------------[ cut here ]------------ DEBUG_RWSEMS_WARN_ON(!is_rwsem_reader_owned(sem)): count = 0x0, magic = 0xffff0000e65e4cf0, owner = 0x0, curr 0xffff0000c5c19b40, list empty WARNING: CPU: 0 PID: 13944 at kernel/locking/rwsem.c:1323 __up_read+0x530/0x5d8 kernel/locking/rwsem.c:1323 Modules linked in: CPU: 0 PID: 13944 Comm: syz-executor242 Not tainted 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __up_read+0x530/0x5d8 kernel/locking/rwsem.c:1323 lr : __up_read+0x530/0x5d8 kernel/locking/rwsem.c:1323 sp : ffff800021d37840 x29: ffff800021d378c0 x28: 1ffff0000282e06b x27: 1ffff000043a6f0c x26: dfff800000000000 x25: ffff800014170000 x24: ffff800021d37860 x23: ffff0000c5c19b40 x22: 0000000000000000 x21: ffff0000e65e4d48 x20: ffff0000e65e4cf0 x19: ffff0000e65e4cf0 x18: 0000000000000002 x17: 0000000040000000 x16: ffff8000111bc798 x15: 0000000000000002 x14: 0000000000ff0100 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000000 x10: 0000000000000000 x9 : 6a829a92012cba00 x8 : 6a829a92012cba00 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000080 x4 : 0000000000000000 x3 : ffff80000850433c x2 : 0000000000000001 x1 : 0000000100000000 x0 : 000000000000008c Call trace: __up_read+0x530/0x5d8 kernel/locking/rwsem.c:1323 up_read+0x94/0xe8 kernel/locking/rwsem.c:1594 inode_unlock_shared include/linux/fs.h:802 [inline] lookup_slow+0x68/0x80 fs/namei.c:1681 walk_component+0x2b0/0x3a8 fs/namei.c:1976 lookup_last fs/namei.c:2431 [inline] path_lookupat+0x13c/0x3d0 fs/namei.c:2455 filename_lookup+0x180/0x414 fs/namei.c:2484 user_path_at_empty+0x5c/0x1a0 fs/namei.c:2883 user_path_at include/linux/namei.h:57 [inline] do_mount fs/namespace.c:3354 [inline] __do_sys_mount fs/namespace.c:3565 [inline] __se_sys_mount fs/namespace.c:3542 [inline] __arm64_sys_mount+0x4e0/0x5e4 fs/namespace.c:3542 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 130 hardirqs last enabled at (129): [] raw_spin_rq_unlock_irq kernel/sched/sched.h:1338 [inline] hardirqs last enabled at (129): [] finish_lock_switch+0xb0/0x1c4 kernel/sched/core.c:4784 hardirqs last disabled at (130): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (112): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (112): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (71): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (71): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (71): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (71): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace a1de997c18ae7ff0 ]--- ------------[ cut here ]------------ DEBUG_RWSEMS_WARN_ON(tmp < 0): count = 0xffffffffffffff00, magic = 0xffff0000e65e4cf0, owner = 0x0, curr 0xffff0000c5c19b40, list empty WARNING: CPU: 0 PID: 13944 at kernel/locking/rwsem.c:1328 __up_read+0x390/0x5d8 kernel/locking/rwsem.c:1328 Modules linked in: CPU: 0 PID: 13944 Comm: syz-executor242 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __up_read+0x390/0x5d8 kernel/locking/rwsem.c:1328 lr : __up_read+0x390/0x5d8 kernel/locking/rwsem.c:1328 sp : ffff800021d37840 x29: ffff800021d378c0 x28: ffffffffffffff00 x27: 1ffff000043a6f0c x26: dfff800000000000 x25: ffff0000e65e4cf0 x24: ffff0000e65e4d48 x23: 1fffe0001ccbc99f x22: ffffffffffffff00 x21: 0000000000000000 x20: ffff0000c5c19b40 x19: ffff0000e65e4cf0 x18: 0000000000000002 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000ffffffff x14: 0000000000ff0100 x13: 0000000000000001 x12: 0000000000ff0100 x11: 0000000000000001 x10: 0000000000000000 x9 : 6a829a92012cba00 x8 : 6a829a92012cba00 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff800021d37138 x4 : ffff80001424f400 x3 : ffff80000a723764 x2 : ffff0001a10c5d50 x1 : 0000000000000001 x0 : 0000000000000087 Call trace: __up_read+0x390/0x5d8 kernel/locking/rwsem.c:1328 up_read+0x94/0xe8 kernel/locking/rwsem.c:1594 inode_unlock_shared include/linux/fs.h:802 [inline] lookup_slow+0x68/0x80 fs/namei.c:1681 walk_component+0x2b0/0x3a8 fs/namei.c:1976 lookup_last fs/namei.c:2431 [inline] path_lookupat+0x13c/0x3d0 fs/namei.c:2455 filename_lookup+0x180/0x414 fs/namei.c:2484 user_path_at_empty+0x5c/0x1a0 fs/namei.c:2883 user_path_at include/linux/namei.h:57 [inline] do_mount fs/namespace.c:3354 [inline] __do_sys_mount fs/namespace.c:3565 [inline] __se_sys_mount fs/namespace.c:3542 [inline] __arm64_sys_mount+0x4e0/0x5e4 fs/namespace.c:3542 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 165 hardirqs last enabled at (165): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (165): [] exit_to_kernel_mode+0xe0/0x168 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (164): [] preempt_schedule_irq+0xac/0x214 kernel/sched/core.c:6781 softirqs last enabled at (160): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (160): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (133): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (133): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (133): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (133): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace a1de997c18ae7ff1 ]---