0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x1, 0x4}, 0x200, 0xffffffff, 0x1, 0x0, 0x4000000000000a, 0x9, 0xdb60, 0x0, 0xfc2, 0x0, 0xd}, r4, 0xb, 0xffffffffffffffff, 0x0) BUG: memory leak unreferenced object 0xffff88800d29a4c0 (size 8): comm "syz-executor.4", pid 6711, jiffies 4294919751 hex dump (first 8 bytes): 63 70 39 35 30 00 ff ff cp950... backtrace (crc b6b5fcbe): [<00000000970a1286>] __kmalloc_node_track_caller_noprof+0x36a/0x490 [<000000009b08bb35>] kstrdup+0x3e/0xc0 [<000000005a08183e>] isofs_parse_param+0x589/0x870 [<00000000ebca0932>] vfs_parse_fs_param+0x208/0x3d0 [<000000007c4decf0>] vfs_parse_fs_string+0xea/0x150 [<000000009c3572f5>] vfs_parse_monolithic_sep+0x178/0x200 [<00000000e791ce60>] path_mount+0x136a/0x1ec0 [<00000000c81aea4a>] __x64_sys_mount+0x283/0x300 [<00000000bfc0d3f6>] do_syscall_64+0xbf/0x1d0 [<000000006baeca24>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed