DELETE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x54, 0x2, 0x1, 0x201, 0x6000000, 0x0, {0xa}, [@CTA_SYNPROXY={0x4}, @CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast2}}}]}]}, 0x54}}, 0x0) BUG: memory leak unreferenced object 0xffff8880170fefc0 (size 360): comm "syz-executor.7", pid 16484, jiffies 4297224094 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 be 6d 88 ff ff ff ff ........`.m..... backtrace (crc a3c64f04): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800c2ddec0 (size 16): comm "syz-executor.7", pid 16484, jiffies 4297224094 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880170fe1c0 (size 360): comm "syz-executor.5", pid 16512, jiffies 4297233083 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 be 6d 88 ff ff ff ff ........`.m..... backtrace (crc 921f2d7d): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800bc85a40 (size 16): comm "syz-executor.5", pid 16512, jiffies 4297233083 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800e108000 (size 360): comm "syz-executor.0", pid 16532, jiffies 4297233280 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 be 6d 88 ff ff ff ff ........`.m..... backtrace (crc 5ed91b76): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800ce2e0a0 (size 16): comm "syz-executor.0", pid 16532, jiffies 4297233280 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880164cea80 (size 360): comm "syz-executor.5", pid 16536, jiffies 4297233311 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 be 6d 88 ff ff ff ff ........`.m..... backtrace (crc d2b488a6): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed