------------[ cut here ]------------
WARNING: fs/namespace.c:1434 at mntput_no_expire+0x78e/0xbe0, CPU#1: syz-executor.5/111
Modules linked in:
CPU: 1 UID: 0 PID: 111 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:mntput_no_expire+0x78e/0xbe0
Code: 05 16 42 81 04 01 e8 31 f8 91 ff e9 41 fc ff ff e8 b7 50 b4 ff 31 ff 44 89 ee e8 dd 4b b4 ff 45 85 ed 79 09 e8 a3 50 b4 ff 90 <0f> 0b 90 e8 9a 50 b4 ff e8 75 f6 fb 02 31 ff 89 c5 89 c6 e8 ba 4b
RSP: 0018:ffff888046a2f9b8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 1ffff11008d45f3c RCX: ffffffff81bf96d3
RDX: ffff88800f415280 RSI: ffffffff81bf96dd RDI: 0000000000000005
RBP: ffff88801e53fa40 R08: 0000000000000001 R09: 0000000000000000
R10: 00000000ffffffff R11: 0000000000000001 R12: ffff888046a2fa20
R13: 00000000ffffffff R14: dead000000000100 R15: ffff88801e53fa40
FS: 0000000000000000(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2cf2a000 CR3: 000000004496c000 CR4: 0000000000350ef0
Call Trace:
namespace_unlock+0x7f1/0x810
put_mnt_ns+0xf5/0x120
free_nsproxy+0x3a/0x400
switch_task_namespaces+0xe2/0x100
do_exit+0x841/0x2970
do_group_exit+0xd3/0x2a0
get_signal+0x2315/0x2340
arch_do_signal_or_restart+0x80/0x790
irqentry_exit_to_user_mode+0x106/0x1c0
exc_page_fault+0xd9/0x180
asm_exc_page_fault+0x26/0x30
RIP: 0033:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 002b:000000002000021c EFLAGS: 00010217
RAX: 0000000000000000 RBX: 00007f1c5325ff60 RCX: 00007f1c5314cb19
RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240
RBP: 00007f1c531a6f6d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffe962e53af R14: 00007f1c506c2300 R15: 0000000000022000
irq event stamp: 1115
hardirqs last enabled at (1125): [] __up_console_sem+0x78/0x80
hardirqs last disabled at (1134): [] __up_console_sem+0x5d/0x80
softirqs last enabled at (1064): [] handle_softirqs+0x50c/0x770
softirqs last disabled at (1057): [] __irq_exit_rcu+0xc4/0x100
---[ end trace 0000000000000000 ]---
loop3: detected capacity change from 0 to 736
loop1: detected capacity change from 0 to 512
EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
ext4 filesystem being mounted at /syzkaller-testdir928183612/syzkaller.Byv8yT/4/file0 supports timestamps until 2038-01-19 (0x7fffffff)
loop4: detected capacity change from 0 to 1024
EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.
EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000.
kmemleak: Found object by alias at 0x607f1a6395b4
CPU: 1 UID: 0 PID: 4107 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
get_signal+0x2315/0x2340
arch_do_signal_or_restart+0x80/0x790
irqentry_exit_to_user_mode+0x106/0x1c0
asm_exc_general_protection+0x26/0x30
RIP: 0033:0x7fc544c6db21
Code: Unable to access opcode bytes at 0x7fc544c6daf7.
RSP: 002b:0000000020000080 EFLAGS: 00010217
RAX: 0000000000000000 RBX: 00007fc544d80f60 RCX: 00007fc544c6db19
RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000000140000
RBP: 00007fc544cc7f6d R08: 0000000020000140 R09: 0000000000000000
R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffd95eb51ef R14: 00007fc5421e3300 R15: 0000000000022000
kmemleak: Object (percpu) 0x607f1a6395b0 (size 8):
kmemleak: comm "syz-executor.6", pid 4111, jiffies 4294829531
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
percpu_ref_init+0x37/0x400
blk_alloc_queue+0x571/0x750
blk_mq_alloc_queue+0x170/0x280
__blk_mq_alloc_disk+0x2a/0x120
loop_add+0x494/0xb60
loop_probe+0x53/0x80
blk_probe_dev+0x10c/0x180
blk_request_module+0x16/0xb0
blkdev_get_no_open+0xa8/0x100
blkdev_open+0x143/0x400
do_dentry_open+0x71c/0x1420
vfs_open+0x82/0x3f0
path_openat+0x1c3f/0x2880
do_filp_open+0x1e8/0x450
do_sys_openat2+0x104/0x1b0
block device autoloading is deprecated and will be removed.
kmemleak: Found object by alias at 0x607f1a6395b4
CPU: 1 UID: 0 PID: 4092 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
get_signal+0x2315/0x2340
arch_do_signal_or_restart+0x80/0x790
irqentry_exit_to_user_mode+0x106/0x1c0
asm_exc_general_protection+0x26/0x30
RIP: 0033:0x7fc544c6db21
Code: Unable to access opcode bytes at 0x7fc544c6daf7.
RSP: 002b:0000000020000080 EFLAGS: 00010217
RAX: 0000000000000000 RBX: 00007fc544d80f60 RCX: 00007fc544c6db19
RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000000140000
RBP: 00007fc544cc7f6d R08: 0000000020000140 R09: 0000000000000000
R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffd95eb51ef R14: 00007fc5421e3300 R15: 0000000000022000
kmemleak: Object (percpu) 0x607f1a6395b0 (size 8):
kmemleak: comm "syz-executor.6", pid 4111, jiffies 4294829531
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
percpu_ref_init+0x37/0x400
blk_alloc_queue+0x571/0x750
blk_mq_alloc_queue+0x170/0x280
__blk_mq_alloc_disk+0x2a/0x120
loop_add+0x494/0xb60
loop_probe+0x53/0x80
blk_probe_dev+0x10c/0x180
blk_request_module+0x16/0xb0
blkdev_get_no_open+0xa8/0x100
blkdev_open+0x143/0x400
do_dentry_open+0x71c/0x1420
vfs_open+0x82/0x3f0
path_openat+0x1c3f/0x2880
do_filp_open+0x1e8/0x450
do_sys_openat2+0x104/0x1b0
program syz-executor.7 is using a deprecated SCSI ioctl, please convert it to SG_IO
ata1.00: invalid transfer count 0
program syz-executor.7 is using a deprecated SCSI ioctl, please convert it to SG_IO
ata1.00: non-matching transfer count (6656/0)
kmemleak: Found object by alias at 0x607f1a6395b4
CPU: 0 UID: 0 PID: 4123 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
__x64_sys_exit_group+0x3e/0x50
x64_sys_call+0x18c5/0x18d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fc544c6db19
Code: Unable to access opcode bytes at 0x7fc544c6daef.
RSP: 002b:00007ffd95eb5418 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fc544c6db19
RDX: 00007fc544c2072b RSI: ffffffffffffffbc RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000001 R14: 0000000000000001 R15: 00007ffd95eb5500
kmemleak: Object (percpu) 0x607f1a6395b0 (size 8):
kmemleak: comm "syz-executor.6", pid 4111, jiffies 4294829531
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
percpu_ref_init+0x37/0x400
blk_alloc_queue+0x571/0x750
blk_mq_alloc_queue+0x170/0x280
__blk_mq_alloc_disk+0x2a/0x120
loop_add+0x494/0xb60
loop_probe+0x53/0x80
blk_probe_dev+0x10c/0x180
blk_request_module+0x16/0xb0
blkdev_get_no_open+0xa8/0x100
blkdev_open+0x143/0x400
do_dentry_open+0x71c/0x1420
vfs_open+0x82/0x3f0
path_openat+0x1c3f/0x2880
do_filp_open+0x1e8/0x450
do_sys_openat2+0x104/0x1b0