P_SET_STATUS64(r0, 0x4c05, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "30bc70eb5de9b8c1aa9747c447ddf9a2dde1244b7e319cbe7515315953577e8b9f315fa98a3d17368226f29d5834d888805bbf32f5abc4d63d2e68223c841542", "f010cc5f581e6d67339bf10d28e2a85331e750a46ae594d4cbd0c28ed69d9f3c2108c0f2877071b18b533987ad3eed1fd93fe307f39cc2dda27f5fad79821704", "601058795a82404776ee10546e74788441e49a57966d4c0dc05888f55ff1ab0b"}) BUG: memory leak unreferenced object 0xffff888019737600 (size 184): comm "syz-executor.2", pid 281, jiffies 4297881806 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc e0486733): kmem_cache_alloc_noprof+0x397/0x470 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73e0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800ebbde00 (size 128): comm "syz-executor.2", pid 281, jiffies 4297881806 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x37c/0x4b0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73e0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880195a6400 (size 512): comm "syz-executor.2", pid 66025, jiffies 4297881889 hex dump (first 32 bytes): e0 25 cf 84 ff ff ff ff 00 00 00 00 00 00 00 00 .%.............. 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... backtrace (crc 6f6dc9d1): __kmalloc_cache_noprof+0x3ad/0x470 alloc_fs_context+0x58/0x9e0 __x64_sys_fsopen+0xeb/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880447ed480 (size 96): comm "syz-executor.2", pid 66025, jiffies 4297881889 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc d877f9c): __kmalloc_cache_noprof+0x3ad/0x470 shmem_init_fs_context+0x45/0x280 alloc_fs_context+0x570/0x9e0 __x64_sys_fsopen+0xeb/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880447ed180 (size 96): comm "syz-executor.2", pid 66025, jiffies 4297881889 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc df068dc2): __kmalloc_cache_noprof+0x3ad/0x470 fscontext_alloc_log+0x4a/0x1b0 __x64_sys_fsopen+0x157/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880162a6380 (size 360): comm "syz-executor.2", pid 66025, jiffies 4297881889 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff a0 8e 6d 88 ff ff ff ff ..........m..... backtrace (crc 86163d40): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 anon_inode_getfd+0x56/0xb0 __x64_sys_fsopen+0x18c/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800dffa2e0 (size 16): comm "syz-executor.2", pid 66025, jiffies 4297881889 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 anon_inode_getfd+0x56/0xb0 __x64_sys_fsopen+0x18c/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed