r1 = dup(0xffffffffffffffff) dup2(r1, r0) mknodat$loop(r0, &(0x7f0000000040)='./file1\x00', 0xc000, 0x0) BUG: memory leak unreferenced object 0xffff88800e63d000 (size 184): comm "syz-executor.7", pid 10523, jiffies 4295894861 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 9630bf2e): [<00000000d3ec3d74>] kmem_cache_alloc_noprof+0x300/0x3d0 [<0000000030783c60>] prepare_creds+0x2e/0x760 [<00000000975860a7>] copy_creds+0x7a/0xa20 [<000000002602ae69>] copy_process+0xf57/0x8e60 [<00000000560db9d3>] kernel_clone+0xeb/0x850 [<0000000035ea727c>] __do_sys_clone+0xba/0x100 [<0000000064f64d19>] do_syscall_64+0xbf/0x1d0 [<0000000092f4436e>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801671b5c0 (size 32): comm "syz-executor.7", pid 10523, jiffies 4295894861 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f06ff8b7): [<00000000e6b9d821>] __kmalloc_noprof+0x37e/0x4b0 [<0000000071cfe61d>] security_prepare_creds+0x101/0x160 [<00000000e22dad28>] prepare_creds+0x54e/0x760 [<00000000975860a7>] copy_creds+0x7a/0xa20 [<000000002602ae69>] copy_process+0xf57/0x8e60 [<00000000560db9d3>] kernel_clone+0xeb/0x850 [<0000000035ea727c>] __do_sys_clone+0xba/0x100 [<0000000064f64d19>] do_syscall_64+0xbf/0x1d0 [<0000000092f4436e>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888018fd9440 (size 8): comm "syz-executor.7", pid 15448, jiffies 4295895049 hex dump (first 8 bytes): ff ff ff ff ff ff ff ff ........ backtrace (crc 44660075): [<000000005e77811a>] __kmalloc_cache_noprof+0x316/0x3e0 [<00000000872e4c9c>] do_signalfd4+0x267/0x470 [<00000000ed06a566>] __x64_sys_signalfd4+0x140/0x1c0 [<0000000064f64d19>] do_syscall_64+0xbf/0x1d0 [<0000000092f4436e>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88803e0e48c0 (size 360): comm "syz-executor.7", pid 15448, jiffies 4295895049 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace (crc 2638a584): [<00000000d3ec3d74>] kmem_cache_alloc_noprof+0x300/0x3d0 [<00000000f9afc1b0>] alloc_empty_file+0x76/0x1e0 [<00000000c5586ab8>] alloc_file_pseudo+0x139/0x200 [<00000000073a3f86>] anon_inode_getfile+0xb4/0x1e0 [<0000000034dba48b>] do_signalfd4+0x2fb/0x470 [<00000000ed06a566>] __x64_sys_signalfd4+0x140/0x1c0 [<0000000064f64d19>] do_syscall_64+0xbf/0x1d0 [<0000000092f4436e>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800c469000 (size 16): comm "syz-executor.7", pid 15448, jiffies 4295895049 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): [<00000000d3ec3d74>] kmem_cache_alloc_noprof+0x300/0x3d0 [<0000000026a9d3e9>] security_file_alloc+0x35/0x130 [<00000000059003ad>] init_file+0x95/0x490 [<0000000088f3e8c5>] alloc_empty_file+0x94/0x1e0 [<00000000c5586ab8>] alloc_file_pseudo+0x139/0x200 [<00000000073a3f86>] anon_inode_getfile+0xb4/0x1e0 [<0000000034dba48b>] do_signalfd4+0x2fb/0x470 [<00000000ed06a566>] __x64_sys_signalfd4+0x140/0x1c0 [<0000000064f64d19>] do_syscall_64+0xbf/0x1d0 [<0000000092f4436e>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed