BUG: memory leak unreferenced object 0xffff88811e3751e0 (size 32): comm "syz-executor354", pid 6786, jiffies 4294946314 (age 14.210s) hex dump (first 32 bytes): 34 32 39 34 39 34 36 33 31 34 00 44 00 74 00 00 4294946314.D.t.. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000845f84a2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000845f84a2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000845f84a2>] slab_alloc mm/slab.c:3319 [inline] [<00000000845f84a2>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000d3ab775c>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3ab775c>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d3ab775c>] v9fs_cache_session_get_cookie+0xa6/0x110 fs/9p/cache.c:52 [<000000001f7a83b3>] v9fs_session_init+0x5c3/0x880 fs/9p/v9fs.c:470 [<00000000a8546ea0>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<000000005dc83b2b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000005a060837>] vfs_get_tree+0x2d/0xe0 fs/super.c:1542 [<000000008cff927c>] do_new_mount fs/namespace.c:2823 [inline] [<000000008cff927c>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000669c4c2b>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000d3a100f1>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000d3a100f1>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000d3a100f1>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000024f0a62>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000008f966d21>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811aa9eae0 (size 32): comm "syz-executor354", pid 6787, jiffies 4294946314 (age 14.210s) hex dump (first 32 bytes): 34 32 39 34 39 34 36 33 31 34 00 00 00 00 00 00 4294946314...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000845f84a2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000845f84a2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000845f84a2>] slab_alloc mm/slab.c:3319 [inline] [<00000000845f84a2>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000d3ab775c>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3ab775c>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d3ab775c>] v9fs_cache_session_get_cookie+0xa6/0x110 fs/9p/cache.c:52 [<000000001f7a83b3>] v9fs_session_init+0x5c3/0x880 fs/9p/v9fs.c:470 [<00000000a8546ea0>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<000000005dc83b2b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000005a060837>] vfs_get_tree+0x2d/0xe0 fs/super.c:1542 [<000000008cff927c>] do_new_mount fs/namespace.c:2823 [inline] [<000000008cff927c>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000669c4c2b>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000d3a100f1>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000d3a100f1>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000d3a100f1>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000024f0a62>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000008f966d21>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811bbeb500 (size 32): comm "syz-executor354", pid 6792, jiffies 4294946315 (age 14.200s) hex dump (first 32 bytes): 34 32 39 34 39 34 36 33 31 35 00 00 00 00 00 00 4294946315...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000845f84a2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000845f84a2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000845f84a2>] slab_alloc mm/slab.c:3319 [inline] [<00000000845f84a2>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000d3ab775c>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3ab775c>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d3ab775c>] v9fs_cache_session_get_cookie+0xa6/0x110 fs/9p/cache.c:52 [<000000001f7a83b3>] v9fs_session_init+0x5c3/0x880 fs/9p/v9fs.c:470 [<00000000a8546ea0>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<000000005dc83b2b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000005a060837>] vfs_get_tree+0x2d/0xe0 fs/super.c:1542 [<000000008cff927c>] do_new_mount fs/namespace.c:2823 [inline] [<000000008cff927c>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000669c4c2b>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000d3a100f1>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000d3a100f1>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000d3a100f1>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000024f0a62>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000008f966d21>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119f6d060 (size 32): comm "syz-executor354", pid 6789, jiffies 4294946322 (age 14.130s) hex dump (first 32 bytes): 34 32 39 34 39 34 36 33 32 32 00 00 00 00 00 00 4294946322...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000845f84a2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000845f84a2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000845f84a2>] slab_alloc mm/slab.c:3319 [inline] [<00000000845f84a2>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000d3ab775c>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3ab775c>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d3ab775c>] v9fs_cache_session_get_cookie+0xa6/0x110 fs/9p/cache.c:52 [<000000001f7a83b3>] v9fs_session_init+0x5c3/0x880 fs/9p/v9fs.c:470 [<00000000a8546ea0>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<000000005dc83b2b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000005a060837>] vfs_get_tree+0x2d/0xe0 fs/super.c:1542 [<000000008cff927c>] do_new_mount fs/namespace.c:2823 [inline] [<000000008cff927c>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000669c4c2b>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000d3a100f1>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000d3a100f1>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000d3a100f1>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000024f0a62>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000008f966d21>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811e3751e0 (size 32): comm "syz-executor354", pid 6786, jiffies 4294946314 (age 15.820s) hex dump (first 32 bytes): 34 32 39 34 39 34 36 33 31 34 00 44 00 74 00 00 4294946314.D.t.. