r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0) read(r7, &(0x7f0000000000), 0x2000) close(r7) openat(r7, &(0x7f0000000100)='./file0\x00', 0x2001, 0x11) read(r6, &(0x7f0000000040)=""/148, 0x94) BUG: memory leak unreferenced object 0xffff8880083c77a0 (size 368): comm "syz-executor.0", pid 10165, jiffies 4296559925 (age 19.865s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 55 00 00 00 00 00 00 00 5e 5b 0e 04 00 00 00 00 U.......^[...... backtrace: [<00000000809696aa>] kmem_cache_zalloc include/linux/slab.h:705 [inline] [<00000000809696aa>] taskstats_tgid_alloc kernel/taskstats.c:561 [inline] [<00000000809696aa>] taskstats_exit+0x5c6/0xac0 kernel/taskstats.c:600 [<0000000056bb864a>] do_exit+0x8b1/0x2840 kernel/exit.c:778 [<00000000602a3db3>] do_group_exit+0x125/0x310 kernel/exit.c:928 [<000000000570bbf7>] __do_sys_exit_group kernel/exit.c:939 [inline] [<000000000570bbf7>] __se_sys_exit_group kernel/exit.c:937 [inline] [<000000000570bbf7>] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:937 [<0000000098b93070>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<0000000098b93070>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<00000000a98b0bd4>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: leak checking failed