io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000040)=r4, 0x1) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0), 0x0, 0x0) inotify_init() inotify_init() BUG: memory leak unreferenced object 0xffff88801adfbd00 (size 184): comm "syz-executor.6", pid 3970, jiffies 4295357392 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc efb8f629): [<0000000080507ac6>] kmem_cache_alloc_noprof+0x300/0x3d0 [<000000009c0ea441>] prepare_creds+0x2e/0x760 [<00000000e0b92daf>] copy_creds+0x7a/0xa20 [<000000009fc2ec35>] copy_process+0xf57/0x8e00 [<0000000033382df4>] kernel_clone+0xeb/0x850 [<00000000c1ef481a>] __do_sys_clone+0xba/0x100 [<0000000004b01a92>] do_syscall_64+0xbf/0x1d0 [<00000000e564ebe4>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800e9e4e80 (size 32): comm "syz-executor.6", pid 3970, jiffies 4295357392 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f06ff8b7): [<0000000030e7c852>] __kmalloc_noprof+0x37e/0x4b0 [<00000000ffe7d7bc>] security_prepare_creds+0x101/0x160 [<000000006063af48>] prepare_creds+0x54e/0x760 [<00000000e0b92daf>] copy_creds+0x7a/0xa20 [<000000009fc2ec35>] copy_process+0xf57/0x8e00 [<0000000033382df4>] kernel_clone+0xeb/0x850 [<00000000c1ef481a>] __do_sys_clone+0xba/0x100 [<0000000004b01a92>] do_syscall_64+0xbf/0x1d0 [<00000000e564ebe4>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88803669ea80 (size 360): comm "syz-executor.6", pid 7165, jiffies 4295357543 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace (crc 9132af96): [<0000000080507ac6>] kmem_cache_alloc_noprof+0x300/0x3d0 [<000000008171b099>] alloc_empty_file+0x76/0x1e0 [<00000000c519753d>] path_openat+0xe1/0x2980 [<000000006341cd62>] do_filp_open+0x1b8/0x410 [<000000002a420b71>] do_sys_openat2+0x164/0x1d0 [<0000000025f187c2>] __x64_sys_openat+0x143/0x200 [<0000000004b01a92>] do_syscall_64+0xbf/0x1d0 [<00000000e564ebe4>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801358f7e0 (size 16): comm "syz-executor.6", pid 7165, jiffies 4295357543 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 03 00 00 00 01 00 00 00 ................ backtrace (crc 3febd78): [<0000000080507ac6>] kmem_cache_alloc_noprof+0x300/0x3d0 [<00000000082fe379>] security_file_alloc+0x35/0x130 [<000000006b94440d>] init_file+0x95/0x230 [<0000000060f8881c>] alloc_empty_file+0x94/0x1e0 [<00000000c519753d>] path_openat+0xe1/0x2980 [<000000006341cd62>] do_filp_open+0x1b8/0x410 [<000000002a420b71>] do_sys_openat2+0x164/0x1d0 [<0000000025f187c2>] __x64_sys_openat+0x143/0x200 [<0000000004b01a92>] do_syscall_64+0xbf/0x1d0 [<00000000e564ebe4>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801adfb400 (size 184): comm "syz-executor.6", pid 3970, jiffies 4295357816 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc ac9737f6): [<0000000080507ac6>] kmem_cache_alloc_noprof+0x300/0x3d0 [<000000009c0ea441>] prepare_creds+0x2e/0x760 [<00000000e0b92daf>] copy_creds+0x7a/0xa20 [<000000009fc2ec35>] copy_process+0xf57/0x8e00 [<0000000033382df4>] kernel_clone+0xeb/0x850 [<00000000c1ef481a>] __do_sys_clone+0xba/0x100 [<0000000004b01a92>] do_syscall_64+0xbf/0x1d0 [<00000000e564ebe4>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed