mount$9p_fd(0x4000000, &(0x7f0000000740)='./file0/../file0\x00', &(0x7f0000000780), 0x0, &(0x7f0000000940)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 12:47:29 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) r0 = gettid() get_robust_list(r0, &(0x7f0000000100)=0x0, &(0x7f0000000140)) BUG: memory leak unreferenced object 0xffff88803fe7d7c0 (size 1544): comm "syz-executor.2", pid 294, jiffies 4294806854 (age 620.311s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ d0 d7 e7 3f 80 88 ff ff d0 d7 e7 3f 80 88 ff ff ...?.......?.... backtrace: [<000000000793698f>] kmem_cache_zalloc include/linux/slab.h:705 [inline] [<000000000793698f>] copy_signal kernel/fork.c:1624 [inline] [<000000000793698f>] copy_process+0x1fb8/0x6e20 kernel/fork.c:2173 [<000000009ad5e992>] kernel_clone+0xe7/0xa60 kernel/fork.c:2620 [<000000007dce2836>] __do_sys_clone+0xc1/0x100 kernel/fork.c:2737 [<000000000d3428c9>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<000000000d3428c9>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<00000000341fe5cc>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8880187b3580 (size 6592): comm "syz-executor.2", pid 4098, jiffies 4294806860 (age 620.305s) hex dump (first 32 bytes): 02 40 02 00 00 00 00 00 00 00 00 00 00 00 00 00 .@.............. 00 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 ................ backtrace: [<0000000070f4b970>] alloc_task_struct_node kernel/fork.c:171 [inline] [<0000000070f4b970>] dup_task_struct kernel/fork.c:885 [inline] [<0000000070f4b970>] copy_process+0x3011/0x6e20 kernel/fork.c:2006 [<000000009ad5e992>] kernel_clone+0xe7/0xa60 kernel/fork.c:2620 [<000000007dce2836>] __do_sys_clone+0xc1/0x100 kernel/fork.c:2737 [<000000000d3428c9>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<000000000d3428c9>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<00000000341fe5cc>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88800ec1cf30 (size 368): comm "syz-executor.2", pid 4098, jiffies 4294806866 (age 620.299s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1e 00 00 00 00 00 00 00 22 34 3a 00 00 00 00 00 ........"4:..... backtrace: [<0000000045ef952f>] kmem_cache_zalloc include/linux/slab.h:705 [inline] [<0000000045ef952f>] taskstats_tgid_alloc kernel/taskstats.c:561 [inline] [<0000000045ef952f>] taskstats_exit+0x5c6/0xac0 kernel/taskstats.c:600 [<000000005ebdd41f>] do_exit+0x8b1/0x2840 kernel/exit.c:778 [<00000000d080fc90>] do_group_exit+0x128/0x330 kernel/exit.c:932 [<00000000cd7a9f33>] __do_sys_exit_group kernel/exit.c:943 [inline] [<00000000cd7a9f33>] __se_sys_exit_group kernel/exit.c:941 [inline] [<00000000cd7a9f33>] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:941 [<000000000d3428c9>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<000000000d3428c9>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<00000000341fe5cc>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: leak checking failed