setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x1, 0x7, 0x1, 0x9, 0x7}, 0x14) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r6, 0x400448ca, 0x0) BUG: memory leak unreferenced object 0xffff8880160a9b60 (size 8): comm "syz-executor.6", pid 10884, jiffies 4296017694 hex dump (first 8 bytes): 75 74 66 38 00 88 ff ff utf8.... backtrace (crc e26b2c0b): [<00000000a2491440>] __kmalloc_node_track_caller_noprof+0x36a/0x490 [<00000000a639679d>] kstrdup+0x3e/0xc0 [<0000000004c7a326>] isofs_parse_param+0x313/0x870 [<00000000c89f98bb>] vfs_parse_fs_param+0x208/0x3d0 [<00000000b43f1d0e>] vfs_parse_fs_string+0xea/0x150 [<0000000052eb11bd>] vfs_parse_monolithic_sep+0x178/0x200 [<00000000ddd9a6f4>] path_mount+0x136a/0x1ec0 [<00000000ea8fb998>] __x64_sys_mount+0x283/0x300 [<0000000011f8c07e>] do_syscall_64+0xbf/0x1d0 [<00000000acd38e3c>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880160a9220 (size 8): comm "syz-executor.6", pid 10884, jiffies 4296017738 hex dump (first 8 bytes): 75 74 66 38 00 88 ff ff utf8.... backtrace (crc e26b2c0b): [<00000000a2491440>] __kmalloc_node_track_caller_noprof+0x36a/0x490 [<00000000a639679d>] kstrdup+0x3e/0xc0 [<0000000004c7a326>] isofs_parse_param+0x313/0x870 [<00000000c89f98bb>] vfs_parse_fs_param+0x208/0x3d0 [<00000000b43f1d0e>] vfs_parse_fs_string+0xea/0x150 [<0000000052eb11bd>] vfs_parse_monolithic_sep+0x178/0x200 [<00000000ddd9a6f4>] path_mount+0x136a/0x1ec0 [<00000000ea8fb998>] __x64_sys_mount+0x283/0x300 [<0000000011f8c07e>] do_syscall_64+0xbf/0x1d0 [<00000000acd38e3c>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed