e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d4928100197f102307c05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f17cc5be2182f7c39b0a47eb23e0808b5d87dd2a9ce88eb48a601", 0x200) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xfdef) BUG: memory leak unreferenced object 0xffff88800c555500 (size 128): comm "syz-executor.2", pid 5919, jiffies 4295235795 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 96bdc52d): __kmalloc_cache_noprof+0x445/0x6b0 v9fs_init_fs_context+0x49/0x5b0 alloc_fs_context+0x570/0x9e0 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed