------------[ cut here ]------------ refcount_t: saturated; leaking memory. WARNING: lib/refcount.c:22 at refcount_warn_saturate+0x8c/0x110 lib/refcount.c:22, CPU#1: syz.0.4477/22512 Modules linked in: CPU: 1 UID: 0 PID: 22512 Comm: syz.0.4477 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)} Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 RIP: 0010:refcount_warn_saturate+0x8c/0x110 lib/refcount.c:22 Code: 75 68 e8 b7 e3 0f fd 48 8d 3d 50 d4 24 0b 67 48 0f b9 3a eb 66 85 db 74 3e 83 fb 01 75 4c e8 9b e3 0f fd 48 8d 3d 44 d4 24 0b <67> 48 0f b9 3a eb 4a e8 88 e3 0f fd 48 8d 3d 41 d4 24 0b 67 48 0f RSP: 0018:ffffc9000dc8f6f8 EFLAGS: 00010283 RAX: ffffffff84b52185 RBX: 0000000000000001 RCX: 0000000000080000 RDX: ffffc90010c05000 RSI: 0000000000000b7b RDI: ffffffff8fd9f5d0 RBP: 00000000ffffffff R08: ffff888054658000 R09: 0000000000000005 R10: 0000000000000100 R11: 0000000000000004 R12: ffff88802cf63418 R13: ffffffff99c7a8c0 R14: ffff88802cf63410 R15: ffff88802cf63400 FS: 00007f8c71b966c0(0000) GS:ffff888125b5b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8c73925f40 CR3: 000000002a33a000 CR4: 00000000003526f0 DR0: ffffffffffffffff DR1: 00000000000001f8 DR2: 0000000000000002 DR3: ffffffffefffff15 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: __refcount_add include/linux/refcount.h:-1 [inline] __refcount_inc include/linux/refcount.h:366 [inline] refcount_inc include/linux/refcount.h:383 [inline] kref_get include/linux/kref.h:45 [inline] dvb_device_get drivers/media/dvb-core/dvbdev.c:621 [inline] dvb_device_open+0x31f/0x360 drivers/media/dvb-core/dvbdev.c:106 chrdev_open+0x4d0/0x5f0 fs/char_dev.c:411 do_dentry_open+0x83d/0x13e0 fs/open.c:947 vfs_open+0x3b/0x350 fs/open.c:1079 do_open fs/namei.c:4699 [inline] path_openat+0x2e43/0x38a0 fs/namei.c:4858 do_file_open+0x23e/0x4a0 fs/namei.c:4887 do_sys_openat2+0x113/0x200 fs/open.c:1364 do_sys_open fs/open.c:1370 [inline] __do_sys_openat fs/open.c:1386 [inline] __se_sys_openat fs/open.c:1381 [inline] __x64_sys_openat+0x138/0x170 fs/open.c:1381 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8c738fd60e Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 RSP: 002b:00007f8c71b95b28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f8c71b966c0 RCX: 00007f8c738fd60e RDX: 0000000000040002 RSI: 00007f8c71b95c00 RDI: ffffffffffffff9c RBP: 00007f8c71b95c00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: cccccccccccccccd R13: 00007f8c73bb6038 R14: 00007f8c73bb5fa0 R15: 00007ffd1f6c6348 ---------------- Code disassembly (best guess): 0: 75 68 jne 0x6a 2: e8 b7 e3 0f fd call 0xfd0fe3be 7: 48 8d 3d 50 d4 24 0b lea 0xb24d450(%rip),%rdi # 0xb24d45e e: 67 48 0f b9 3a ud1 (%edx),%rdi 13: eb 66 jmp 0x7b 15: 85 db test %ebx,%ebx 17: 74 3e je 0x57 19: 83 fb 01 cmp $0x1,%ebx 1c: 75 4c jne 0x6a 1e: e8 9b e3 0f fd call 0xfd0fe3be 23: 48 8d 3d 44 d4 24 0b lea 0xb24d444(%rip),%rdi # 0xb24d46e * 2a: 67 48 0f b9 3a ud1 (%edx),%rdi <-- trapping instruction 2f: eb 4a jmp 0x7b 31: e8 88 e3 0f fd call 0xfd0fe3be 36: 48 8d 3d 41 d4 24 0b lea 0xb24d441(%rip),%rdi # 0xb24d47e 3d: 67 addr32 3e: 48 rex.W 3f: 0f .byte 0xf