r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x145c02, 0x0) io_setup(0xfff, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f0000000280)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) BUG: memory leak unreferenced object 0xffff88800f8e8c00 (size 128): comm "syz-executor.3", pid 5470, jiffies 4295108738 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc cd3a90e2): __kmalloc_cache_noprof+0x4a4/0x780 v9fs_init_fs_context+0x49/0x5b0 alloc_fs_context+0x56d/0xb10 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801ea863a0 (size 8): comm "syz-executor.3", pid 5470, jiffies 4295108738 hex dump (first 8 bytes): 6e 6f 62 6f 64 79 00 ff nobody.. backtrace (crc 24a71c4e): __kmalloc_node_track_caller_noprof+0x4c1/0x890 kstrdup+0x3e/0xc0 v9fs_init_fs_context+0xf3/0x5b0 alloc_fs_context+0x56d/0xb10 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed