Warning: Permanently added '10.128.1.154' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program [ 229.732204][ T3645] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 236.440876][ T3648] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810639ff00 (size 176): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 30.020s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b5eb40 (size 32): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 30.020s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22b900 (size 256): comm "syz-executor173", pid 3677, jiffies 4294960248 (age 30.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20 0e b0 07 81 88 ff ff 80 c7 4e 13 81 88 ff ff .........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22bf00 (size 256): comm "syz-executor173", pid 3670, jiffies 4294960249 (age 30.000s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 90 b9 0b 81 88 ff ff 80 c4 4e 13 81 88 ff ff ..........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810639ff00 (size 176): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 31.380s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b5eb40 (size 32): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 31.380s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22b900 (size 256): comm "syz-executor173", pid 3677, jiffies 4294960248 (age 31.370s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20 0e b0 07 81 88 ff ff 80 c7 4e 13 81 88 ff ff .........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22bf00 (size 256): comm "syz-executor173", pid 3670, jiffies 4294960249 (age 31.360s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 90 b9 0b 81 88 ff ff 80 c4 4e 13 81 88 ff ff ..........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810639ff00 (size 176): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.730s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b5eb40 (size 32): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.730s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22b900 (size 256): comm "syz-executor173", pid 3677, jiffies 4294960248 (age 32.720s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20 0e b0 07 81 88 ff ff 80 c7 4e 13 81 88 ff ff .........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22bf00 (size 256): comm "syz-executor173", pid 3670, jiffies 4294960249 (age 32.710s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 90 b9 0b 81 88 ff ff 80 c4 4e 13 81 88 ff ff ..........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810639ff00 (size 176): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.780s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b5eb40 (size 32): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.780s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22b900 (size 256): comm "syz-executor173", pid 3677, jiffies 4294960248 (age 32.770s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20 0e b0 07 81 88 ff ff 80 c7 4e 13 81 88 ff ff .........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22bf00 (size 256): comm "syz-executor173", pid 3670, jiffies 4294960249 (age 32.760s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 90 b9 0b 81 88 ff ff 80 c4 4e 13 81 88 ff ff ..........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810639ff00 (size 176): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.840s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b5eb40 (size 32): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.840s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22b900 (size 256): comm "syz-executor173", pid 3677, jiffies 4294960248 (age 32.830s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20 0e b0 07 81 88 ff ff 80 c7 4e 13 81 88 ff ff .........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22bf00 (size 256): comm "syz-executor173", pid 3670, jiffies 4294960249 (age 32.820s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 90 b9 0b 81 88 ff ff 80 c4 4e 13 81 88 ff ff ..........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810639ff00 (size 176): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.890s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b5eb40 (size 32): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.890s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22b900 (size 256): comm "syz-executor173", pid 3677, jiffies 4294960248 (age 32.880s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20 0e b0 07 81 88 ff ff 80 c7 4e 13 81 88 ff ff .........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22bf00 (size 256): comm "syz-executor173", pid 3670, jiffies 4294960249 (age 32.870s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 90 b9 0b 81 88 ff ff 80 c4 4e 13 81 88 ff ff ..........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810639ff00 (size 176): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.950s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] prepare_creds+0x27/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff888105b5eb40 (size 32): comm "syz-executor173", pid 3670, jiffies 4294960247 (age 32.950s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff .........r...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x46/0x120 [] security_prepare_creds+0xa5/0xd0 [] prepare_creds+0x2e6/0x470 [] ovl_fill_super+0xad/0x2730 [] mount_nodev+0x5c/0xc0 [] legacy_get_tree+0x2b/0x90 [] vfs_get_tree+0x28/0x100 [] path_mount+0xc37/0x10d0 [] __x64_sys_mount+0x18e/0x1d0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22b900 (size 256): comm "syz-executor173", pid 3677, jiffies 4294960248 (age 32.940s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20 0e b0 07 81 88 ff ff 80 c7 4e 13 81 88 ff ff .........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810e22bf00 (size 256): comm "syz-executor173", pid 3670, jiffies 4294960249 (age 32.930s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 90 b9 0b 81 88 ff ff 80 c4 4e 13 81 88 ff ff ..........N..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file_noaccount+0x19/0x50 [] vfs_tmpfile_open+0x26/0x90 [] ovl_copy_up_one+0xe5c/0x1670 [] ovl_copy_up_flags+0x107/0x170 [] ovl_maybe_copy_up+0x100/0x130 [] ovl_open+0x52/0x100 [] do_dentry_open+0x2ff/0x7c0 [] path_openat+0x161f/0x1b70 [] do_filp_open+0xc1/0x1b0 [] do_sys_openat2+0xed/0x260 [] __x64_sys_open+0x7d/0xe0 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x63/0xcd executing program [ 263.268390][ T3688] syz-executor173 (3688) used greatest stack depth: 10720 bytes left executing program