sendmsg$TIPC_CMD_GET_REMOTE_MNG(r6, &(0x7f0000002100)={&(0x7f0000002040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000020c0)={&(0x7f0000002080)={0x1c, 0x0, 0x8, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x1) BUG: memory leak unreferenced object 0xffff888034fb2a00 (size 184): comm "syz-executor.0", pid 284, jiffies 4294791277 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 3e39f627): kmem_cache_alloc_noprof+0x397/0x470 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73b0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d328200 (size 128): comm "syz-executor.0", pid 284, jiffies 4294791277 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x37c/0x4b0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73b0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d2476c0 (size 360): comm "syz-executor.0", pid 4053, jiffies 4294791301 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff e0 2e 6e 88 ff ff ff ff ..........n..... backtrace (crc beadf813): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800eadb6c0 (size 16): comm "syz-executor.0", pid 4053, jiffies 4294791301 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 1f 00 00 00 01 00 00 00 ................ backtrace (crc 28ea991c): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888009e94500 (size 184): comm "syz-executor.0", pid 284, jiffies 4294791535 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 19832739): kmem_cache_alloc_noprof+0x397/0x470 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73b0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800b7c2200 (size 128): comm "syz-executor.0", pid 284, jiffies 4294791535 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x37c/0x4b0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73b0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888013924700 (size 360): comm "syz-executor.0", pid 4108, jiffies 4294791747 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff e0 2e 6e 88 ff ff ff ff ..........n..... backtrace (crc 34e66554): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed