sendmmsg$inet(r0, &(0x7f0000000640)=[{{&(0x7f0000000040)={0x2, 0x4e23, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0x18}}], 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) BUG: memory leak unreferenced object 0xffff88800d704600 (size 184): comm "syz-executor.4", pid 287, jiffies 4296043305 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc b865f67): kmem_cache_alloc_noprof+0x42f/0x690 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf59/0x7410 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888056c75600 (size 128): comm "syz-executor.4", pid 287, jiffies 4296043305 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 67da4532): __kmalloc_noprof+0x426/0x680 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf59/0x7410 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801f703c00 (size 360): comm "syz-executor.4", pid 38536, jiffies 4296043360 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 a4 8d 88 ff ff ff ff ........`....... backtrace (crc 9c30de4c): kmem_cache_alloc_noprof+0x42f/0x690 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __shmem_file_setup+0x1a7/0x370 shmem_zero_setup_desc+0x95/0x180 mmap_zero_prepare+0x8a/0xb0 __mmap_region+0x1a3c/0x28c0 mmap_region+0x314/0x3e0 do_mmap+0xa36/0x11d0 vm_mmap_pgoff+0x1fc/0x390 ksys_mmap_pgoff+0x3d7/0x520 __x64_sys_mmap+0x127/0x190 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801d967600 (size 16): comm "syz-executor.4", pid 38536, jiffies 4296043360 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x42f/0x690 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __shmem_file_setup+0x1a7/0x370 shmem_zero_setup_desc+0x95/0x180 mmap_zero_prepare+0x8a/0xb0 __mmap_region+0x1a3c/0x28c0 mmap_region+0x314/0x3e0 do_mmap+0xa36/0x11d0 vm_mmap_pgoff+0x1fc/0x390 ksys_mmap_pgoff+0x3d7/0x520 __x64_sys_mmap+0x127/0x190 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed