Warning: Permanently added '10.128.0.235' (ECDSA) to the list of known hosts.
executing program
executing program
executing program
executing program
executing program
[  240.734700][ T3617] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
executing program
executing program
executing program
[  240.772303][   T23] audit: type=1804 audit(1665618521.543:2): pid=3627 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.ZIBscL/0/file0" dev="sda1" ino=1150 res=1 errno=0
[  240.869515][   T23] audit: type=1804 audit(1665618521.543:3): pid=3635 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.yAdh2k/0/file0" dev="sda1" ino=1157 res=1 errno=0
[  240.984928][   T23] audit: type=1804 audit(1665618521.543:4): pid=3637 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.E5q78m/0/file0" dev="sda1" ino=1158 res=1 errno=0
[  241.061211][   T23] audit: type=1804 audit(1665618521.573:5): pid=3634 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.wxxC7P/0/file0" dev="sda1" ino=1163 res=1 errno=0
[  241.112343][   T23] audit: type=1804 audit(1665618521.573:6): pid=3636 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.pOWK20/0/file0" dev="sda1" ino=1164 res=1 errno=0
[  241.135041][   T23] audit: type=1804 audit(1665618521.573:7): pid=3639 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.lnNoob/0/file0" dev="sda1" ino=1165 res=1 errno=0
[  241.158833][   T23] audit: type=1804 audit(1665618521.583:8): pid=3640 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.gwd8IV/0/file0" dev="sda1" ino=1167 res=1 errno=0
[  241.181441][   T23] audit: type=1804 audit(1665618521.583:9): pid=3641 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.v4ilF5/0/file0" dev="sda1" ino=1168 res=1 errno=0
[  247.376195][ T3626] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff888105a4b500 (size 256):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 23.770s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    a0 04 7d 07 81 88 ff ff 00 8f b0 0e 81 88 ff ff  ..}.............
  backtrace:
    [<ffffffff815dbadf>] __alloc_file+0x1f/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff8881024495a0 (size 24):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 23.770s)
  hex dump (first 24 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00                          ........
  backtrace:
    [<ffffffff82222e7a>] security_file_alloc+0x2a/0xb0
    [<ffffffff815dbb1d>] __alloc_file+0x5d/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b4b900 (size 176):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 23.760s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81283347>] prepare_creds+0x27/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888100c4bb80 (size 32):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 23.760s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ce961>] __kmalloc+0x41/0x130
    [<ffffffff82223655>] security_prepare_creds+0xa5/0xd0
    [<ffffffff81283606>] prepare_creds+0x2e6/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105a4b500 (size 256):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 25.050s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    a0 04 7d 07 81 88 ff ff 00 8f b0 0e 81 88 ff ff  ..}.............
  backtrace:
    [<ffffffff815dbadf>] __alloc_file+0x1f/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff8881024495a0 (size 24):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 25.050s)
  hex dump (first 24 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00                          ........
  backtrace:
    [<ffffffff82222e7a>] security_file_alloc+0x2a/0xb0
    [<ffffffff815dbb1d>] __alloc_file+0x5d/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b4b900 (size 176):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 25.040s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81283347>] prepare_creds+0x27/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888100c4bb80 (size 32):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 25.040s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ce961>] __kmalloc+0x41/0x130
    [<ffffffff82223655>] security_prepare_creds+0xa5/0xd0
    [<ffffffff81283606>] prepare_creds+0x2e6/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105a4b500 (size 256):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 26.330s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    a0 04 7d 07 81 88 ff ff 00 8f b0 0e 81 88 ff ff  ..}.............
  backtrace:
    [<ffffffff815dbadf>] __alloc_file+0x1f/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff8881024495a0 (size 24):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 26.330s)
  hex dump (first 24 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00                          ........
  backtrace:
    [<ffffffff82222e7a>] security_file_alloc+0x2a/0xb0
    [<ffffffff815dbb1d>] __alloc_file+0x5d/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b4b900 (size 176):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 26.320s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81283347>] prepare_creds+0x27/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888100c4bb80 (size 32):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 26.320s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ce961>] __kmalloc+0x41/0x130
    [<ffffffff82223655>] security_prepare_creds+0xa5/0xd0
    [<ffffffff81283606>] prepare_creds+0x2e6/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105a4b500 (size 256):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 27.580s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    a0 04 7d 07 81 88 ff ff 00 8f b0 0e 81 88 ff ff  ..}.............
  backtrace:
    [<ffffffff815dbadf>] __alloc_file+0x1f/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff8881024495a0 (size 24):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 27.580s)
  hex dump (first 24 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00                          ........
  backtrace:
    [<ffffffff82222e7a>] security_file_alloc+0x2a/0xb0
    [<ffffffff815dbb1d>] __alloc_file+0x5d/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b4b900 (size 176):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 27.570s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81283347>] prepare_creds+0x27/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888100c4bb80 (size 32):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 27.570s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ce961>] __kmalloc+0x41/0x130
    [<ffffffff82223655>] security_prepare_creds+0xa5/0xd0
    [<ffffffff81283606>] prepare_creds+0x2e6/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105a4b500 (size 256):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 31.460s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    a0 04 7d 07 81 88 ff ff 00 8f b0 0e 81 88 ff ff  ..}.............
  backtrace:
    [<ffffffff815dbadf>] __alloc_file+0x1f/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff8881024495a0 (size 24):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 31.460s)
  hex dump (first 24 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00                          ........
  backtrace:
    [<ffffffff82222e7a>] security_file_alloc+0x2a/0xb0
    [<ffffffff815dbb1d>] __alloc_file+0x5d/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b4b900 (size 176):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 31.450s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81283347>] prepare_creds+0x27/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888100c4bb80 (size 32):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 31.450s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ce961>] __kmalloc+0x41/0x130
    [<ffffffff82223655>] security_prepare_creds+0xa5/0xd0
    [<ffffffff81283606>] prepare_creds+0x2e6/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105a4b500 (size 256):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 31.490s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    a0 04 7d 07 81 88 ff ff 00 8f b0 0e 81 88 ff ff  ..}.............
  backtrace:
    [<ffffffff815dbadf>] __alloc_file+0x1f/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff8881024495a0 (size 24):
  comm "syz-executor426", pid 3643, jiffies 4294961352 (age 31.490s)
  hex dump (first 24 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00                          ........
  backtrace:
    [<ffffffff82222e7a>] security_file_alloc+0x2a/0xb0
    [<ffffffff815dbb1d>] __alloc_file+0x5d/0xf0
    [<ffffffff815dc6e9>] alloc_empty_file_noaccount+0x19/0x50
    [<ffffffff815efee6>] vfs_tmpfile_open+0x26/0x90
    [<ffffffff81bf7e0c>] ovl_copy_up_one+0xe5c/0x1670
    [<ffffffff81bf8727>] ovl_copy_up_flags+0x107/0x170
    [<ffffffff81bf8890>] ovl_maybe_copy_up+0x100/0x130
    [<ffffffff81bedeb2>] ovl_open+0x52/0x100
    [<ffffffff815d009f>] do_dentry_open+0x2ff/0x7c0
    [<ffffffff815f68ef>] path_openat+0x161f/0x1b70
    [<ffffffff815f96e1>] do_filp_open+0xc1/0x1b0
    [<ffffffff815d3a0d>] do_sys_openat2+0xed/0x260
    [<ffffffff815d429d>] __x64_sys_open+0x7d/0xe0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b4b900 (size 176):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 31.480s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81283347>] prepare_creds+0x27/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888100c4bb80 (size 32):
  comm "syz-executor426", pid 3645, jiffies 4294961353 (age 31.480s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 12 bb 00 81 88 ff ff  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ce961>] __kmalloc+0x41/0x130
    [<ffffffff82223655>] security_prepare_creds+0xa5/0xd0
    [<ffffffff81283606>] prepare_creds+0x2e6/0x470
    [<ffffffff81be20cd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815df27c>] mount_nodev+0x5c/0xc0
    [<ffffffff8164321b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815dcd78>] vfs_get_tree+0x28/0x100
    [<ffffffff81620c37>] path_mount+0xc37/0x10d0
    [<ffffffff8162181e>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff84600f65>] do_syscall_64+0x35/0xb0
    [<ffffffff84800087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

executing program
executing program
[  272.599612][   T23] audit: type=1804 audit(1665618553.373:10): pid=3659 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.ZIBscL/1/file0" dev="sda1" ino=1153 res=1 errno=0
[  272.637250][   T23] audit: type=1804 audit(1665618553.403:11): pid=3661 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor426" name="/root/syzkaller.gwd8IV/1/file0" dev="sda1" ino=1156 res=1 errno=0
[  272.803611][ T3662] syz-executor426 (3662) used greatest stack depth: 10776 bytes left