------------[ cut here ]------------ WARNING: fs/namespace.c:1434 at mntput_no_expire+0x78e/0xbe0, CPU#0: kworker/0:2/59 Modules linked in: CPU: 0 UID: 0 PID: 59 Comm: kworker/0:2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Workqueue: events free_ipc RIP: 0010:mntput_no_expire+0x78e/0xbe0 Code: 05 16 42 81 04 01 e8 31 f8 91 ff e9 41 fc ff ff e8 b7 50 b4 ff 31 ff 44 89 ee e8 dd 4b b4 ff 45 85 ed 79 09 e8 a3 50 b4 ff 90 <0f> 0b 90 e8 9a 50 b4 ff e8 75 f6 fb 02 31 ff 89 c5 89 c6 e8 ba 4b RSP: 0018:ffff88800a797b48 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 1ffff110014f2f6e RCX: ffffffff81bf96d3 RDX: ffff88800a7ed280 RSI: ffffffff81bf96dd RDI: 0000000000000005 RBP: ffff88800d62f500 R08: 0000000000000001 R09: 0000000000000000 R10: 00000000ffffffff R11: 0000000000000001 R12: ffff88800a797bb0 R13: 00000000ffffffff R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c00655f7d8 CR3: 000000001d590000 CR4: 0000000000350ef0 Call Trace: mntput+0x6b/0x90 free_ipc+0x179/0x2b0 process_one_work+0x8e1/0x19c0 worker_thread+0x67e/0xe90 kthread+0x3c8/0x740 ret_from_fork+0x34b/0x430 ret_from_fork_asm+0x1a/0x30 irq event stamp: 60533 hardirqs last enabled at (60543): [] __up_console_sem+0x78/0x80 hardirqs last disabled at (60552): [] __up_console_sem+0x5d/0x80 softirqs last enabled at (60566): [] handle_softirqs+0x50c/0x770 softirqs last disabled at (60561): [] __irq_exit_rcu+0xc4/0x100 ---[ end trace 0000000000000000 ]--- kmemleak: Found object by alias at 0x607f1a638e08 CPU: 0 UID: 0 PID: 4180 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lookup_object+0x94/0xb0 delete_object_full+0x27/0x70 free_percpu+0x30/0x1160 futex_hash_free+0x38/0xc0 mmput+0x2d3/0x390 do_exit+0x79d/0x2970 do_group_exit+0xd3/0x2a0 get_signal+0x2315/0x2340 arch_do_signal_or_restart+0x80/0x790 exit_to_user_mode_loop+0x8b/0x110 do_syscall_64+0x2f7/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8cc30cbb19 Code: Unable to access opcode bytes at 0x7f8cc30cbaef. RSP: 002b:00007f8cc0620218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f8cc31df028 RCX: 00007f8cc30cbb19 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f8cc31df028 RBP: 00007f8cc31df020 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8cc31df02c R13: 00007ffdcbbddabf R14: 00007f8cc0620300 R15: 0000000000022000 kmemleak: Object (percpu) 0x607f1a638e04 (size 8): kmemleak: comm "syz-executor.5", pid 4167, jiffies 4294818788 kmemleak: min_count = 1 kmemleak: count = 0 kmemleak: flags = 0x21 kmemleak: checksum = 0 kmemleak: backtrace: pcpu_alloc_noprof+0x87a/0x1170 alloc_vfsmnt+0x135/0x6e0 vfs_create_mount.part.0+0x40/0x440 fc_mount_longterm+0x126/0x160 mq_init_ns+0x42e/0x630 copy_ipcs+0x38d/0x630 create_new_namespaces+0x210/0xab0 unshare_nsproxy_namespaces+0xc0/0x200 ksys_unshare+0x468/0xa10 __x64_sys_unshare+0x31/0x40 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f