io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000015c0)=[{&(0x7f00000004c0)=""/138, 0x8a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x2) pread64(r0, &(0x7f00000003c0)=""/70, 0x46, 0x3325ac64) BUG: memory leak unreferenced object 0xffff88803a7c2d00 (size 184): comm "syz-executor.4", pid 22236, jiffies 4298125364 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 7991d45a): [<0000000098d28597>] kmem_cache_alloc_noprof+0x300/0x3d0 [<00000000946630a2>] prepare_creds+0x2e/0x760 [<000000005741d8d2>] copy_creds+0x7a/0xa20 [<0000000052496c36>] copy_process+0xf57/0x8e60 [<00000000b8a72c8b>] kernel_clone+0xeb/0x850 [<00000000dfe4b7dc>] __do_sys_clone+0xba/0x100 [<0000000049e7d912>] do_syscall_64+0xbf/0x1d0 [<00000000c60eada3>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800a827680 (size 32): comm "syz-executor.4", pid 22236, jiffies 4298125364 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f06ff8b7): [<00000000ef6a6c17>] __kmalloc_noprof+0x37e/0x4b0 [<0000000067816af0>] security_prepare_creds+0x101/0x160 [<00000000a738e1be>] prepare_creds+0x54e/0x760 [<000000005741d8d2>] copy_creds+0x7a/0xa20 [<0000000052496c36>] copy_process+0xf57/0x8e60 [<00000000b8a72c8b>] kernel_clone+0xeb/0x850 [<00000000dfe4b7dc>] __do_sys_clone+0xba/0x100 [<0000000049e7d912>] do_syscall_64+0xbf/0x1d0 [<00000000c60eada3>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800b82cc40 (size 360): comm "syz-executor.4", pid 28060, jiffies 4298125435 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace (crc 6b4248a8): [<0000000098d28597>] kmem_cache_alloc_noprof+0x300/0x3d0 [<00000000096bcef5>] alloc_empty_file+0x76/0x1e0 [<00000000e8bda7f4>] path_openat+0xe1/0x2980 [<0000000003c68502>] do_filp_open+0x1b8/0x410 [<000000004920f9f7>] do_sys_openat2+0x164/0x1d0 [<00000000febf5b3d>] __x64_sys_openat+0x143/0x200 [<0000000049e7d912>] do_syscall_64+0xbf/0x1d0 [<00000000c60eada3>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880137e0c80 (size 16): comm "syz-executor.4", pid 28060, jiffies 4298125435 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 03 00 00 00 01 00 00 00 ................ backtrace (crc 3febd78): [<0000000098d28597>] kmem_cache_alloc_noprof+0x300/0x3d0 [<00000000a692660b>] security_file_alloc+0x35/0x130 [<00000000c1ef1060>] init_file+0x95/0x490 [<00000000a15eb51a>] alloc_empty_file+0x94/0x1e0 [<00000000e8bda7f4>] path_openat+0xe1/0x2980 [<0000000003c68502>] do_filp_open+0x1b8/0x410 [<000000004920f9f7>] do_sys_openat2+0x164/0x1d0 [<00000000febf5b3d>] __x64_sys_openat+0x143/0x200 [<0000000049e7d912>] do_syscall_64+0xbf/0x1d0 [<00000000c60eada3>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed