Warning: Permanently added '10.128.0.9' (ECDSA) to the list of known hosts. executing program [ 150.874991][ T5069] loop0: detected capacity change from 0 to 512 [ 150.881551][ T5069] EXT4-fs: Ignoring removed nobh option [ 150.887140][ T5069] EXT4-fs: Ignoring removed nobh option [ 150.894167][ T5069] EXT4-fs (loop0): 1 truncate cleaned up [ 150.899826][ T5069] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. executing program [ 156.077281][ T5072] overlayfs: failed to resolve './file0': -2 [ 161.171117][ T5067] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810a7f0700 (size 256): comm "syz-executor115", pid 5069, jiffies 4294952360 (age 12.390s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20 52 10 05 81 88 ff ff 80 41 7a 0d 81 88 ff ff R.......Az..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_openat+0x7f/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810b331d40 (size 32): comm "syz-executor115", pid 5069, jiffies 4294952360 (age 12.390s) hex dump (first 32 bytes): ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a8 d1 e1 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] security_file_alloc+0x2a/0xb0 [] __alloc_file+0x5d/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_openat+0x7f/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd