f0000000080)={0x94, 0x1d, 0x100, 0x0, 0x0, "", [@generic="afebf085e794c9f4dd65a155807e5713614837d50eb206b2e29ac794ee50cb7be8a34b14b462b69123c0b4345fbbda6e479cbf16aafbeb9554772361d19da9337e1ab6ac85e847d557a91aae6d6b6bb097daf184f0c51d46d4564fe20aaf4351e612ab310063860e17077948357fbf12f6dc432202a79b3a0fabab1f3a377c867e"]}, 0x94}], 0x1, 0x0, 0x0, 0x800}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sched\x00') BUG: memory leak unreferenced object 0xffff88800cb6cd00 (size 184): comm "syz-executor.7", pid 13822, jiffies 4295801424 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 ed 41 00 00 00 00 00 00 .........A...... backtrace (crc c7b4b23f): kmem_cache_alloc_noprof+0x48f/0x760 prepare_creds+0x2c/0x830 __sys_setresuid+0x553/0xb30 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888018aa0cc0 (size 32): comm "syz-executor.7", pid 13822, jiffies 4295801424 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f06ff8b7): __kmalloc_noprof+0x4e8/0x880 security_prepare_creds+0x101/0x160 prepare_creds+0x55c/0x830 __sys_setresuid+0x553/0xb30 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880517ea000 (size 360): comm "syz-executor.7", pid 13822, jiffies 4295801617 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 86 02 9a 03 .....N.......... ff ff ff ff ff ff ff ff 00 0a 98 88 ff ff ff ff ................ backtrace (crc 8252c1f6): kmem_cache_alloc_noprof+0x48f/0x760 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __shmem_file_setup+0x1a8/0x370 shmem_zero_setup_desc+0x95/0x180 mmap_zero_prepare+0x8a/0xb0 __mmap_region+0x18d7/0x26e0 mmap_region+0x314/0x3e0 do_mmap+0xa36/0x11d0 vm_mmap_pgoff+0x1fc/0x390 ksys_mmap_pgoff+0x3d7/0x520 __x64_sys_mmap+0x127/0x190 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800a08d2a0 (size 16): comm "syz-executor.7", pid 13822, jiffies 4295801617 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x48f/0x760 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __shmem_file_setup+0x1a8/0x370 shmem_zero_setup_desc+0x95/0x180 mmap_zero_prepare+0x8a/0xb0 __mmap_region+0x18d7/0x26e0 mmap_region+0x314/0x3e0 do_mmap+0xa36/0x11d0 vm_mmap_pgoff+0x1fc/0x390 ksys_mmap_pgoff+0x3d7/0x520 __x64_sys_mmap+0x127/0x190 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed