[   25.737706][   T22] audit: type=1804 audit(1570708529.597:49): pid=6915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1
[   25.779029][   T22] audit: type=1804 audit(1570708529.597:50): pid=6915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1
[   25.799264][   T22] audit: type=1804 audit(1570708529.667:51): pid=6914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1
[   25.819682][   T22] audit: type=1804 audit(1570708529.687:52): pid=6915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1
[   25.819694][   T22] audit: type=1804 audit(1570708529.687:53): pid=6919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   42.882066][   T22] kauditd_printk_skb: 8 callbacks suppressed
[   42.882073][   T22] audit: type=1400 audit(1570708546.767:62): avc:  denied  { map } for  pid=6926 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.1.11' (ECDSA) to the list of known hosts.
[   58.303532][   T22] audit: type=1400 audit(1570708562.187:63): avc:  denied  { map } for  pid=6938 comm="syz-executor763" path="/root/syz-executor763634432" dev="sda1" ino=16498 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
executing program
executing program
executing program
executing program
executing program
executing program
[   64.983812][ T6948] FS-Cache: Duplicate cookie detected
[   64.989247][ T6948] FS-Cache: O-cookie c=000000002b76d1ab [p=00000000b1810b26 fl=222 nc=0 na=1]
[   64.998111][ T6948] FS-Cache: O-cookie d=00000000b8b53509 n=00000000d9caf33e
[   65.005290][ T6948] FS-Cache: O-key=[10] '34323934393433373732'
[   65.011330][ T6948] FS-Cache: N-cookie c=000000000af9914a [p=00000000b1810b26 fl=2 nc=0 na=1]
[   65.019988][ T6948] FS-Cache: N-cookie d=00000000b8b53509 n=00000000f5056757
[   65.027160][ T6948] FS-Cache: N-key=[10] '34323934393433373732'
executing program
executing program
[   65.033475][ T6954] FS-Cache: Duplicate cookie detected
[   65.037258][ T6951] FS-Cache: Duplicate cookie detected
[   65.038936][ T6954] FS-Cache: O-cookie c=000000002b76d1ab [p=00000000b1810b26 fl=222 nc=0 na=1]
[   65.044225][ T6951] FS-Cache: O-cookie c=000000005e24b7dc [p=00000000b1810b26 fl=222 nc=0 na=1]
[   65.053037][ T6954] FS-Cache: O-cookie d=00000000b8b53509 n=00000000d9caf33e
[   65.053039][ T6954] FS-Cache: O-key=[10] '34323934393433373732'
[   65.061858][ T6951] FS-Cache: O-cookie d=00000000b8b53509 n=000000004a11d0d7
[   65.061860][ T6951] FS-Cache: O-key=[10] '34323934393433373737'
[   65.069025][ T6954] FS-Cache: N-cookie c=00000000825c9a69 [p=00000000b1810b26 fl=2 nc=0 na=1]
[   65.075060][ T6951] FS-Cache: N-cookie c=000000008c3d85fe [p=00000000b1810b26 fl=2 nc=0 na=1]
[   65.075065][ T6951] FS-Cache: N-cookie d=00000000b8b53509 n=000000000fccbce9
[   65.082231][ T6954] FS-Cache: N-cookie d=00000000b8b53509 n=000000007f07196d
[   65.088257][ T6951] FS-Cache: N-key=[10] '34323934393433373737'
[   65.096899][ T6954] FS-Cache: N-key=[10] '34323934393433373732'
[   65.132752][ T6949] FS-Cache: Duplicate cookie detected
[   65.138145][ T6949] FS-Cache: O-cookie c=000000002b76d1ab [p=00000000b1810b26 fl=222 nc=0 na=1]
[   65.146980][ T6949] FS-Cache: O-cookie d=00000000b8b53509 n=00000000d9caf33e
[   65.154151][ T6949] FS-Cache: O-key=[10] '34323934393433373732'
[   65.160197][ T6949] FS-Cache: N-cookie c=00000000451dff9c [p=00000000b1810b26 fl=2 nc=0 na=1]
[   65.168847][ T6949] FS-Cache: N-cookie d=00000000b8b53509 n=0000000006dbaa97
[   65.176012][ T6949] FS-Cache: N-key=[10] '34323934393433373732'
[   65.182058][ T6953] FS-Cache: Duplicate cookie detected
[   65.187446][ T6953] FS-Cache: O-cookie c=000000002b76d1ab [p=00000000b1810b26 fl=222 nc=0 na=1]
[   65.196294][ T6953] FS-Cache: O-cookie d=00000000b8b53509 n=00000000d9caf33e
[   65.203465][ T6953] FS-Cache: O-key=[10] '34323934393433373732'
[   65.209500][ T6953] FS-Cache: N-cookie c=00000000b2c3e66b [p=00000000b1810b26 fl=2 nc=0 na=1]
[   65.218148][ T6953] FS-Cache: N-cookie d=00000000b8b53509 n=00000000c7119343
[   65.225325][ T6953] FS-Cache: N-key=[10] '34323934393433373732'
[   71.033232][ T6945] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88811fa493a0 (size 32):
  comm "syz-executor763", pid 6948, jiffies 4294943772 (age 16.880s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 6a 65 63 74 5f  4294943772.ject_
    72 3a 75 64 65 76 5f 74 62 6c 5f 74 3a 73 30 00  r:udev_tbl_t:s0.
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811795eae0 (size 32):
  comm "syz-executor763", pid 6949, jiffies 4294943772 (age 16.880s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888112aebc00 (size 32):
  comm "syz-executor763", pid 6953, jiffies 4294943772 (age 16.880s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810d9db8a0 (size 32):
  comm "syz-executor763", pid 6954, jiffies 4294943772 (age 16.880s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 00 00 00 00 00  4294943772......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811fa493a0 (size 32):
  comm "syz-executor763", pid 6948, jiffies 4294943772 (age 17.750s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 6a 65 63 74 5f  4294943772.ject_
    72 3a 75 64 65 76 5f 74 62 6c 5f 74 3a 73 30 00  r:udev_tbl_t:s0.
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811795eae0 (size 32):
  comm "syz-executor763", pid 6949, jiffies 4294943772 (age 17.750s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888112aebc00 (size 32):
  comm "syz-executor763", pid 6953, jiffies 4294943772 (age 17.750s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810d9db8a0 (size 32):
  comm "syz-executor763", pid 6954, jiffies 4294943772 (age 17.750s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 00 00 00 00 00  4294943772......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811fa493a0 (size 32):
  comm "syz-executor763", pid 6948, jiffies 4294943772 (age 18.610s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 6a 65 63 74 5f  4294943772.ject_
    72 3a 75 64 65 76 5f 74 62 6c 5f 74 3a 73 30 00  r:udev_tbl_t:s0.
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811795eae0 (size 32):
  comm "syz-executor763", pid 6949, jiffies 4294943772 (age 18.610s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888112aebc00 (size 32):
  comm "syz-executor763", pid 6953, jiffies 4294943772 (age 18.610s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810d9db8a0 (size 32):
  comm "syz-executor763", pid 6954, jiffies 4294943772 (age 18.610s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 00 00 00 00 00  4294943772......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811fa493a0 (size 32):
  comm "syz-executor763", pid 6948, jiffies 4294943772 (age 19.480s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 6a 65 63 74 5f  4294943772.ject_
    72 3a 75 64 65 76 5f 74 62 6c 5f 74 3a 73 30 00  r:udev_tbl_t:s0.
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811795eae0 (size 32):
  comm "syz-executor763", pid 6949, jiffies 4294943772 (age 19.480s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888112aebc00 (size 32):
  comm "syz-executor763", pid 6953, jiffies 4294943772 (age 19.480s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810d9db8a0 (size 32):
  comm "syz-executor763", pid 6954, jiffies 4294943772 (age 19.480s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 00 00 00 00 00  4294943772......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811fa493a0 (size 32):
  comm "syz-executor763", pid 6948, jiffies 4294943772 (age 19.540s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 6a 65 63 74 5f  4294943772.ject_
    72 3a 75 64 65 76 5f 74 62 6c 5f 74 3a 73 30 00  r:udev_tbl_t:s0.
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88811795eae0 (size 32):
  comm "syz-executor763", pid 6949, jiffies 4294943772 (age 19.540s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff888112aebc00 (size 32):
  comm "syz-executor763", pid 6953, jiffies 4294943772 (age 19.540s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 73 74 65 6d 5f  4294943772.stem_
    72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00  r:kernel_t:s0...
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff88810d9db8a0 (size 32):
  comm "syz-executor763", pid 6954, jiffies 4294943772 (age 19.540s)
  hex dump (first 32 bytes):
    34 32 39 34 39 34 33 37 37 32 00 00 00 00 00 00  4294943772......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000009b0c2f71>] kmem_cache_alloc_trace+0x145/0x2c0
    [<00000000fae6af7d>] v9fs_cache_session_get_cookie+0xa6/0x110
    [<00000000412210f7>] v9fs_session_init+0x5c3/0x880
    [<00000000f048893d>] v9fs_mount+0x5e/0x3c0
    [<00000000fbf0a817>] legacy_get_tree+0x27/0x80
    [<000000004cebf99f>] vfs_get_tree+0x2d/0xe0
    [<000000007b4a2006>] do_mount+0x95f/0xc60
    [<000000003054a5c0>] ksys_mount+0xab/0x120
    [<00000000d6697a94>] __x64_sys_mount+0x26/0x30
    [<00000000267110d0>] do_syscall_64+0x73/0x1f0
    [<00000000bdf748e5>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

executing program
executing program
executing program