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000845f84a2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000845f84a2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000845f84a2>] slab_alloc mm/slab.c:3319 [inline] [<00000000845f84a2>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000d3ab775c>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3ab775c>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d3ab775c>] v9fs_cache_session_get_cookie+0xa6/0x110 fs/9p/cache.c:52 [<000000001f7a83b3>] v9fs_session_init+0x5c3/0x880 fs/9p/v9fs.c:470 [<00000000a8546ea0>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<000000005dc83b2b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000005a060837>] vfs_get_tree+0x2d/0xe0 fs/super.c:1542 [<000000008cff927c>] do_new_mount fs/namespace.c:2823 [inline] [<000000008cff927c>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000669c4c2b>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000d3a100f1>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000d3a100f1>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000d3a100f1>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000024f0a62>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000008f966d21>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811aa9eae0 (size 32): comm "syz-executor354", pid 6787, jiffies 4294946314 (age 15.820s) hex dump (first 32 bytes): 34 32 39 34 39 34 36 33 31 34 00 00 00 00 00 00 4294946314...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000845f84a2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000845f84a2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000845f84a2>] slab_alloc mm/slab.c:3319 [inline] [<00000000845f84a2>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000d3ab775c>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3ab775c>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d3ab775c>] v9fs_cache_session_get_cookie+0xa6/0x110 fs/9p/cache.c:52 [<000000001f7a83b3>] v9fs_session_init+0x5c3/0x880 fs/9p/v9fs.c:470 [<00000000a8546ea0>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<000000005dc83b2b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000005a060837>] vfs_get_tree+0x2d/0xe0 fs/super.c:1542 [<000000008cff927c>] do_new_mount fs/namespace.c:2823 [inline] [<000000008cff927c>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000669c4c2b>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000d3a100f1>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000d3a100f1>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000d3a100f1>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000024f0a62>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000008f966d21>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811bbeb500 (size 32): comm "syz-executor354", pid 6792, jiffies 4294946315 (age 15.810s) hex dump (first 32 bytes): 34 32 39 34 39 34 36 33 31 35 00 00 00 00 00 00 4294946315...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000845f84a2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000845f84a2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000845f84a2>] slab_alloc mm/slab.c:3319 [inline] [<00000000845f84a2>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000d3ab775c>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3ab775c>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d3ab775c>] v9fs_cache_session_get_cookie+0xa6/0x110 fs/9p/cache.c:52 [<000000001f7a83b3>] v9fs_session_init+0x5c3/0x880 fs/9p/v9fs.c:470 [<00000000a8546ea0>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<000000005dc83b2b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000005a060837>] vfs_get_tree+0x2d/0xe0 fs/super.c:1542 [<000000008cff927c>] do_new_mount fs/namespace.c:2823 [inline] [<000000008cff927c>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000669c4c2b>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000d3a100f1>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000d3a100f1>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000d3a100f1>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000024f0a62>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000008f966d21>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119f6d060 (size 32): comm "syz-executor354", pid 6789, jiffies 4294946322 (age 15.740s) hex dump (first 32 bytes): 34 32 39 34 39 34 36 33 32 32 00 00 00 00 00 00 4294946322...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000845f84a2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000845f84a2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000845f84a2>] slab_alloc mm/slab.c:3319 [inline] [<00000000845f84a2>] kmem_cache_alloc_trace+0x145/0x2c0 mm/slab.c:3548 [<00000000d3ab775c>] kmalloc include/linux/slab.h:552 [inline] [<00000000d3ab775c>] v9fs_random_cachetag fs/9p/cache.c:36 [inline] [<00000000d3ab775c>] v9fs_cache_session_get_cookie+0xa6/0x110 fs/9p/cache.c:52 [<000000001f7a83b3>] v9fs_session_init+0x5c3/0x880 fs/9p/v9fs.c:470 [<00000000a8546ea0>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<000000005dc83b2b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000005a060837>] vfs_get_tree+0x2d/0xe0 fs/super.c:1542 [<000000008cff927c>] do_new_mount fs/namespace.c:2823 [inline] [<000000008cff927c>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000669c4c2b>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000d3a100f1>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000d3a100f1>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000d3a100f1>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000024f0a62>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<000000008f966d21>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program executing program executing program executing program executing program