Warning: Permanently added '[localhost]:47247' (ECDSA) to the list of known hosts. 2021/12/06 11:34:53 fuzzer started 2021/12/06 11:34:53 dialing manager at localhost:35719 2021/12/06 11:34:53 checking machine... 2021/12/06 11:34:53 checking revisions... syzkaller login: [ 34.088945] kmemleak: Automatic memory scanning thread ended 2021/12/06 11:34:53 testing simple program... [ 34.121732] cgroup: Unknown subsys name 'net' [ 34.122530] cgroup: Unknown subsys name 'net_prio' [ 34.123544] cgroup: Unknown subsys name 'devices' [ 34.124349] cgroup: Unknown subsys name 'blkio' [ 34.135521] [ 34.135727] ========================= [ 34.136143] WARNING: held lock freed! [ 34.136563] 5.16.0-rc3-next-20211203 #1 Not tainted [ 34.137091] ------------------------- [ 34.137494] kworker/1:2/82 is freeing memory ffff8880084d9000-ffff8880084d91ff, with a lock still held there! [ 34.139203] ffff8880084d9148 (&root->kernfs_rwsem){++++}-{3:3}, at: __kernfs_remove+0x627/0xb00 [ 34.140512] 3 locks held by kworker/1:2/82: [ 34.140985] #0: ffff8880080a6138 ((wq_completion)cgroup_destroy){+.+.}-{0:0}, at: process_one_work+0x929/0x1710 [ 34.142128] #1: ffff88800f7bfda8 ((work_completion)(&(&css->destroy_rwork)->work)){+.+.}-{0:0}, at: process_one_work+0x95d/0x1710 [ 34.143438] #2: ffff8880084d9148 (&root->kernfs_rwsem){++++}-{3:3}, at: __kernfs_remove+0x627/0xb00 [ 34.144450] [ 34.144450] stack backtrace: [ 34.144922] CPU: 1 PID: 82 Comm: kworker/1:2 Not tainted 5.16.0-rc3-next-20211203 #1 [ 34.145769] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 34.147020] Workqueue: cgroup_destroy css_free_rwork_fn [ 34.147592] Call Trace: [ 34.147866] [ 34.148109] dump_stack_lvl+0x8b/0xb3 [ 34.148519] debug_check_no_locks_freed.cold+0xa5/0xb1 [ 34.149097] ? kernfs_put.part.0+0x334/0x540 [ 34.149579] kfree+0xb3/0x5a0 [ 34.149920] ? kmem_cache_free+0xce/0x640 [ 34.150378] kernfs_put.part.0+0x334/0x540 [ 34.150857] kernfs_put+0x42/0x50 [ 34.151230] __kernfs_remove+0x7ce/0xb00 [ 34.151675] ? lock_is_held_type+0xd7/0x130 [ 34.152143] ? kernfs_next_descendant_post+0x2f0/0x2f0 [ 34.152707] ? down_write+0xde/0x150 [ 34.153102] ? down_write_killable_nested+0x180/0x180 [ 34.153672] kernfs_destroy_root+0x89/0xb0 [ 34.154134] css_free_rwork_fn+0xa28/0xf40 [ 34.154597] process_one_work+0xa30/0x1710 [ 34.155069] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 34.155564] ? rwlock_bug.part.0+0x90/0x90 [ 34.156029] ? _raw_spin_lock_irq+0x41/0x50 [ 34.156496] worker_thread+0x62a/0x13e0 [ 34.156924] ? process_one_work+0x1710/0x1710 [ 34.157410] kthread+0x40c/0x500 [ 34.157775] ? set_kthread_struct+0x130/0x130 [ 34.158264] ret_from_fork+0x22/0x30 [ 34.158676] [ 34.159001] ================================================================== [ 34.159782] BUG: KASAN: use-after-free in up_write+0x3ac/0x460 [ 34.160419] Read of size 8 at addr ffff8880084d9140 by task kworker/1:2/82 [ 34.161182] [ 34.161359] CPU: 1 PID: 82 Comm: kworker/1:2 Not tainted 5.16.0-rc3-next-20211203 #1 [ 34.162200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 34.163439] Workqueue: cgroup_destroy css_free_rwork_fn [ 34.164011] Call Trace: [ 34.164281] [ 34.164523] dump_stack_lvl+0x8b/0xb3 [ 34.164935] print_address_description.constprop.0+0x1f/0x180 [ 34.165566] ? up_write+0x3ac/0x460 [ 34.165952] ? up_write+0x3ac/0x460 [ 34.166339] kasan_report.cold+0x7f/0x11b [ 34.166790] ? up_write+0x3ac/0x460 [ 34.167183] up_write+0x3ac/0x460 [ 34.167556] css_free_rwork_fn+0xa28/0xf40 [ 34.168019] process_one_work+0xa30/0x1710 [ 34.168470] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 34.168974] ? rwlock_bug.part.0+0x90/0x90 [ 34.169423] ? _raw_spin_lock_irq+0x41/0x50 [ 34.169892] worker_thread+0x62a/0x13e0 [ 34.170320] ? process_one_work+0x1710/0x1710 [ 34.170821] kthread+0x40c/0x500 [ 34.171188] ? set_kthread_struct+0x130/0x130 [ 34.171671] ret_from_fork+0x22/0x30 [ 34.172085] [ 34.172333] [ 34.172511] Allocated by task 281: [ 34.172886] kasan_save_stack+0x1e/0x40 [ 34.173325] __kasan_kmalloc+0x81/0xa0 [ 34.173748] kernfs_create_root+0x4c/0x410 [ 34.174198] cgroup_setup_root+0x346/0xb60 [ 34.174644] cgroup1_get_tree+0xc1b/0x1370 [ 34.175121] vfs_get_tree+0x8e/0x2f0 [ 34.175530] path_mount+0x131b/0x1f80 [ 34.175942] __x64_sys_mount+0x27e/0x300 [ 34.176377] do_syscall_64+0x3b/0x90 [ 34.176776] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 34.177334] [ 34.177506] Freed by task 82: [ 34.177834] kasan_save_stack+0x1e/0x40 [ 34.178268] kasan_set_track+0x21/0x30 [ 34.178695] kasan_set_free_info+0x20/0x30 [ 34.179162] __kasan_slab_free+0x108/0x170 [ 34.179612] kfree+0xc5/0x5a0 [ 34.179955] kernfs_put.part.0+0x334/0x540 [ 34.180415] kernfs_put+0x42/0x50 [ 34.180786] __kernfs_remove+0x7ce/0xb00 [ 34.181218] kernfs_destroy_root+0x89/0xb0 [ 34.181672] css_free_rwork_fn+0xa28/0xf40 [ 34.182113] process_one_work+0xa30/0x1710 [ 34.182568] worker_thread+0x62a/0x13e0 [ 34.182993] kthread+0x40c/0x500 [ 34.183357] ret_from_fork+0x22/0x30 [ 34.183759] [ 34.183939] The buggy address belongs to the object at ffff8880084d9000 [ 34.183939] which belongs to the cache kmalloc-512 of size 512 [ 34.185274] The buggy address is located 320 bytes inside of [ 34.185274] 512-byte region [ffff8880084d9000, ffff8880084d9200) [ 34.186532] The buggy address belongs to the page: [ 34.187054] page:00000000ce6ef16b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x84d8 [ 34.188042] head:00000000ce6ef16b order:2 compound_mapcount:0 compound_pincount:0 [ 34.188820] flags: 0x100000000010200(slab|head|node=0|zone=1) [ 34.189434] raw: 0100000000010200 0000000000000000 dead000000000001 ffff888007841c80 [ 34.190228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 34.191085] page dumped because: kasan: bad access detected [ 34.191698] [ 34.191873] Memory state around the buggy address: [ 34.192389] ffff8880084d9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.193168] ffff8880084d9080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.193943] >ffff8880084d9100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.194736] ^ [ 34.195302] ffff8880084d9180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.196081] ffff8880084d9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.196878] ================================================================== [ 34.218773] cgroup: Unknown subsys name 'hugetlb' [ 34.221145] cgroup: Unknown subsys name 'rlimit' executing program executing program executing program [ 44.010238] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) VM DIAGNOSIS: 11:34:54 Registers: info registers vcpu 0 RAX=0000000080000000 RBX=0000000000000000 RCX=0000000000000000 RDX=0000000000000000 RSI=ffff88800fb39ac0 RDI=0000000000000003 RBP=1ffff11002f6ffd5 RSP=ffff888017b7fea0 R8 =0000000000000000 R9 =ffff888017b7fe47 R10=ffffffff8133be55 R11=0000000000000001 R12=0000000000000000 R13=0000000000000000 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff814316a7 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 000000c000030090 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f50b59c0000 CR3=000000000df76000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 bfe62e42fefa39ef YMM03=0000000000000000 0000000000000000 0000ff0000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 732f6c61636f6c2f 7273752f3d485441 YMM05=0000000000000000 0000000000000000 622f6c61636f6c2f 7273752f3a6e6962 YMM06=0000000000000000 0000000000000000 73752f3a6e696273 2f7273752f3a6e69 YMM07=0000000000000000 0000000000000000 6e69622f3a6e6962 732f3a6e69622f72 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff8236405c RDI=ffffffff87381a60 RBP=ffffffff87381a20 RSP=ffff88800f7bf5f0 R8 =0000000000000063 R9 =0000000000000034 R10=ffffffff8234ae1b R11=000000000000000a R12=0000000000000020 R13=fffffbfff0e70397 R14=fffffbfff0e7034e R15=dffffc0000000000 RIP=ffffffff823640b0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffdbf26a000 CR3=000000000df76000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 bfe62e42fefa39ef YMM03=0000000000000000 0000000000000000 0000ff0000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 732f6c61636f6c2f 7273752f3d485441 YMM05=0000000000000000 0000000000000000 622f6c61636f6c2f 7273752f3a6e6962 YMM06=0000000000000000 0000000000000000 73752f3a6e696273 2f7273752f3a6e69 YMM07=0000000000000000 0000000000000000 6e69622f3a6e6962 732f3a6e69622f72 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000