r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x4, 0x1, 0x801, 0x0, 0xf00}, 0x14}}, 0x0) BUG: memory leak unreferenced object 0xffff88800cf58100 (size 184): comm "syz-executor.2", pid 278, jiffies 4295473059 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 2b275918): kmem_cache_alloc_noprof+0x406/0x680 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf59/0x7410 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800bc6c000 (size 128): comm "syz-executor.2", pid 278, jiffies 4295473059 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x497/0x760 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf59/0x7410 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888048aaa700 (size 360): comm "syz-executor.2", pid 12328, jiffies 4295473101 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 03 91 88 ff ff ff ff ........`....... backtrace (crc aab9187c): kmem_cache_alloc_noprof+0x406/0x680 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d675a40 (size 16): comm "syz-executor.2", pid 12328, jiffies 4295473101 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 20 00 00 00 01 00 00 00 ........ ....... backtrace (crc 7407d8cd): kmem_cache_alloc_noprof+0x406/0x680 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888016499500 (size 360): comm "syz-executor.2", pid 12341, jiffies 4295473128 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 03 91 88 ff ff ff ff ........`....... backtrace (crc ca8bcf71): kmem_cache_alloc_noprof+0x406/0x680 alloc_empty_file+0x58/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d675ba0 (size 16): comm "syz-executor.2", pid 12341, jiffies 4295473128 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 20 00 00 00 01 00 00 00 ........ ....... backtrace (crc 7407d8cd): kmem_cache_alloc_noprof+0x406/0x680 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 path_openat+0xe0/0x2880 do_filp_open+0x1e8/0x450 do_sys_openat2+0x104/0x1b0 __x64_sys_openat+0x142/0x200 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed