setsockopt$sock_int(r4, 0x1, 0x2f, &(0x7f0000000300)=0xffffffff, 0x31) r5 = pidfd_getfd(r0, r3, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8982, &(0x7f0000000000)={0x7, 'syzkaller0\x00', {0x6}, 0x1}) BUG: memory leak unreferenced object 0xffff888017cd3600 (size 184): comm "syz-executor.3", pid 286, jiffies 4297017628 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc b1f1cd3d): kmem_cache_alloc_noprof+0x48f/0x760 prepare_creds+0x2c/0x830 copy_creds+0x7c/0xa30 copy_process+0xeb0/0x7230 kernel_clone+0xea/0x7c0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801d78a240 (size 32): comm "syz-executor.3", pid 286, jiffies 4297017628 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f06ff8b7): __kmalloc_noprof+0x4e8/0x880 security_prepare_creds+0x101/0x160 prepare_creds+0x55c/0x830 copy_creds+0x7c/0xa30 copy_process+0xeb0/0x7230 kernel_clone+0xea/0x7c0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888013aca700 (size 360): comm "syz-executor.3", pid 181241, jiffies 4297017781 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 00 4a 97 88 ff ff ff ff .........J...... backtrace (crc 7a3dfae): kmem_cache_alloc_noprof+0x48f/0x760 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __shmem_file_setup+0x1a8/0x370 shmem_zero_setup_desc+0x95/0x180 mmap_zero_prepare+0x8a/0xb0 __mmap_region+0x18d7/0x26e0 mmap_region+0x314/0x3e0 do_mmap+0xa36/0x11d0 vm_mmap_pgoff+0x1fc/0x390 ksys_mmap_pgoff+0x3d7/0x520 __x64_sys_mmap+0x127/0x190 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801369be00 (size 16): comm "syz-executor.3", pid 181241, jiffies 4297017781 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x48f/0x760 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __shmem_file_setup+0x1a8/0x370 shmem_zero_setup_desc+0x95/0x180 mmap_zero_prepare+0x8a/0xb0 __mmap_region+0x18d7/0x26e0 mmap_region+0x314/0x3e0 do_mmap+0xa36/0x11d0 vm_mmap_pgoff+0x1fc/0x390 ksys_mmap_pgoff+0x3d7/0x520 __x64_sys_mmap+0x127/0x190 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed