BUG: memory leak unreferenced object 0xffff888118cabc80 (size 32): comm "syz-executor460", pid 6863, jiffies 4294945109 (age 15.900s) hex dump (first 32 bytes): 39 70 00 00 01 00 00 00 00 00 00 00 00 00 00 00 9p.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000004394a8b2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<000000004394a8b2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<000000004394a8b2>] slab_alloc mm/slab.c:3319 [inline] [<000000004394a8b2>] __do_kmalloc mm/slab.c:3653 [inline] [<000000004394a8b2>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000c058a4c1>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000d1bbd298>] match_strdup+0x21/0x30 lib/parser.c:322 [<0000000057effb54>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<0000000057effb54>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000003c042aee>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000bdd18556>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<0000000099411896>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<000000003cfcfbcd>] do_new_mount fs/namespace.c:2823 [inline] [<000000003cfcfbcd>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000ce9832d8>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<000000007b3b6847>] __do_sys_mount fs/namespace.c:3366 [inline] [<000000007b3b6847>] __se_sys_mount fs/namespace.c:3363 [inline] [<000000007b3b6847>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<0000000042fc34d1>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000088243fa8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811b0339a0 (size 32): comm "syz-executor460", pid 6864, jiffies 4294945109 (age 15.900s) hex dump (first 32 bytes): 39 70 00 74 65 6d 5f 75 3a 73 79 73 74 65 6d 5f 9p.tem_u:system_ 72 3a 6b 65 72 6e 65 6c 5f 74 3a 73 30 00 00 00 r:kernel_t:s0... backtrace: [<000000004394a8b2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<000000004394a8b2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<000000004394a8b2>] slab_alloc mm/slab.c:3319 [inline] [<000000004394a8b2>] __do_kmalloc mm/slab.c:3653 [inline] [<000000004394a8b2>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000c058a4c1>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000d1bbd298>] match_strdup+0x21/0x30 lib/parser.c:322 [<0000000057effb54>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<0000000057effb54>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000003c042aee>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000bdd18556>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<0000000099411896>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<000000003cfcfbcd>] do_new_mount fs/namespace.c:2823 [inline] [<000000003cfcfbcd>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000ce9832d8>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<000000007b3b6847>] __do_sys_mount fs/namespace.c:3366 [inline] [<000000007b3b6847>] __se_sys_mount fs/namespace.c:3363 [inline] [<000000007b3b6847>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<0000000042fc34d1>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000088243fa8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119dde240 (size 32): comm "syz-executor460", pid 6868, jiffies 4294945109 (age 15.900s) hex dump (first 32 bytes): 39 70 00 00 01 00 00 00 00 00 00 00 00 00 00 00 9p.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000004394a8b2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<000000004394a8b2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<000000004394a8b2>] slab_alloc mm/slab.c:3319 [inline] [<000000004394a8b2>] __do_kmalloc mm/slab.c:3653 [inline] [<000000004394a8b2>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000c058a4c1>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000d1bbd298>] match_strdup+0x21/0x30 lib/parser.c:322 [<0000000057effb54>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<0000000057effb54>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000003c042aee>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000bdd18556>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<0000000099411896>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<000000003cfcfbcd>] do_new_mount fs/namespace.c:2823 [inline] [<000000003cfcfbcd>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000ce9832d8>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<000000007b3b6847>] __do_sys_mount fs/namespace.c:3366 [inline] [<000000007b3b6847>] __se_sys_mount fs/namespace.c:3363 [inline] [<000000007b3b6847>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<0000000042fc34d1>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000088243fa8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888119dde480 (size 32): comm "syz-executor460", pid 6869, jiffies 4294945109 (age 15.900s) hex dump (first 32 bytes): 39 70 00 65 20 67 65 74 61 74 74 72 00 70 69 70 9p.e getattr.pip 65 3a 5b 32 37 31 33 38 5d 00 00 00 00 00 00 00 e:[27138]....... backtrace: [<000000004394a8b2>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<000000004394a8b2>] slab_post_alloc_hook mm/slab.h:586 [inline] [<000000004394a8b2>] slab_alloc mm/slab.c:3319 [inline] [<000000004394a8b2>] __do_kmalloc mm/slab.c:3653 [inline] [<000000004394a8b2>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000c058a4c1>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000d1bbd298>] match_strdup+0x21/0x30 lib/parser.c:322 [<0000000057effb54>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<0000000057effb54>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000003c042aee>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000bdd18556>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<0000000099411896>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<000000003cfcfbcd>] do_new_mount fs/namespace.c:2823 [inline] [<000000003cfcfbcd>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<00000000ce9832d8>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<000000007b3b6847>] __do_sys_mount fs/namespace.c:3366 [inline] [<000000007b3b6847>] __se_sys_mount fs/namespace.c:3363 [inline] [<000000007b3b6847>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<0000000042fc34d1>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000088243fa8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program executing program executing program executing program executing program executing program