2020/04/26 15:51:39 executed programs: 63 2020/04/26 15:51:48 executed programs: 80 2020/04/26 15:51:55 executed programs: 88 2020/04/26 15:52:04 executed programs: 111 BUG: memory leak unreferenced object 0xffff888104f06800 (size 512): comm "syz-executor.5", pid 9080, jiffies 4294962489 (age 9.980s) hex dump (first 32 bytes): 57 aa 49 b5 ff 01 14 13 4c 18 53 c4 a6 1c ec 1a W.I.....L.S..... 63 60 48 45 22 10 7d 6f e3 d9 53 45 7b b8 b7 52 c`HE".}o..SE{..R backtrace: [<00000000ba8d3af7>] kmemdup_nul+0x2d/0x70 mm/util.c:150 [<000000000c741321>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<000000000c741321>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000008442c40e>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<0000000049d65cb5>] legacy_get_tree+0x23/0x70 fs/fs_context.c:622 [<00000000be00bb4b>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<000000004a4e5312>] do_new_mount fs/namespace.c:2816 [inline] [<000000004a4e5312>] do_mount+0x958/0xcd0 fs/namespace.c:3141 [<000000006f80e15d>] __do_sys_mount fs/namespace.c:3350 [inline] [<000000006f80e15d>] __se_sys_mount fs/namespace.c:3327 [inline] [<000000006f80e15d>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3327 [<000000001b8b17ae>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<0000000059d74b38>] entry_SYSCALL_64_after_hwframe+0x44/0xa9