r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syncfs(r0) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) BUG: memory leak unreferenced object 0xffff88800ec8e300 (size 184): comm "syz-executor.5", pid 287, jiffies 4294967848 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f76b10d6): kmem_cache_alloc_noprof+0x406/0x680 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf59/0x7410 kernel_clone+0xea/0x7f0 __do_sys_clone+0xc7/0x110 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801eed1900 (size 128): comm "syz-executor.5", pid 287, jiffies 4294967848 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc bc4c1f05): __kmalloc_noprof+0x497/0x760 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf59/0x7410 kernel_clone+0xea/0x7f0 __do_sys_clone+0xc7/0x110 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801efb1dc0 (size 360): comm "syz-executor.5", pid 5035, jiffies 4294967901 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff a8 7c 46 0a .....N.......|F. ff ff ff ff ff ff ff ff 60 03 91 88 ff ff ff ff ........`....... backtrace (crc ddb26923): kmem_cache_alloc_noprof+0x406/0x680 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d2bcc40 (size 16): comm "syz-executor.5", pid 5035, jiffies 4294967901 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 41dbba05): kmem_cache_alloc_noprof+0x406/0x680 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed