ioctl$LOOP_SET_STATUS(r0, 0x4c03, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "953d49d62c7704e6b3e4bffbf1b381d798221ff48d301bf313c34dc58af8e98e68542891e9a00c833fab8300923e2f6a41d14b1005b90ec612286beae2c8f613", "f20089dfa809d17fcc061c75dacd791800000000000000000100"}) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) BUG: memory leak unreferenced object 0xffff88800d857e00 (size 184): comm "syz-executor.2", pid 285, jiffies 4296867646 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc bff6b0ee): kmem_cache_alloc_noprof+0x406/0x680 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1e/0x73d0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800cd5ef00 (size 128): comm "syz-executor.2", pid 285, jiffies 4296867646 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x497/0x760 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1e/0x73d0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880175e9dc0 (size 360): comm "syz-executor.2", pid 13278, jiffies 4296867668 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 83 90 88 ff ff ff ff ........`....... backtrace (crc a11e6857): kmem_cache_alloc_noprof+0x406/0x680 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800dccfac0 (size 16): comm "syz-executor.2", pid 13278, jiffies 4296867668 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 38 00 00 00 01 00 00 00 ........8....... backtrace (crc db59f253): kmem_cache_alloc_noprof+0x406/0x680 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888015180e00 (size 360): comm "syz-executor.2", pid 13278, jiffies 4296867672 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 79 01 cc 05 .....N......y... ff ff ff ff ff ff ff ff 60 83 90 88 ff ff ff ff ........`....... backtrace (crc 6705e3bf): kmem_cache_alloc_noprof+0x406/0x680 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800dccf3a0 (size 16): comm "syz-executor.2", pid 13278, jiffies 4296867672 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 38 00 00 00 01 00 00 00 ........8....... backtrace (crc db59f253): kmem_cache_alloc_noprof+0x406/0x680 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed