Warning: Permanently added '10.128.0.62' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program [ 214.028224][ T5076] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810abe4e00 (size 256): comm "syz-executor368", pid 5105, jiffies 4294958029 (age 22.020s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a0 72 e5 0d 81 88 ff ff 80 e4 8c 10 81 88 ff ff .r.............. backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810add1780 (size 32): comm "syz-executor368", pid 5105, jiffies 4294958029 (age 22.020s) hex dump (first 32 bytes): ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a8 d1 e1 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] security_file_alloc+0x2a/0xb0 [] __alloc_file+0x5d/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810abe4e00 (size 256): comm "syz-executor368", pid 5105, jiffies 4294958029 (age 24.420s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a0 72 e5 0d 81 88 ff ff 80 e4 8c 10 81 88 ff ff .r.............. backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810add1780 (size 32): comm "syz-executor368", pid 5105, jiffies 4294958029 (age 24.420s) hex dump (first 32 bytes): ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a8 d1 e1 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] security_file_alloc+0x2a/0xb0 [] __alloc_file+0x5d/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810abe4e00 (size 256): comm "syz-executor368", pid 5105, jiffies 4294958029 (age 29.170s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a0 72 e5 0d 81 88 ff ff 80 e4 8c 10 81 88 ff ff .r.............. backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810add1780 (size 32): comm "syz-executor368", pid 5105, jiffies 4294958029 (age 29.170s) hex dump (first 32 bytes): ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a8 d1 e1 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] security_file_alloc+0x2a/0xb0 [] __alloc_file+0x5d/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810abe4e00 (size 256): comm "syz-executor368", pid 5105, jiffies 4294958029 (age 30.360s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a0 72 e5 0d 81 88 ff ff 80 e4 8c 10 81 88 ff ff .r.............. backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810add1780 (size 32): comm "syz-executor368", pid 5105, jiffies 4294958029 (age 30.360s) hex dump (first 32 bytes): ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a8 d1 e1 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [] security_file_alloc+0x2a/0xb0 [] __alloc_file+0x5d/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xeb3/0x1710 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161b/0x1c10 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd executing program executing program executing program [ 238.317927][ T5116] syz-executor368 (5116) used greatest stack depth: 10904 bytes left executing program