===================================== WARNING: bad unlock balance detected! 6.19.0-rc5-next-20260116 #1 Not tainted ------------------------------------- syz-executor.0/836 is trying to release lock (rcu_read_lock) at: [] __wait_on_freeing_inode+0x105/0x350 but there are no more locks to release! other info that might help us debug this: 4 locks held by syz-executor.0/836: #0: ffff88800f9a23f8 (sb_writers#3){.+.+}-{0:0}, at: filename_create+0xf7/0x400 #1: ffff88801b91bd10 (&type->i_mutex_dir_key#3/1){+.+.}-{4:4}, at: filename_create+0x1b1/0x400 #2: ffff88800f9a6950 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0xe32/0x12d0 #3: ffffffff85c16898 (inode_hash_lock){+.+.}-{3:3}, at: insert_inode_locked+0xf9/0x890 stack backtrace: CPU: 0 UID: 0 PID: 836 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 print_unlock_imbalance_bug+0x118/0x130 lock_release+0x1ee/0x270 __wait_on_freeing_inode+0x10a/0x350 insert_inode_locked+0x25f/0x890 __ext4_new_inode+0x223d/0x4cd0 ext4_mkdir+0x331/0xb30 vfs_mkdir+0x6d8/0xc00 filename_mkdirat+0x118/0x430 __x64_sys_mkdir+0x6e/0xd0 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8e86fa1c27 Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe3316cba8 EFLAGS: 00000202 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffe3316cc30 RCX: 00007f8e86fa1c27 RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00007ffe3316cc30 RBP: 00007ffe3316cc0c R08: 0000000000000000 R09: 0000000000000005 R10: 00007ffe3316c945 R11: 0000000000000202 R12: 0000000000000032 R13: 0000000000022d1c R14: 0000000000000003 R15: 00007ffe3316cc70 ------------[ cut here ]------------ WARNING: kernel/rcu/tree_plugin.h:443 at __rcu_read_unlock+0x25f/0x5c0, CPU#0: syz-executor.0/836 Modules linked in: CPU: 0 UID: 0 PID: 836 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__rcu_read_unlock+0x25f/0x5c0 Code: f2 02 00 00 c7 43 58 01 00 00 00 bf 09 00 00 00 e8 d6 b7 de ff 4d 85 f6 0f 84 73 fe ff ff e8 38 8a 20 00 fb e9 68 fe ff ff 90 <0f> 0b 90 5b 5d 41 5c 41 5d 41 5e e9 81 4d 74 03 e8 2c 5d 56 00 e9 RSP: 0018:ffff88801971f9e0 EFLAGS: 00010286 RAX: 00000000ffffffff RBX: ffff888019669b80 RCX: ffffffff815660f7 RDX: 0000000000000000 RSI: ffffffff81566100 RDI: ffff888019669f7c RBP: ffff888019669b80 R08: 0000000000000000 R09: fffffbfff0ba7040 R10: 0000000000000000 R11: 0000000000000001 R12: ffff888019669b80 R13: 0000000000000001 R14: ffffffff85c0ca20 R15: ffff8880490732c0 FS: 000055557f60a400(0000) GS:ffff8880e5342000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055557f613c58 CR3: 000000000a09d000 CR4: 0000000000350ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __wait_on_freeing_inode+0x10f/0x350 insert_inode_locked+0x25f/0x890 __ext4_new_inode+0x223d/0x4cd0 ext4_mkdir+0x331/0xb30 vfs_mkdir+0x6d8/0xc00 filename_mkdirat+0x118/0x430 __x64_sys_mkdir+0x6e/0xd0 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8e86fa1c27 Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe3316cba8 EFLAGS: 00000202 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffe3316cc30 RCX: 00007f8e86fa1c27 RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00007ffe3316cc30 RBP: 00007ffe3316cc0c R08: 0000000000000000 R09: 0000000000000005 R10: 00007ffe3316c945 R11: 0000000000000202 R12: 0000000000000032 R13: 0000000000022d1c R14: 0000000000000003 R15: 00007ffe3316cc70 irq event stamp: 684769 hardirqs last enabled at (684769): [] _raw_spin_unlock_irqrestore+0x2c/0x50 hardirqs last disabled at (684768): [] _raw_spin_lock_irqsave+0x53/0x60 softirqs last enabled at (684764): [] kernel_fpu_end+0x59/0x70 softirqs last disabled at (684762): [] kernel_fpu_begin_mask+0x1bb/0x300 ---[ end trace 0000000000000000 ]--- audit: type=1400 audit(1768571804.184:18): avc: denied { write } for pid=6565 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 ======================================================= WARNING: The mand mount option has been deprecated and and is ignored by this kernel. Remove the mand option from the mount to silence this warning. ======================================================= netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. audit: type=1400 audit(1768571810.496:19): avc: denied { module_load } for pid=7085 comm="syz-executor.4" path="/syz-executor.4" dev="sda" ino=15936 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=system permissive=1 Invalid ELF header type: 3 != 1 Invalid ELF header type: 3 != 1 Invalid ELF header type: 3 != 1 Invalid ELF header type: 3 != 1 Invalid ELF header type: 3 != 1 Invalid ELF header type: 3 != 1 Invalid ELF header type: 3 != 1 Invalid ELF header type: 3 != 1 set_capacity_and_notify: 41 callbacks suppressed loop0: detected capacity change from 0 to 264192 EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop0): corrupt root inode, run e2fsck EXT4-fs (loop0): mount failed loop0: detected capacity change from 0 to 264192 EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop0): corrupt root inode, run e2fsck EXT4-fs (loop0): mount failed loop0: detected capacity change from 0 to 264192 EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem syz_tun: entered promiscuous mode EXT4-fs (loop0): corrupt root inode, run e2fsck EXT4-fs (loop0): mount failed syz_tun: left promiscuous mode loop0: detected capacity change from 0 to 264192 EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem syz_tun: entered promiscuous mode EXT4-fs (loop0): corrupt root inode, run e2fsck EXT4-fs (loop0): mount failed syz_tun: left promiscuous mode loop0: detected capacity change from 0 to 264192 EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem EXT4-fs (loop0): corrupt root inode, run e2fsck EXT4-fs (loop0): mount failed syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode syz_tun: entered promiscuous mode syz_tun: entered promiscuous mode syz_tun: left promiscuous mode syz_tun: left promiscuous mode