syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000400008000f8000020004000030000200000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) BUG: memory leak unreferenced object 0xffff8880174a4700 (size 360): comm "syz-executor.5", pid 18082, jiffies 4297232115 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff a0 6f 6e 88 ff ff ff ff .........on..... backtrace (crc aceb653d): kmem_cache_alloc_noprof+0x2fe/0x3d0 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800e32ee80 (size 16): comm "syz-executor.5", pid 18082, jiffies 4297232119 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 7f 00 00 00 01 00 00 00 ................ backtrace (crc f80139a7): kmem_cache_alloc_noprof+0x2fe/0x3d0 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed