BUG: memory leak unreferenced object 0xffff88810de20ea0 (size 32): comm "syz-executor678", pid 6954, jiffies 4294948635 (age 15.440s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000865b6942>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000865b6942>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000865b6942>] slab_alloc mm/slab.c:3319 [inline] [<00000000865b6942>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000865b6942>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000bc78fc47>] kmemdup_nul+0x31/0x80 mm/util.c:143 [<00000000607e17d8>] match_strdup+0x21/0x30 lib/parser.c:322 [<000000005bb69bd4>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<000000005bb69bd4>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<0000000093ad794d>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000d73ae58b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:659 [<00000000f065ade4>] vfs_get_tree+0x2e/0x110 fs/super.c:1542 [<000000002ce94418>] do_new_mount fs/namespace.c:2825 [inline] [<000000002ce94418>] do_mount+0x96e/0xca0 fs/namespace.c:3145 [<0000000086724b86>] ksys_mount+0xab/0x120 fs/namespace.c:3354 [<00000000a797c68b>] __do_sys_mount fs/namespace.c:3368 [inline] [<00000000a797c68b>] __se_sys_mount fs/namespace.c:3365 [inline] [<00000000a797c68b>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3365 [<00000000b4b834e9>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000edbc710a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f76b8e0 (size 32): comm "syz-executor678", pid 6963, jiffies 4294948637 (age 15.420s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000865b6942>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000865b6942>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000865b6942>] slab_alloc mm/slab.c:3319 [inline] [<00000000865b6942>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000865b6942>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000bc78fc47>] kmemdup_nul+0x31/0x80 mm/util.c:143 [<00000000607e17d8>] match_strdup+0x21/0x30 lib/parser.c:322 [<000000005bb69bd4>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<000000005bb69bd4>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<0000000093ad794d>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000d73ae58b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:659 [<00000000f065ade4>] vfs_get_tree+0x2e/0x110 fs/super.c:1542 [<000000002ce94418>] do_new_mount fs/namespace.c:2825 [inline] [<000000002ce94418>] do_mount+0x96e/0xca0 fs/namespace.c:3145 [<0000000086724b86>] ksys_mount+0xab/0x120 fs/namespace.c:3354 [<00000000a797c68b>] __do_sys_mount fs/namespace.c:3368 [inline] [<00000000a797c68b>] __se_sys_mount fs/namespace.c:3365 [inline] [<00000000a797c68b>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3365 [<00000000b4b834e9>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000edbc710a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f76b0c0 (size 32): comm "syz-executor678", pid 6964, jiffies 4294948637 (age 15.420s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000865b6942>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000865b6942>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000865b6942>] slab_alloc mm/slab.c:3319 [inline] [<00000000865b6942>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000865b6942>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000bc78fc47>] kmemdup_nul+0x31/0x80 mm/util.c:143 [<00000000607e17d8>] match_strdup+0x21/0x30 lib/parser.c:322 [<000000005bb69bd4>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<000000005bb69bd4>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<0000000093ad794d>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000d73ae58b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:659 [<00000000f065ade4>] vfs_get_tree+0x2e/0x110 fs/super.c:1542 [<000000002ce94418>] do_new_mount fs/namespace.c:2825 [inline] [<000000002ce94418>] do_mount+0x96e/0xca0 fs/namespace.c:3145 [<0000000086724b86>] ksys_mount+0xab/0x120 fs/namespace.c:3354 [<00000000a797c68b>] __do_sys_mount fs/namespace.c:3368 [inline] [<00000000a797c68b>] __se_sys_mount fs/namespace.c:3365 [inline] [<00000000a797c68b>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3365 [<00000000b4b834e9>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000edbc710a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f76bc20 (size 32): comm "syz-executor678", pid 6966, jiffies 4294948637 (age 15.420s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000865b6942>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000865b6942>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000865b6942>] slab_alloc mm/slab.c:3319 [inline] [<00000000865b6942>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000865b6942>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000bc78fc47>] kmemdup_nul+0x31/0x80 mm/util.c:143 [<00000000607e17d8>] match_strdup+0x21/0x30 lib/parser.c:322 [<000000005bb69bd4>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<000000005bb69bd4>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<0000000093ad794d>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000d73ae58b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:659 [<00000000f065ade4>] vfs_get_tree+0x2e/0x110 fs/super.c:1542 [<000000002ce94418>] do_new_mount fs/namespace.c:2825 [inline] [<000000002ce94418>] do_mount+0x96e/0xca0 fs/namespace.c:3145 [<0000000086724b86>] ksys_mount+0xab/0x120 fs/namespace.c:3354 [<00000000a797c68b>] __do_sys_mount fs/namespace.c:3368 [inline] [<00000000a797c68b>] __se_sys_mount fs/namespace.c:3365 [inline] [<00000000a797c68b>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3365 [<00000000b4b834e9>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000edbc710a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810de20ea0 (size 32): comm "syz-executor678", pid 6954, jiffies 4294948635 (age 16.310s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000865b6942>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000865b6942>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000865b6942>] slab_alloc mm/slab.c:3319 [inline] [<00000000865b6942>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000865b6942>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000bc78fc47>] kmemdup_nul+0x31/0x80 mm/util.c:143 [<00000000607e17d8>] match_strdup+0x21/0x30 lib/parser.c:322 [<000000005bb69bd4>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<000000005bb69bd4>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<0000000093ad794d>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000d73ae58b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:659 [<00000000f065ade4>] vfs_get_tree+0x2e/0x110 fs/super.c:1542 [<000000002ce94418>] do_new_mount fs/namespace.c:2825 [inline] [<000000002ce94418>] do_mount+0x96e/0xca0 fs/namespace.c:3145 [<0000000086724b86>] ksys_mount+0xab/0x120 fs/namespace.c:3354 [<00000000a797c68b>] __do_sys_mount fs/namespace.c:3368 [inline] [<00000000a797c68b>] __se_sys_mount fs/namespace.c:3365 [inline] [<00000000a797c68b>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3365 [<00000000b4b834e9>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000edbc710a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f76b8e0 (size 32): comm "syz-executor678", pid 6963, jiffies 4294948637 (age 16.290s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000865b6942>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000865b6942>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000865b6942>] slab_alloc mm/slab.c:3319 [inline] [<00000000865b6942>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000865b6942>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000bc78fc47>] kmemdup_nul+0x31/0x80 mm/util.c:143 [<00000000607e17d8>] match_strdup+0x21/0x30 lib/parser.c:322 [<000000005bb69bd4>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<000000005bb69bd4>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<0000000093ad794d>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000d73ae58b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:659 [<00000000f065ade4>] vfs_get_tree+0x2e/0x110 fs/super.c:1542 [<000000002ce94418>] do_new_mount fs/namespace.c:2825 [inline] [<000000002ce94418>] do_mount+0x96e/0xca0 fs/namespace.c:3145 [<0000000086724b86>] ksys_mount+0xab/0x120 fs/namespace.c:3354 [<00000000a797c68b>] __do_sys_mount fs/namespace.c:3368 [inline] [<00000000a797c68b>] __se_sys_mount fs/namespace.c:3365 [inline] [<00000000a797c68b>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3365 [<00000000b4b834e9>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000edbc710a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f76b0c0 (size 32): comm "syz-executor678", pid 6964, jiffies 4294948637 (age 16.290s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000865b6942>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000865b6942>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000865b6942>] slab_alloc mm/slab.c:3319 [inline] [<00000000865b6942>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000865b6942>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000bc78fc47>] kmemdup_nul+0x31/0x80 mm/util.c:143 [<00000000607e17d8>] match_strdup+0x21/0x30 lib/parser.c:322 [<000000005bb69bd4>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<000000005bb69bd4>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<0000000093ad794d>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000d73ae58b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:659 [<00000000f065ade4>] vfs_get_tree+0x2e/0x110 fs/super.c:1542 [<000000002ce94418>] do_new_mount fs/namespace.c:2825 [inline] [<000000002ce94418>] do_mount+0x96e/0xca0 fs/namespace.c:3145 [<0000000086724b86>] ksys_mount+0xab/0x120 fs/namespace.c:3354 [<00000000a797c68b>] __do_sys_mount fs/namespace.c:3368 [inline] [<00000000a797c68b>] __se_sys_mount fs/namespace.c:3365 [inline] [<00000000a797c68b>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3365 [<00000000b4b834e9>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000edbc710a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810f76bc20 (size 32): comm "syz-executor678", pid 6966, jiffies 4294948637 (age 16.290s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000865b6942>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000865b6942>] slab_post_alloc_hook mm/slab.h:522 [inline] [<00000000865b6942>] slab_alloc mm/slab.c:3319 [inline] [<00000000865b6942>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000865b6942>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<00000000bc78fc47>] kmemdup_nul+0x31/0x80 mm/util.c:143 [<00000000607e17d8>] match_strdup+0x21/0x30 lib/parser.c:322 [<000000005bb69bd4>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<000000005bb69bd4>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<0000000093ad794d>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<00000000d73ae58b>] legacy_get_tree+0x27/0x80 fs/fs_context.c:659 [<00000000f065ade4>] vfs_get_tree+0x2e/0x110 fs/super.c:1542 [<000000002ce94418>] do_new_mount fs/namespace.c:2825 [inline] [<000000002ce94418>] do_mount+0x96e/0xca0 fs/namespace.c:3145 [<0000000086724b86>] ksys_mount+0xab/0x120 fs/namespace.c:3354 [<00000000a797c68b>] __do_sys_mount fs/namespace.c:3368 [inline] [<00000000a797c68b>] __se_sys_mount fs/namespace.c:3365 [inline] [<00000000a797c68b>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3365 [<00000000b4b834e9>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<00000000edbc710a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program executing program executing program executing program executing program