BUG: Bad rss-counter state mm:000000006413766c type:MM_FILEPAGES val:-39 Comm:modprobe Pid:4069 BUG: Bad rss-counter state mm:000000006413766c type:MM_ANONPAGES val:-28 Comm:modprobe Pid:4069 BUG: Bad rss-counter state mm:000000007a679ae4 type:MM_FILEPAGES val:-8 Comm:modprobe Pid:4077 BUG: Bad rss-counter state mm:000000007a679ae4 type:MM_ANONPAGES val:-16 Comm:modprobe Pid:4077 kmemleak: Found object by alias at 0x607f1a639c50 CPU: 0 UID: 0 PID: 4085 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lookup_object+0x94/0xb0 delete_object_full+0x27/0x70 free_percpu+0x30/0x1160 futex_hash_free+0x38/0xc0 mmput+0x2d3/0x390 do_exit+0x79d/0x2970 do_group_exit+0xd3/0x2a0 get_signal+0x2315/0x2340 arch_do_signal_or_restart+0x80/0x790 exit_to_user_mode_loop+0x8b/0x110 do_syscall_64+0x2f7/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f18a279db19 Code: Unable to access opcode bytes at 0x7f18a279daef. RSP: 002b:00007f189fd13218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f18a28b0f68 RCX: 00007f18a279db19 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f18a28b0f68 RBP: 00007f18a28b0f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f18a28b0f6c R13: 00007ffc2acef77f R14: 00007f189fd13300 R15: 0000000000022000 kmemleak: Object (percpu) 0x607f1a639c44 (size 16): kmemleak: comm "kworker/u10:3", pid 4092, jiffies 4294805627 kmemleak: min_count = 1 kmemleak: count = 0 kmemleak: flags = 0x21 kmemleak: checksum = 0 kmemleak: backtrace: pcpu_alloc_noprof+0x87a/0x1170 __percpu_counter_init_many+0x44/0x360 mm_init+0xcac/0x1170 mm_alloc+0xa0/0xd0 alloc_bprm+0x2e3/0x6e0 kernel_execve+0xb0/0x3d0 call_usermodehelper_exec_async+0x25f/0x4e0 ret_from_fork+0x34b/0x430 ret_from_fork_asm+0x1a/0x30 kmemleak: Found object by alias at 0x607f1a639c4c CPU: 0 UID: 0 PID: 4111 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lookup_object+0x94/0xb0 delete_object_full+0x27/0x70 free_percpu+0x30/0x1160 futex_hash_free+0x38/0xc0 mmput+0x2d3/0x390 do_exit+0x79d/0x2970 do_group_exit+0xd3/0x2a0 __x64_sys_exit_group+0x3e/0x50 x64_sys_call+0x18c5/0x18d0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fbbda38cb19 Code: Unable to access opcode bytes at 0x7fbbda38caef. RSP: 002b:00007ffd165fe828 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fbbda38cb19 RDX: 00007fbbda33f72b RSI: ffffffffffffffbc RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000001b2d022b3c R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd165fe910 kmemleak: Object (percpu) 0x607f1a639c44 (size 16): kmemleak: comm "syz-executor.4", pid 284, jiffies 4294814715 kmemleak: min_count = 1 kmemleak: count = 0 kmemleak: flags = 0x21 kmemleak: checksum = 0 kmemleak: backtrace: pcpu_alloc_noprof+0x87a/0x1170 __percpu_counter_init_many+0x44/0x360 mm_init+0xcac/0x1170 copy_process+0x3ab7/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f kmemleak: Found object by alias at 0x607f1a639c4c CPU: 1 UID: 0 PID: 4141 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lookup_object+0x94/0xb0 delete_object_full+0x27/0x70 free_percpu+0x30/0x1160 futex_hash_free+0x38/0xc0 mmput+0x2d3/0x390 do_exit+0x79d/0x2970 do_group_exit+0xd3/0x2a0 __x64_sys_exit_group+0x3e/0x50 x64_sys_call+0x18c5/0x18d0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fbbda38cb19 Code: Unable to access opcode bytes at 0x7fbbda38caef. RSP: 002b:00007ffd165fe828 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fbbda38cb19 RDX: 00007fbbda33f72b RSI: ffffffffffffffbc RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000001b2d022ac0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd165fe910 kmemleak: Object (percpu) 0x607f1a639c44 (size 16): kmemleak: comm "syz-executor.0", pid 282, jiffies 4294815007 kmemleak: min_count = 1 kmemleak: count = 0 kmemleak: flags = 0x21 kmemleak: checksum = 0 kmemleak: backtrace: pcpu_alloc_noprof+0x87a/0x1170 __percpu_counter_init_many+0x44/0x360 mm_init+0xcac/0x1170 copy_process+0x3ab7/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f kmemleak: Found object by alias at 0x607f1a639c50 CPU: 0 UID: 0 PID: 4107 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lookup_object+0x94/0xb0 delete_object_full+0x27/0x70 free_percpu+0x30/0x1160 futex_hash_free+0x38/0xc0 