r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r4, r7, 0x0, 0x10001) BUG: memory leak unreferenced object 0xffff88801569e800 (size 128): comm "syz-executor.7", pid 6230, jiffies 4295222289 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 96bdc52d): __kmalloc_cache_noprof+0x445/0x6b0 v9fs_init_fs_context+0x49/0x5b0 alloc_fs_context+0x570/0x9e0 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x3f0 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800c941800 (size 128): comm "syz-executor.7", pid 6288, jiffies 4295232250 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 453de51): __kmalloc_cache_noprof+0x445/0x6b0 v9fs_init_fs_context+0x49/0x5b0 alloc_fs_context+0x570/0x9e0 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x3f0 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888015e37c80 (size 8): comm "syz-executor.7", pid 6288, jiffies 4295232250 hex dump (first 8 bytes): 6e 6f 62 6f 64 79 00 ff nobody.. backtrace (crc 24a71c4e): __kmalloc_node_track_caller_noprof+0x3f4/0x690 kstrdup+0x3e/0xc0 v9fs_init_fs_context+0xf3/0x5b0 alloc_fs_context+0x570/0x9e0 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x3f0 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed