40000d6f4655fd7f4655fd7f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000d6f4655fd6f4655fd6f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000012700)="111fc0d9", 0x4, 0xc000}, {&(0x7f0000012d00)="2719c0d9", 0x4, 0x7}], 0x0, &(0x7f0000000040)={[{@debug}]}) BUG: memory leak unreferenced object 0xffff88800edd8c00 (size 184): comm "syz-executor.2", pid 281, jiffies 4294918961 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 28e299c9): kmem_cache_alloc_noprof+0x399/0x470 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73e0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800c55b600 (size 128): comm "syz-executor.2", pid 281, jiffies 4294918961 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x393/0x4c0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73e0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801756ddc0 (size 360): comm "syz-executor.2", pid 4649, jiffies 4294919076 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff a0 be 6d 88 ff ff ff ff ..........m..... backtrace (crc 59a15503): kmem_cache_alloc_noprof+0x399/0x470 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800e950420 (size 16): comm "syz-executor.2", pid 4649, jiffies 4294919076 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 36 00 00 00 01 00 00 00 ........6....... backtrace (crc ced3e061): kmem_cache_alloc_noprof+0x399/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed