BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 20.950s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 20.950s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 24.390s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 24.390s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 25.600s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 25.600s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 26.790s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 26.790s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e88e520 (size 32): comm "syz-executor207", pid 6429, jiffies 4294951737 (age 27.990s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 6c 69 6e 75 78 4294951737.linux 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881179da140 (size 32): comm "syz-executor207", pid 6435, jiffies 4294951737 (age 27.990s) hex dump (first 32 bytes): 34 32 39 34 39 35 31 37 33 37 00 00 20 00 00 00 4294951737.. ... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d57da82f>] kmalloc include/linux/slab.h:555 [inline] [<00000000d57da82f>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d57da82f>] v9fs_cache_session_get_cookie+0x98/0x100 fs/9p/cache.c:52 [<0000000055ece0f7>] v9fs_session_init+0x5a1/0x840 fs/9p/v9fs.c:470 [<00000000e7658a46>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000067417a84>] legacy_get_tree+0x26/0x70 fs/fs_context.c:592 [<0000000003644c8e>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000005a8900e5>] do_new_mount fs/namespace.c:2875 [inline] [<000000005a8900e5>] do_mount+0xa63/0xe40 fs/namespace.c:3200 [<000000000a98b938>] __do_sys_mount fs/namespace.c:3410 [inline] [<000000000a98b938>] __se_sys_mount fs/namespace.c:3387 [inline] [<000000000a98b938>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3387 [<000000005ca1b033>] do_syscall_64+0x4c/0xe0 arch/x86/entry/common.c:384 [<00000000ba3f9596>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program executing program