9000, ffff8880084d9200)
[ 34.186532] The buggy address belongs to the page:
[ 34.187054] page:00000000ce6ef16b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x84d8
[ 34.188042] head:00000000ce6ef16b order:2 compound_mapcount:0 compound_pincount:0
[ 34.188820] flags: 0x100000000010200(slab|head|node=0|zone=1)
[ 34.189434] raw: 0100000000010200 0000000000000000 dead000000000001 ffff888007841c80
[ 34.190228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 34.191085] page dumped because: kasan: bad access detected
[ 34.191698]
[ 34.191873] Memory state around the buggy address:
[ 34.192389] ffff8880084d9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.193168] ffff8880084d9080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.193943] >ffff8880084d9100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.194736] ^
[ 34.195302] ffff8880084d9180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.196081] ffff8880084d9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.196878] ==================================================================
[ 34.218773] cgroup: Unknown subsys name 'hugetlb'
[ 34.221145] cgroup: Unknown subsys name 'rlimit'
executing program
executing program
executing program
[ 44.010238] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
VM DIAGNOSIS:
11:34:54 Registers:
info registers vcpu 0
RAX=0000000080000000 RBX=0000000000000000 RCX=0000000000000000 RDX=0000000000000000
RSI=ffff88800fb39ac0 RDI=0000000000000003 RBP=1ffff11002f6ffd5 RSP=ffff888017b7fea0
R8 =0000000000000000 R9 =ffff888017b7fe47 R10=ffffffff8133be55 R11=0000000000000001
R12=0000000000000000 R13=0000000000000000 R14=0000000000000000 R15=0000000000000000
RIP=ffffffff814316a7 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 000000c000030090 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f50b59c0000 CR3=000000000df76000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM02=0000000000000000 0000000000000000 0000000000000000 bfe62e42fefa39ef
YMM03=0000000000000000 0000000000000000 0000ff0000000000 0000000000000000
YMM04=0000000000000000 0000000000000000 732f6c61636f6c2f 7273752f3d485441
YMM05=0000000000000000 0000000000000000 622f6c61636f6c2f 7273752f3a6e6962
YMM06=0000000000000000 0000000000000000 73752f3a6e696273 2f7273752f3a6e69
YMM07=0000000000000000 0000000000000000 6e69622f3a6e6962 732f3a6e69622f72
YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000
info registers vcpu 1
RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd
RSI=ffffffff8236405c RDI=ffffffff87381a60 RBP=ffffffff87381a20 RSP=ffff88800f7bf5f0
R8 =0000000000000063 R9 =0000000000000034 R10=ffffffff8234ae1b R11=000000000000000a
R12=0000000000000020 R13=fffffbfff0e70397 R14=fffffbfff0e7034e R15=dffffc0000000000
RIP=ffffffff823640b0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000000000000000 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007ffdbf26a000 CR3=000000000df76000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM02=0000000000000000 0000000000000000 0000000000000000 bfe62e42fefa39ef
YMM03=0000000000000000 0000000000000000 0000ff0000000000 0000000000000000
YMM04=0000000000000000 0000000000000000 732f6c61636f6c2f 7273752f3d485441
YMM05=0000000000000000 0000000000000000 622f6c61636f6c2f 7273752f3a6e6962
YMM06=0000000000000000 0000000000000000 73752f3a6e696273 2f7273752f3a6e69
YMM07=0000000000000000 0000000000000000 6e69622f3a6e6962 732f3a6e69622f72
YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000