BUG: Bad rss-counter state mm:000000006413766c type:MM_FILEPAGES val:-39 Comm:modprobe Pid:4069
BUG: Bad rss-counter state mm:000000006413766c type:MM_ANONPAGES val:-28 Comm:modprobe Pid:4069
BUG: Bad rss-counter state mm:000000007a679ae4 type:MM_FILEPAGES val:-8 Comm:modprobe Pid:4077
BUG: Bad rss-counter state mm:000000007a679ae4 type:MM_ANONPAGES val:-16 Comm:modprobe Pid:4077
kmemleak: Found object by alias at 0x607f1a639c50
CPU: 0 UID: 0 PID: 4085 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
get_signal+0x2315/0x2340
arch_do_signal_or_restart+0x80/0x790
exit_to_user_mode_loop+0x8b/0x110
do_syscall_64+0x2f7/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f18a279db19
Code: Unable to access opcode bytes at 0x7f18a279daef.
RSP: 002b:00007f189fd13218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007f18a28b0f68 RCX: 00007f18a279db19
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f18a28b0f68
RBP: 00007f18a28b0f60 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f18a28b0f6c
R13: 00007ffc2acef77f R14: 00007f189fd13300 R15: 0000000000022000
kmemleak: Object (percpu) 0x607f1a639c44 (size 16):
kmemleak: comm "kworker/u10:3", pid 4092, jiffies 4294805627
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
__percpu_counter_init_many+0x44/0x360
mm_init+0xcac/0x1170
mm_alloc+0xa0/0xd0
alloc_bprm+0x2e3/0x6e0
kernel_execve+0xb0/0x3d0
call_usermodehelper_exec_async+0x25f/0x4e0
ret_from_fork+0x34b/0x430
ret_from_fork_asm+0x1a/0x30
kmemleak: Found object by alias at 0x607f1a639c4c
CPU: 0 UID: 0 PID: 4111 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
__x64_sys_exit_group+0x3e/0x50
x64_sys_call+0x18c5/0x18d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fbbda38cb19
Code: Unable to access opcode bytes at 0x7fbbda38caef.
RSP: 002b:00007ffd165fe828 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fbbda38cb19
RDX: 00007fbbda33f72b RSI: ffffffffffffffbc RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000001b2d022b3c R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd165fe910
kmemleak: Object (percpu) 0x607f1a639c44 (size 16):
kmemleak: comm "syz-executor.4", pid 284, jiffies 4294814715
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
__percpu_counter_init_many+0x44/0x360
mm_init+0xcac/0x1170
copy_process+0x3ab7/0x73c0
kernel_clone+0xea/0x7f0
__do_sys_clone+0xce/0x120
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
kmemleak: Found object by alias at 0x607f1a639c4c
CPU: 1 UID: 0 PID: 4141 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
__x64_sys_exit_group+0x3e/0x50
x64_sys_call+0x18c5/0x18d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fbbda38cb19
Code: Unable to access opcode bytes at 0x7fbbda38caef.
RSP: 002b:00007ffd165fe828 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fbbda38cb19
RDX: 00007fbbda33f72b RSI: ffffffffffffffbc RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000001b2d022ac0 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd165fe910
kmemleak: Object (percpu) 0x607f1a639c44 (size 16):
kmemleak: comm "syz-executor.0", pid 282, jiffies 4294815007
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
__percpu_counter_init_many+0x44/0x360
mm_init+0xcac/0x1170
copy_process+0x3ab7/0x73c0
kernel_clone+0xea/0x7f0
__do_sys_clone+0xce/0x120
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
kmemleak: Found object by alias at 0x607f1a639c50
CPU: 0 UID: 0 PID: 4107 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
__x64_sys_exit_group+0x3e/0x50
x64_sys_call+0x18c5/0x18d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f18a279db19
Code: Unable to access opcode bytes at 0x7f18a279daef.
RSP: 002b:00007ffc2acef9a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f18a279db19
RDX: 00007f18a275072b RSI: ffffffffffffffbc RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000001b2d121920 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffc2acefa90
kmemleak: Object (percpu) 0x607f1a639c44 (size 16):
kmemleak: comm "kworker/u10:5", pid 4148, jiffies 4294815125
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
__percpu_counter_init_many+0x44/0x360
mm_init+0xcac/0x1170
mm_alloc+0xa0/0xd0
alloc_bprm+0x2e3/0x6e0
kernel_execve+0xb0/0x3d0
call_usermodehelper_exec_async+0x25f/0x4e0
ret_from_fork+0x34b/0x430
ret_from_fork_asm+0x1a/0x30
BUG: Bad rss-counter state mm:00000000fa32417c type:MM_FILEPAGES val:13 Comm:modprobe Pid:4148
BUG: Bad rss-counter state mm:00000000fa32417c type:MM_ANONPAGES val:10 Comm:modprobe Pid:4148
kmemleak: Found object by alias at 0x607f1a639c4c
CPU: 1 UID: 0 PID: 4161 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
get_signal+0x2315/0x2340
arch_do_signal_or_restart+0x80/0x790
exit_to_user_mode_loop+0x8b/0x110
do_syscall_64+0x2f7/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fbbda38cb19
Code: Unable to access opcode bytes at 0x7fbbda38caef.
RSP: 002b:00007fbbd7902218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 00007fbbda49ff68 RCX: 00007fbbda38cb19
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fbbda49ff6c
RBP: 00007fbbda49ff60 R08: 000000000000000e R09: 0000000000000000
R10: 00000000000000cc R11: 0000000000000246 R12: 00007fbbda49ff6c
R13: 00007ffd165fe5ff R14: 00007fbbd7902300 R15: 0000000000022000
kmemleak: Object (percpu) 0x607f1a639c44 (size 16):
kmemleak: comm "kworker/u10:3", pid 4163, jiffies 4294815246
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
__percpu_counter_init_many+0x44/0x360
mm_init+0xcac/0x1170
mm_alloc+0xa0/0xd0
alloc_bprm+0x2e3/0x6e0
kernel_execve+0xb0/0x3d0
call_usermodehelper_exec_async+0x25f/0x4e0
ret_from_fork+0x34b/0x430
ret_from_fork_asm+0x1a/0x30
BUG: Bad rss-counter state mm:00000000154b4eb6 type:MM_FILEPAGES val:-3 Comm:iou-sqp-4150 Pid:4152
BUG: Bad rss-counter state mm:00000000154b4eb6 type:MM_ANONPAGES val:16 Comm:iou-sqp-4150 Pid:4152
BUG: Bad rss-counter state mm:00000000116e47f2 type:MM_FILEPAGES val:-17 Comm:modprobe Pid:4163
BUG: Bad rss-counter state mm:00000000116e47f2 type:MM_ANONPAGES val:-10 Comm:modprobe Pid:4163
kmemleak: Found object by alias at 0x607f1a639c48
CPU: 0 UID: 0 PID: 4112 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
get_signal+0x2315/0x2340
arch_do_signal_or_restart+0x80/0x790
exit_to_user_mode_loop+0x8b/0x110
do_syscall_64+0x2f7/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f8765f8cb19
Code: Unable to access opcode bytes at 0x7f8765f8caef.
RSP: 002b:00007f8763502218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007f876609ff68 RCX: 00007f8765f8cb19
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f876609ff68
RBP: 00007f876609ff60 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f876609ff6c
R13: 00007ffea61227ef R14: 00007f8763502300 R15: 0000000000022000
kmemleak: Object (percpu) 0x607f1a639c44 (size 16):
kmemleak: comm "systemd-udevd", pid 112, jiffies 4294815394
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
__percpu_counter_init_many+0x44/0x360
mm_init+0xcac/0x1170
copy_process+0x3ab7/0x73c0
kernel_clone+0xea/0x7f0
__do_sys_clone+0xce/0x120
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f