2020/04/19 01:27:44 executed programs: 21 BUG: memory leak unreferenced object 0xffff888104b92600 (size 512): comm "syz-executor.0", pid 8559, jiffies 4294956713 (age 16.790s) hex dump (first 32 bytes): 57 aa 49 b5 ff 01 14 13 4c 18 53 c4 a6 1c ec 1a W.I.....L.S..... 63 60 48 45 22 10 7d 6f e3 d9 53 45 7b b8 b7 52 c`HE".}o..SE{..R backtrace: [<00000000229f41dd>] kmemdup_nul+0x2d/0x70 mm/util.c:150 [<00000000094c32ec>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000094c32ec>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<0000000075e618e2>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<00000000ac06ead5>] legacy_get_tree+0x23/0x70 fs/fs_context.c:622 [<000000009cdcaef5>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<00000000a6213a14>] do_new_mount fs/namespace.c:2816 [inline] [<00000000a6213a14>] do_mount+0x958/0xcd0 fs/namespace.c:3141 [<00000000ba4cbf24>] __do_sys_mount fs/namespace.c:3350 [inline] [<00000000ba4cbf24>] __se_sys_mount fs/namespace.c:3327 [inline] [<00000000ba4cbf24>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3327 [<000000003a9cef7c>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<0000000006187b1c>] entry_SYSCALL_64_after_hwframe+0x44/0xa9