r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x5) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg1\x00'}) BUG: memory leak unreferenced object 0xffff88801682e1c0 (size 360): comm "syz-executor.1", pid 16009, jiffies 4296932079 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 40 52 6f 88 ff ff ff ff ........@Ro..... backtrace (crc 22fa1dd8): kmem_cache_alloc_noprof+0x414/0x690 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888009a1ae00 (size 16): comm "syz-executor.1", pid 16009, jiffies 4296932079 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 1f 00 00 00 01 00 00 00 ................ backtrace (crc 28ea991c): kmem_cache_alloc_noprof+0x414/0x690 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed