BUG: memory leak unreferenced object 0xffff88810a65ac40 (size 32): comm "syz-executor041", pid 6975, jiffies 4294950171 (age 16.670s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65a820 (size 32): comm "syz-executor041", pid 6976, jiffies 4294950172 (age 16.660s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac20 (size 32): comm "syz-executor041", pid 6977, jiffies 4294950172 (age 16.660s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a574c00 (size 32): comm "syz-executor041", pid 6974, jiffies 4294950177 (age 16.610s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac40 (size 32): comm "syz-executor041", pid 6975, jiffies 4294950171 (age 17.660s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65a820 (size 32): comm "syz-executor041", pid 6976, jiffies 4294950172 (age 17.650s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac20 (size 32): comm "syz-executor041", pid 6977, jiffies 4294950172 (age 17.650s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a574c00 (size 32): comm "syz-executor041", pid 6974, jiffies 4294950177 (age 17.600s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac40 (size 32): comm "syz-executor041", pid 6975, jiffies 4294950171 (age 18.630s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65a820 (size 32): comm "syz-executor041", pid 6976, jiffies 4294950172 (age 18.620s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac20 (size 32): comm "syz-executor041", pid 6977, jiffies 4294950172 (age 18.620s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a574c00 (size 32): comm "syz-executor041", pid 6974, jiffies 4294950177 (age 18.570s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac40 (size 32): comm "syz-executor041", pid 6975, jiffies 4294950171 (age 19.620s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65a820 (size 32): comm "syz-executor041", pid 6976, jiffies 4294950172 (age 19.610s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac20 (size 32): comm "syz-executor041", pid 6977, jiffies 4294950172 (age 19.610s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a574c00 (size 32): comm "syz-executor041", pid 6974, jiffies 4294950177 (age 19.560s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac40 (size 32): comm "syz-executor041", pid 6975, jiffies 4294950171 (age 20.610s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65a820 (size 32): comm "syz-executor041", pid 6976, jiffies 4294950172 (age 20.600s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac20 (size 32): comm "syz-executor041", pid 6977, jiffies 4294950172 (age 20.600s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a574c00 (size 32): comm "syz-executor041", pid 6974, jiffies 4294950177 (age 20.550s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac40 (size 32): comm "syz-executor041", pid 6975, jiffies 4294950171 (age 21.600s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65a820 (size 32): comm "syz-executor041", pid 6976, jiffies 4294950172 (age 21.590s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a65ac20 (size 32): comm "syz-executor041", pid 6977, jiffies 4294950172 (age 21.590s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810a574c00 (size 32): comm "syz-executor041", pid 6974, jiffies 4294950177 (age 21.540s) hex dump (first 32 bytes): 76 62 6f 78 6e 65 74 31 5d 2e a8 65 6d 31 73 65 vboxnet1]..em1se 6c 66 2e 7b 6c 6f 76 62 6f 78 6e 65 74 31 00 00 lf.{lovboxnet1.. backtrace: [<00000000038594f6>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] [<00000000038594f6>] slab_post_alloc_hook mm/slab.h:586 [inline] [<00000000038594f6>] slab_alloc mm/slab.c:3319 [inline] [<00000000038594f6>] __do_kmalloc mm/slab.c:3653 [inline] [<00000000038594f6>] __kmalloc_track_caller+0x165/0x300 mm/slab.c:3670 [<000000007a6c6f72>] kmemdup_nul+0x31/0x80 mm/util.c:150 [<00000000c9c27f29>] match_strdup+0x21/0x30 lib/parser.c:322 [<00000000f60697e6>] v9fs_parse_options fs/9p/v9fs.c:281 [inline] [<00000000f60697e6>] v9fs_session_init+0x29e/0x880 fs/9p/v9fs.c:422 [<000000000f5b9a2e>] v9fs_mount+0x5e/0x3c0 fs/9p/vfs_super.c:124 [<0000000076b7d3f9>] legacy_get_tree+0x27/0x80 fs/fs_context.c:647 [<000000000694a7b8>] vfs_get_tree+0x2d/0xe0 fs/super.c:1545 [<0000000088451720>] do_new_mount fs/namespace.c:2823 [inline] [<0000000088451720>] do_mount+0x95f/0xc60 fs/namespace.c:3143 [<0000000064807df3>] ksys_mount+0xab/0x120 fs/namespace.c:3352 [<00000000880c1ffa>] __do_sys_mount fs/namespace.c:3366 [inline] [<00000000880c1ffa>] __se_sys_mount fs/namespace.c:3363 [inline] [<00000000880c1ffa>] __x64_sys_mount+0x26/0x30 fs/namespace.c:3363 [<00000000235ed48b>] do_syscall_64+0x73/0x1f0 arch/x86/entry/common.c:290 [<0000000048ecdd96>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 executing program executing program