syz_io_uring_setup(0x71b6, &(0x7f0000000080)={0x0, 0xf698, 0x20, 0x0, 0x251, 0x0, r0}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_complete(r1) r3 = memfd_secret(0x0) sendmsg$TEAM_CMD_NOOP(r3, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) BUG: memory leak unreferenced object 0xffff88800c85d800 (size 184): comm "syz-executor.2", pid 277, jiffies 4297314435 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 31f75cb0): kmem_cache_alloc_noprof+0x2fe/0x3d0 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73e0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800b6f7600 (size 128): comm "syz-executor.2", pid 277, jiffies 4297314435 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x37c/0x4b0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73e0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801a3ea780 (size 1136): comm "syz-executor.2", pid 16092, jiffies 4297314460 hex dump (first 32 bytes): 80 81 04 00 00 00 00 00 00 00 00 00 00 00 08 00 ................ ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ backtrace (crc 88b68e42): kmem_cache_alloc_lru_noprof+0x301/0x3c0 alloc_inode+0x181/0x250 alloc_anon_inode+0x26/0x420 anon_inode_make_secure_inode+0x32/0x150 secretmem_file_create.constprop.0+0x43/0x290 __x64_sys_memfd_secret+0xca/0x160 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800eb10cf0 (size 120): comm "syz-executor.2", pid 16092, jiffies 4297314460 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 80 a7 3e 1a 80 88 ff ff 08 0d b1 0e 80 88 ff ff ..>............. backtrace (crc 2546b3b6): kmem_cache_alloc_noprof+0x2fe/0x3d0 security_inode_alloc+0x3e/0x130 inode_init_always_gfp+0xc94/0xff0 alloc_inode+0x8d/0x250 alloc_anon_inode+0x26/0x420 anon_inode_make_secure_inode+0x32/0x150 secretmem_file_create.constprop.0+0x43/0x290 __x64_sys_memfd_secret+0xca/0x160 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801ddbd780 (size 312): comm "syz-executor.2", pid 16092, jiffies 4297314460 hex dump (first 32 bytes): 00 00 28 04 80 88 ff ff 02 00 00 00 10 00 a8 04 ..(............. 00 7e 6e 88 ff ff ff ff 00 00 00 00 00 00 00 00 .~n............. backtrace (crc c178d923): kmem_cache_alloc_lru_noprof+0x301/0x3c0 __d_alloc+0x31/0xa10 d_alloc_pseudo+0x1d/0xc0 alloc_file_pseudo+0xbe/0x220 secretmem_file_create.constprop.0+0x89/0x290 __x64_sys_memfd_secret+0xca/0x160 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88803f55d180 (size 360): comm "syz-executor.2", pid 16092, jiffies 4297314460 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff a0 6f 6e 88 ff ff ff ff .........on..... backtrace (crc 49ebb3b6): kmem_cache_alloc_noprof+0x2fe/0x3d0 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 secretmem_file_create.constprop.0+0x89/0x290 __x64_sys_memfd_secret+0xca/0x160 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed