===================================== WARNING: bad unlock balance detected! 6.19.0-rc5-next-20260113 #1 Not tainted ------------------------------------- syz-executor.3/4469 is trying to release lock (rcu_read_lock) at: [] __wait_on_freeing_inode+0x105/0x350 but there are no more locks to release! other info that might help us debug this: 4 locks held by syz-executor.3/4469: #0: ffff88800fd5e3f8 (sb_writers#3){.+.+}-{0:0}, at: filename_create+0xf7/0x400 #1: ffff888044bb4698 (&type->i_mutex_dir_key#3/1){+.+.}-{4:4}, at: filename_create+0x1b1/0x400 #2: ffff88800fda2950 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0xe32/0x12d0 #3: ffffffff85c16898 (inode_hash_lock){+.+.}-{3:3}, at: insert_inode_locked+0xf9/0x890 stack backtrace: CPU: 0 UID: 0 PID: 4469 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260113 #1 PREEMPT(lazy) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 print_unlock_imbalance_bug+0x118/0x130 lock_release+0x1ee/0x270 __wait_on_freeing_inode+0x10a/0x350 insert_inode_locked+0x25f/0x890 __ext4_new_inode+0x223d/0x4cd0 ext4_symlink+0x406/0xb40 vfs_symlink+0x44b/0x840 do_symlinkat+0x153/0x440 __x64_sys_symlink+0x79/0xa0 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7eff473d5427 Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd288c9ed8 EFLAGS: 00000206 ORIG_RAX: 0000000000000058 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007eff473d5427 RDX: 00007ffd288c9fb3 RSI: 00007eff47430022 RDI: 00007ffd288c9fa0 RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd288c9d70 R10: 00007ffd288c9c27 R11: 0000000000000206 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd288c9fa0 ------------[ cut here ]------------ WARNING: kernel/rcu/tree_plugin.h:443 at __rcu_read_unlock+0x25f/0x5c0, CPU#0: syz-executor.3/4469 Modules linked in: CPU: 0 UID: 0 PID: 4469 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260113 #1 PREEMPT(lazy) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__rcu_read_unlock+0x25f/0x5c0 Code: f2 02 00 00 c7 43 58 01 00 00 00 bf 09 00 00 00 e8 a6 bb de ff 4d 85 f6 0f 84 73 fe ff ff e8 38 89 20 00 fb e9 68 fe ff ff 90 <0f> 0b 90 5b 5d 41 5c 41 5d 41 5e e9 61 f9 73 03 e8 0c 88 56 00 e9 RSP: 0018:ffff88804b8a79a0 EFLAGS: 00010286 RAX: 00000000ffffffff RBX: ffff8880167cd280 RCX: ffffffff815664c7 RDX: 0000000000000000 RSI: ffffffff815664d0 RDI: ffff8880167cd67c RBP: ffff8880167cd280 R08: 0000000000000000 R09: fffffbfff0ba6ff4 R10: 0000000000000000 R11: 0000000000000001 R12: ffff8880167cd280 R13: 0000000000000001 R14: ffffffff85c106c0 R15: ffff888044baebf0 FS: 0000555585993400(0000) GS:ffff8880e5342000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555585993708 CR3: 000000001ae16000 CR4: 0000000000350ef0 Call Trace: __wait_on_freeing_inode+0x10f/0x350 insert_inode_locked+0x25f/0x890 __ext4_new_inode+0x223d/0x4cd0 ext4_symlink+0x406/0xb40 vfs_symlink+0x44b/0x840 do_symlinkat+0x153/0x440 __x64_sys_symlink+0x79/0xa0 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7eff473d5427 Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd288c9ed8 EFLAGS: 00000206 ORIG_RAX: 0000000000000058 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007eff473d5427 RDX: 00007ffd288c9fb3 RSI: 00007eff47430022 RDI: 00007ffd288c9fa0 RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd288c9d70 R10: 00007ffd288c9c27 R11: 0000000000000206 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd288c9fa0 irq event stamp: 1173 hardirqs last enabled at (1173): [] _raw_spin_unlock_irqrestore+0x2c/0x50 hardirqs last disabled at (1172): [] _raw_spin_lock_irqsave+0x53/0x60 softirqs last enabled at (1168): [] kernel_fpu_end+0x59/0x70 softirqs last disabled at (1166): [] kernel_fpu_begin_mask+0x1bb/0x300 ---[ end trace 0000000000000000 ]--- netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. Bluetooth: hci1: unexpected cc 0x2029 length: 16 > 1 Bluetooth: hci1: unexpected cc 0x2029 length: 16 > 1 audit: type=1400 audit(1768293367.575:10): avc: denied { read } for pid=4636 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 process 'syz-executor.6' launched './file1' with NULL argv: empty string added Zero length message leads to an empty skb Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable tmpfs: Unknown parameter './file1' audit: type=1326 audit(1768293368.877:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4804 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2c0b03eb19 code=0x0 ======================================================= WARNING: The mand mount option has been deprecated and and is ignored by this kernel. Remove the mand option from the mount to silence this warning. ======================================================= audit: type=1326 audit(1768293369.707:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4804 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2c0b03eb19 code=0x0 audit: type=1326 audit(1768293369.794:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4847 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f03206cab19 code=0x0 audit: type=1326 audit(1768293369.814:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4859 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2c0b03eb19 code=0x0 Bluetooth: hci1: Controller not accepting commands anymore: ncmd = 0 Bluetooth: hci1: Injecting HCI hardware error event Bluetooth: hci1: hardware error 0x00 audit: type=1326 audit(1768293370.724:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4886 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2c0b03eb19 code=0x0 audit: type=1326 audit(1768293370.733:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4887 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f03206cab19 code=0x0 netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. audit: type=1326 audit(1768293371.619:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4918 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2c0b03eb19 code=0x0 netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. audit: type=1326 audit(1768293371.632:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4925 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7eff473d5b19 code=0x0 audit: type=1326 audit(1768293371.635:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4919 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f03206cab19 code=0x0 Bluetooth: hci1: Opcode 0x0c03 failed: -110 kauditd_printk_skb: 1 callbacks suppressed audit: type=1326 audit(1768293372.579:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4972 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7eff473d5b19 code=0x0 audit: type=1326 audit(1768293373.463:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4999 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7eff473d5b19 code=0x0 audit: type=1326 audit(1768293374.386:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5041 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7eff473d5b19 code=0x0 audit: type=1400 audit(1768293375.427:24): avc: denied { watch_reads } for pid=5092 comm="syz-executor.2" path="/syzkaller-testdir881711115/syzkaller.OY2do5/70/file0" dev="sda" ino=16007 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=dir permissive=1 audit: type=1400 audit(1768293375.745:25): avc: denied { tracepoint } for pid=5135 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1