mmput+0x2d3/0x390 do_exit+0x79d/0x2970 do_group_exit+0xd3/0x2a0 __x64_sys_exit_group+0x3e/0x50 x64_sys_call+0x18c5/0x18d0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f18a279db19 Code: Unable to access opcode bytes at 0x7f18a279daef. RSP: 002b:00007ffc2acef9a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f18a279db19 RDX: 00007f18a275072b RSI: ffffffffffffffbc RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000001b2d121920 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffc2acefa90 kmemleak: Object (percpu) 0x607f1a639c44 (size 16): kmemleak: comm "kworker/u10:5", pid 4148, jiffies 4294815125 kmemleak: min_count = 1 kmemleak: count = 0 kmemleak: flags = 0x21 kmemleak: checksum = 0 kmemleak: backtrace: pcpu_alloc_noprof+0x87a/0x1170 __percpu_counter_init_many+0x44/0x360 mm_init+0xcac/0x1170 mm_alloc+0xa0/0xd0 alloc_bprm+0x2e3/0x6e0 kernel_execve+0xb0/0x3d0 call_usermodehelper_exec_async+0x25f/0x4e0 ret_from_fork+0x34b/0x430 ret_from_fork_asm+0x1a/0x30 BUG: Bad rss-counter state mm:00000000fa32417c type:MM_FILEPAGES val:13 Comm:modprobe Pid:4148 BUG: Bad rss-counter state mm:00000000fa32417c type:MM_ANONPAGES val:10 Comm:modprobe Pid:4148 kmemleak: Found object by alias at 0x607f1a639c4c CPU: 1 UID: 0 PID: 4161 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lookup_object+0x94/0xb0 delete_object_full+0x27/0x70 free_percpu+0x30/0x1160 futex_hash_free+0x38/0xc0 mmput+0x2d3/0x390 do_exit+0x79d/0x2970 do_group_exit+0xd3/0x2a0 get_signal+0x2315/0x2340 arch_do_signal_or_restart+0x80/0x790 exit_to_user_mode_loop+0x8b/0x110 do_syscall_64+0x2f7/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fbbda38cb19 Code: Unable to access opcode bytes at 0x7fbbda38caef. RSP: 002b:00007fbbd7902218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 00007fbbda49ff68 RCX: 00007fbbda38cb19 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fbbda49ff6c RBP: 00007fbbda49ff60 R08: 000000000000000e R09: 0000000000000000 R10: 00000000000000cc R11: 0000000000000246 R12: 00007fbbda49ff6c R13: 00007ffd165fe5ff R14: 00007fbbd7902300 R15: 0000000000022000 kmemleak: Object (percpu) 0x607f1a639c44 (size 16): kmemleak: comm "kworker/u10:3", pid 4163, jiffies 4294815246 kmemleak: min_count = 1 kmemleak: count = 0 kmemleak: flags = 0x21 kmemleak: checksum = 0 kmemleak: backtrace: pcpu_alloc_noprof+0x87a/0x1170 __percpu_counter_init_many+0x44/0x360 mm_init+0xcac/0x1170 mm_alloc+0xa0/0xd0 alloc_bprm+0x2e3/0x6e0 kernel_execve+0xb0/0x3d0 call_usermodehelper_exec_async+0x25f/0x4e0 ret_from_fork+0x34b/0x430 ret_from_fork_asm+0x1a/0x30 BUG: Bad rss-counter state mm:00000000154b4eb6 type:MM_FILEPAGES val:-3 Comm:iou-sqp-4150 Pid:4152 BUG: Bad rss-counter state mm:00000000154b4eb6 type:MM_ANONPAGES val:16 Comm:iou-sqp-4150 Pid:4152 BUG: Bad rss-counter state mm:00000000116e47f2 type:MM_FILEPAGES val:-17 Comm:modprobe Pid:4163 BUG: Bad rss-counter state mm:00000000116e47f2 type:MM_ANONPAGES val:-10 Comm:modprobe Pid:4163 kmemleak: Found object by alias at 0x607f1a639c48 CPU: 0 UID: 0 PID: 4112 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lookup_object+0x94/0xb0 delete_object_full+0x27/0x70 free_percpu+0x30/0x1160 futex_hash_free+0x38/0xc0 mmput+0x2d3/0x390 do_exit+0x79d/0x2970 do_group_exit+0xd3/0x2a0 get_signal+0x2315/0x2340 arch_do_signal_or_restart+0x80/0x790 exit_to_user_mode_loop+0x8b/0x110 do_syscall_64+0x2f7/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8765f8cb19 Code: Unable to access opcode bytes at 0x7f8765f8caef. RSP: 002b:00007f8763502218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f876609ff68 RCX: 00007f8765f8cb19 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f876609ff68 RBP: 00007f876609ff60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f876609ff6c R13: 00007ffea61227ef R14: 00007f8763502300 R15: 0000000000022000 kmemleak: Object (percpu) 0x607f1a639c44 (size 16): kmemleak: comm "systemd-udevd", pid 112, jiffies 4294815394 kmemleak: min_count = 1 kmemleak: count = 0 kmemleak: flags = 0x21 kmemleak: checksum = 0 kmemleak: backtrace: pcpu_alloc_noprof+0x87a/0x1170 __percpu_counter_init_many+0x44/0x360 mm_init+0xcac/0x1170 copy_process+0x3ab7/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f