r1 = io_uring_setup(0x542e, &(0x7f0000000080)={0x0, 0x524e, 0x4, 0x1, 0x10a}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r2, 0x6, 0x1, 0x0, &(0x7f0000000040)) dup2(r1, r2) BUG: memory leak unreferenced object 0xffff888013664380 (size 360): comm "syz-executor.0", pid 165143, jiffies 4298273409 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff e0 fe 6d 88 ff ff ff ff ..........m..... backtrace (crc e5b9437f): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888040e78900 (size 16): comm "syz-executor.0", pid 165143, jiffies 4298273409 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18df/0x2c60 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed