Warning: Permanently added '10.128.0.112' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program [ 429.241024][ T5086] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888105083cc0 (size 176): comm "syz-executor204", pid 5105, jiffies 4294979561 (age 17.950s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105095340 (size 32): comm "syz-executor204", pid 5105, jiffies 4294979561 (age 17.950s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 a8 f1 e1 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881052ec480 (size 176): comm "syz-executor204", pid 5109, jiffies 4294979561 (age 17.950s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888104f5de40 (size 32): comm "syz-executor204", pid 5109, jiffies 4294979561 (age 17.950s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 a8 f1 e1 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888104c753c0 (size 176): comm "syz-executor204", pid 5108, jiffies 4294979561 (age 17.950s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105083cc0 (size 176): comm "syz-executor204", pid 5105, jiffies 4294979561 (age 21.090s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105095340 (size 32): comm "syz-executor204", pid 5105, jiffies 4294979561 (age 21.090s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 a8 f1 e1 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881052ec480 (size 176): comm "syz-executor204", pid 5109, jiffies 4294979561 (age 21.090s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888104f5de40 (size 32): comm "syz-executor204", pid 5109, jiffies 4294979561 (age 21.090s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 a8 f1 e1 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888104c753c0 (size 176): comm "syz-executor204", pid 5108, jiffies 4294979561 (age 21.090s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2760 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd executing program [ 447.475853][ T5114] syz-executor204 (5114) used greatest stack depth: 10960 bytes left executing program executing program executing program executing program executing program [ 449.807537][ T5082] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 450.028692][ T5129] syz-executor204 (5129) used greatest stack depth: 10744 bytes left