P_SET_STATUS64(r1, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9eb57c4f4e304208e382dbe68b67080ea0b3567fd2f7298fa03d41a3d019e93b5bdba715507c925d64a8440cd3432c0f7a9d4ba2d18ef8fbf15bd08c800ebfb3", "bad2a416d498e4b5ba70809112e82fbdcee01c897a6b2551cb3308fcb23d15ec7c914e6ae5aaf9b368918aaa3435bfb684301ea46df52a92533e7d9494515f31", "f744f66174956ff5372f246d58fcdfff8e9c984ca1cc5dfaea518e37abdbf0db"}) BUG: memory leak unreferenced object 0xffff8880161268c0 (size 360): comm "syz-executor.0", pid 14322, jiffies 4297074377 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 80 88 ff ff .....N.......... ff ff ff ff ff ff ff ff 20 af 6e 88 ff ff ff ff ........ .n..... backtrace (crc f25f22ef): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800e56f400 (size 16): comm "syz-executor.0", pid 14322, jiffies 4297074377 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888016cb9a40 (size 360): comm "syz-executor.0", pid 14322, jiffies 4297074394 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 20 af 6e 88 ff ff ff ff ........ .n..... backtrace (crc 6f5d632d): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800e56f100 (size 16): comm "syz-executor.0", pid 14322, jiffies 4297074394 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed