Process accounting resumed
------------[ cut here ]------------
WARNING: fs/namespace.c:1375 at cleanup_mnt+0x33f/0x430, CPU#1: syz-executor.7/285
Modules linked in:
CPU: 1 UID: 0 PID: 285 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:cleanup_mnt+0x33f/0x430
Code: c7 a0 45 d1 85 e8 01 7c fa 02 49 8d 7d 40 5b 48 c7 c6 10 e2 be 81 5d 41 5c 41 5d 41 5e 41 5f e9 57 b3 9c ff e8 82 46 b4 ff 90 <0f> 0b 90 e9 e6 fc ff ff e8 74 46 b4 ff 4c 89 ef e8 6c d7 06 00 e9
RSP: 0018:ffff88801a3f7e20 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffffffff81bf9de5
RDX: ffff88800a649b80 RSI: ffffffff81bfa0fe RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800a64a458
R13: ffff888009d2f340 R14: 0000000000000001 R15: ffff888009d2f380
FS: 0000555575f5e400(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555575f67c58 CR3: 000000003df11000 CR4: 0000000000350ef0
Call Trace:
task_work_run+0x172/0x280
exit_to_user_mode_loop+0xef/0x110
do_syscall_64+0x2f7/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb7f75dcf87
Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd526eba78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
RAX: 0000000000000000 RBX: 000000000000000a RCX: 00007fb7f75dcf87
RDX: 00007ffd526ebb49 RSI: 000000000000000a RDI: 00007ffd526ebb40
RBP: 00007ffd526ebb40 R08: 00000000ffffffff R09: 00007ffd526eb910
R10: 0000555575f5fc7b R11: 0000000000000246 R12: 00007fb7f7635105
R13: 00007ffd526ecc00 R14: 0000555575f5fc20 R15: 00007ffd526ecc40
irq event stamp: 160817
hardirqs last enabled at (160827): [] __up_console_sem+0x78/0x80
hardirqs last disabled at (160836): [] __up_console_sem+0x5d/0x80
softirqs last enabled at (160786): [] handle_softirqs+0x50c/0x770
softirqs last disabled at (160393): [] __irq_exit_rcu+0xc4/0x100
---[ end trace 0000000000000000 ]---
Process accounting resumed
audit: type=1326 audit(1756460846.629:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3956 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f057484eb19 code=0x0
audit: type=1326 audit(1756460846.672:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3968 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f98c6bd2b19 code=0x0
kmemleak: Found object by alias at 0x607f1a639548
CPU: 1 UID: 0 PID: 3953 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
__x64_sys_exit_group+0x3e/0x50
x64_sys_call+0x18c5/0x18d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6952641b19
Code: Unable to access opcode bytes at 0x7f6952641aef.
RSP: 002b:00007ffc46836018 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f6952641b19
RDX: 00007f69525f472b RSI: ffffffffffffffbc RDI: 0000000000000000
RBP: 0000000000000000 R08: 00007f6952759b18 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000001 R14: 0000000000000001 R15: 00007ffc46836100
kmemleak: Object (percpu) 0x607f1a639544 (size 8):
kmemleak: comm "syz-executor.4", pid 3959, jiffies 4294791772
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
alloc_vfsmnt+0x135/0x6e0
clone_mnt+0x6c/0xb70
mnt_clone_internal+0x60/0xf0
acct_on+0x207/0x870
__x64_sys_acct+0xb1/0x220
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
kmemleak: Found object by alias at 0x607f1a6399a4
CPU: 1 UID: 0 PID: 3978 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
get_signal+0x2315/0x2340
arch_do_signal_or_restart+0x80/0x790
exit_to_user_mode_loop+0x8b/0x110
do_syscall_64+0x2f7/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb7f75dbb19
Code: Unable to access opcode bytes at 0x7fb7f75dbaef.
RSP: 002b:00007fb7f4b51218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007fb7f76eef68 RCX: 00007fb7f75dbb19
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb7f76eef68
RBP: 00007fb7f76eef60 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7f76eef6c
R13: 00007ffd526ec92f R14: 00007fb7f4b51300 R15: 0000000000022000
kmemleak: Object (percpu) 0x607f1a6399a0 (size 8):
kmemleak: comm "syz-executor.3", pid 3984, jiffies 4294791998
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
perf_trace_event_init+0x366/0xa10
perf_trace_init+0x1a4/0x2f0
perf_tp_event_init+0xa6/0x120
perf_try_init_event+0x140/0x9f0
perf_event_alloc.part.0+0x118e/0x45f0
__do_sys_perf_event_open+0x719/0x2c20
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
audit: type=1326 audit(1756460847.548:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3989 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f057484eb19 code=0x0
kmemleak: Found object by alias at 0x607f1a63954c
CPU: 0 UID: 0 PID: 3997 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
__x64_sys_exit_group+0x3e/0x50
x64_sys_call+0x18c5/0x18d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fa178c09b19
Code: Unable to access opcode bytes at 0x7fa178c09aef.
RSP: 002b:00007ffd4f4da198 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fa178c09b19
RDX: 00007fa178bbc72b RSI: ffffffffffffffbc RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000001b2d824390 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd4f4da280
kmemleak: Object (percpu) 0x607f1a639548 (size 8):
kmemleak: comm "syz-executor.1", pid 4000, jiffies 4294792751
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
perf_trace_event_init+0x366/0xa10
perf_trace_init+0x1a4/0x2f0
perf_tp_event_init+0xa6/0x120
perf_try_init_event+0x140/0x9f0
perf_event_alloc.part.0+0x118e/0x45f0
__do_sys_perf_event_open+0x719/0x2c20
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
audit: type=1326 audit(1756460848.456:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4034 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f057484eb19 code=0x0
kmemleak: Found object by alias at 0x607f1a6399a4
CPU: 0 UID: 0 PID: 4076 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
__x64_sys_exit_group+0x3e/0x50
x64_sys_call+0x18c5/0x18d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb7f75dbb19
Code: Unable to access opcode bytes at 0x7fb7f75dbaef.
RSP: 002b:00007ffd526ecb58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fb7f75dbb19
RDX: 00007fb7f758e72b RSI: ffffffffffffffbc RDI: 0000000000000000
RBP: 0000000000000000 R08: 00007fb7f76f3ad0 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000001 R14: 0000000000000001 R15: 00007ffd526ecc40
kmemleak: Object (percpu) 0x607f1a6399a0 (size 8):
kmemleak: comm "syz-executor.1", pid 4081, jiffies 4294794582
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
percpu_ref_init+0x37/0x400
io_uring_setup+0x44c/0x2000
__x64_sys_io_uring_setup+0xc8/0x170
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
kmemleak: Found object by alias at 0x607f1a6399a4
CPU: 1 UID: 0 PID: 4097 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
get_signal+0x2315/0x2340
arch_do_signal_or_restart+0x80/0x790
exit_to_user_mode_loop+0x8b/0x110
do_syscall_64+0x2f7/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb7f75dbb19
Code: Unable to access opcode bytes at 0x7fb7f75dbaef.
RSP: 002b:00007fb7f4b51218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007fb7f76eef68 RCX: 00007fb7f75dbb19
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb7f76eef68
RBP: 00007fb7f76eef60 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7f76eef6c
R13: 00007ffd526ec92f R14: 00007fb7f4b51300 R15: 0000000000022000
kmemleak: Object (percpu) 0x607f1a6399a0 (size 8):
kmemleak: comm "syz-executor.1", pid 4107, jiffies 4294795528
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
percpu_ref_init+0x37/0x400
io_uring_setup+0x44c/0x2000
__x64_sys_io_uring_setup+0xc8/0x170
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
sg_write: data in/out 3223822/4 bytes for SCSI command 0x0-- guessing data in;
program syz-executor.6 not setting count and/or reply_len properly
sg_write: data in/out 3223822/4 bytes for SCSI command 0x0-- guessing data in;
program syz-executor.6 not setting count and/or reply_len properly
sg_write: data in/out 3223822/4 bytes for SCSI command 0x0-- guessing data in;
program syz-executor.6 not setting count and/or reply_len properly
sg_write: data in/out 3223822/4 bytes for SCSI command 0x0-- guessing data in;
program syz-executor.6 not setting count and/or reply_len properly