io_submit(0x0, 0x1, &(0x7f00000003c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x0, 0x0, r2, &(0x7f0000000000)="fa", 0x1}]) io_getevents(0x0, 0x6, 0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000080)={0x77359400}) close(r0) BUG: memory leak unreferenced object 0xffff88800bc98200 (size 184): comm "syz-executor.6", pid 287, jiffies 4296288455 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 94f68a50): kmem_cache_alloc_noprof+0x414/0x670 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1f/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800dc62b00 (size 128): comm "syz-executor.6", pid 287, jiffies 4296288456 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 10116262): __kmalloc_noprof+0x45c/0x6e0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1f/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800e89cfc0 (size 360): comm "syz-executor.6", pid 10985, jiffies 4296288476 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 40 82 6f 88 ff ff ff ff ........@.o..... backtrace (crc 5dd7cf20): kmem_cache_alloc_noprof+0x414/0x670 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d7b9e00 (size 16): comm "syz-executor.6", pid 10985, jiffies 4296288476 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 3d 00 00 00 01 00 00 00 ........=....... backtrace (crc 93b9fc37): kmem_cache_alloc_noprof+0x414/0x670 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880173c6380 (size 360): comm "syz-executor.6", pid 10985, jiffies 4296288483 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 40 82 6f 88 ff ff ff ff ........@.o..... backtrace (crc 820cb642): kmem_cache_alloc_noprof+0x414/0x670 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d7b9f60 (size 16): comm "syz-executor.6", pid 10985, jiffies 4296288483 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 3d 00 00 00 01 00 00 00 ........=....... backtrace (crc 93b9fc37): kmem_cache_alloc_noprof+0x414/0x670 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed