ppoll(&(0x7f0000000040)=[{r2, 0x2006}], 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={[0x8]}, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syncfs(r3) BUG: memory leak unreferenced object 0xffff88800e619a00 (size 184): comm "syz-executor.0", pid 286, jiffies 4294857686 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc e603be3c): kmem_cache_alloc_noprof+0x42f/0x690 prepare_creds+0x2c/0x7e0 copy_creds+0x7c/0xa30 copy_process+0xf59/0x72a0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d44bf00 (size 128): comm "syz-executor.0", pid 286, jiffies 4294857686 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x426/0x680 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7c/0xa30 copy_process+0xf59/0x72a0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888016983dc0 (size 360): comm "syz-executor.0", pid 4248, jiffies 4294857717 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 00 86 93 88 ff ff ff ff ................ backtrace (crc e2625f20): kmem_cache_alloc_noprof+0x42f/0x690 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __shmem_file_setup+0x1a7/0x370 shmem_zero_setup_desc+0x95/0x180 mmap_zero_prepare+0x8a/0xb0 __mmap_region+0x1a3c/0x28c0 mmap_region+0x314/0x3e0 do_mmap+0xa36/0x11d0 vm_mmap_pgoff+0x1fc/0x390 ksys_mmap_pgoff+0x3d7/0x520 __x64_sys_mmap+0x127/0x190 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d03d3e0 (size 16): comm "syz-executor.0", pid 4248, jiffies 4294857717 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x42f/0x690 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __shmem_file_setup+0x1a7/0x370 shmem_zero_setup_desc+0x95/0x180 mmap_zero_prepare+0x8a/0xb0 __mmap_region+0x1a3c/0x28c0 mmap_region+0x314/0x3e0 do_mmap+0xa36/0x11d0 vm_mmap_pgoff+0x1fc/0x390 ksys_mmap_pgoff+0x3d7/0x520 __x64_sys_mmap+0x127/0x190 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880169836c0 (size 360): comm "syz-executor.0", pid 4250, jiffies 4294857722 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 00 86 93 88 ff ff ff ff ................ backtrace (crc 7d1dbd55): kmem_cache_alloc_noprof+0x42f/0x690 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __shmem_file_setup+0x1a7/0x370 shmem_zero_setup_desc+0x95/0x180 mmap_zero_prepare+0x8a/0xb0 __mmap_region+0x1a3c/0x28c0 mmap_region+0x314/0x3e0 do_mmap+0xa36/0x11d0 vm_mmap_pgoff+0x1fc/0x390 ksys_mmap_pgoff+0x3d7/0x520 __x64_sys_mmap+0x127/0x190 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed