sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="2800000016000102", @ANYRES32, @ANYRES64, @ANYRES64=r0], 0x28}], 0x1}, 0x0) BUG: memory leak unreferenced object 0xffff88800e17a800 (size 184): comm "syz-executor.4", pid 6500, jiffies 4296244489 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 25a19026): kmem_cache_alloc_noprof+0x414/0x690 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1f/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d327900 (size 128): comm "syz-executor.4", pid 6500, jiffies 4296244489 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x45c/0x6e0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1f/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888016e59180 (size 360): comm "syz-executor.4", pid 11699, jiffies 4296244592 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 40 52 6f 88 ff ff ff ff ........@Ro..... backtrace (crc 3e0cfa95): kmem_cache_alloc_noprof+0x414/0x690 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800ca25f80 (size 16): comm "syz-executor.4", pid 11699, jiffies 4296244592 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 36 00 00 00 01 00 00 00 ........6....... backtrace (crc ced3e061): kmem_cache_alloc_noprof+0x414/0x690 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800da3db40 (size 32): comm "syz-executor.4", pid 11699, jiffies 4296244593 hex dump (first 32 bytes): 00 a0 ff 0e 80 88 ff ff 80 91 e5 16 80 88 ff ff ................ 00 40 b7 49 80 88 ff ff 00 00 00 00 00 00 00 00 .@.I............ backtrace (crc 59df78a3): __kmalloc_cache_noprof+0x42a/0x690 posix_clock_open+0xc9/0x290 chrdev_open+0x234/0x690 do_dentry_open+0x71c/0x1420 vfs_open+0x82/0x3f0 path_openat+0x1c3f/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed