r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x10082, 0x106) write(r0, &(0x7f0000000040)="01", 0x1) BUG: memory leak unreferenced object 0xffff8880180d7040 (size 352): comm "syz-executor.5", pid 4176, jiffies 4294837021 (age 18.236s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1b 00 00 00 00 00 00 00 28 6a 77 02 00 00 00 00 ........(jw..... backtrace: [<00000000ba9f242a>] kmem_cache_zalloc include/linux/slab.h:705 [inline] [<00000000ba9f242a>] taskstats_tgid_alloc kernel/taskstats.c:561 [inline] [<00000000ba9f242a>] taskstats_exit+0x5c6/0xac0 kernel/taskstats.c:600 [<000000001160ec2f>] do_exit+0x8b1/0x2840 kernel/exit.c:778 [<00000000c60d37fb>] do_group_exit+0x125/0x310 kernel/exit.c:928 [<00000000842ba372>] __do_sys_exit_group kernel/exit.c:939 [inline] [<00000000842ba372>] __se_sys_exit_group kernel/exit.c:937 [inline] [<00000000842ba372>] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:937 [<000000004edb131f>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<000000004edb131f>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<00000000fa17e5ea>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: leak checking failed