2020/03/18 12:30:51 executed programs: 77 2020/03/18 12:31:00 executed programs: 95 2020/03/18 12:31:07 executed programs: 111 2020/03/18 12:31:15 executed programs: 128 BUG: memory leak unreferenced object 0xffff88810adb1800 (size 512): comm "syz-executor.3", pid 7804, jiffies 4295052742 (age 24.010s) hex dump (first 32 bytes): 57 aa 49 b5 ff 01 14 13 4c 18 53 c4 a6 1c ec 1a W.I.....L.S..... 63 60 48 45 22 10 7d 6f e3 d9 53 45 7b b8 b7 52 c`HE".}o..SE{..R backtrace: [<00000000c7ff6431>] kmemdup_nul+0x2d/0x70 mm/util.c:150 [<00000000fc250708>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000fc250708>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<00000000a08ff5c1>] v9fs_mount+0x56/0x390 fs/9p/vfs_super.c:124 [<00000000b0ce8779>] legacy_get_tree+0x23/0x70 fs/fs_context.c:622 [<000000006f355f91>] vfs_get_tree+0x28/0xe0 fs/super.c:1547 [<00000000ae95a310>] do_new_mount fs/namespace.c:2822 [inline] [<00000000ae95a310>] do_mount+0x958/0xc50 fs/namespace.c:3107 [<000000002853f016>] __do_sys_mount fs/namespace.c:3316 [inline] [<000000002853f016>] __se_sys_mount fs/namespace.c:3293 [inline] [<000000002853f016>] __x64_sys_mount+0xb0/0x120 fs/namespace.c:3293 [<0000000009dcce10>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:294 [<00000000227a2854>] entry_SYSCALL_64_after_hwframe+0x44/0xa9