sendmmsg$inet6(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000500)}}, {{0x0, 0xffffffffffffff95, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1, 0x0, 0x2}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x40045) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000080)=0x8, 0x4) BUG: memory leak unreferenced object 0xffff88800dc0c800 (size 128): comm "syz-executor.3", pid 8034, jiffies 4295338561 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 70dd9c59): __kmalloc_cache_noprof+0x445/0x6b0 v9fs_init_fs_context+0x49/0x5b0 alloc_fs_context+0x570/0x9e0 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801bfafb00 (size 8): comm "syz-executor.3", pid 8034, jiffies 4295338561 hex dump (first 8 bytes): 6e 6f 62 6f 64 79 00 ff nobody.. backtrace (crc 24a71c4e): __kmalloc_node_track_caller_noprof+0x3f4/0x690 kstrdup+0x3e/0xc0 v9fs_init_fs_context+0xf3/0x5b0 alloc_fs_context+0x570/0x9e0 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed