sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=@updsa={0x13c, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@multicast1, 0x0, 0x33}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) BUG: memory leak unreferenced object 0xffff8880475691a0 (size 144): comm "syz-executor.4", pid 15221, jiffies 4296595912 (age 28.145s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 8b 98 4d 65 00 00 00 00 ..........Me.... fb 64 09 34 00 00 00 00 8b 98 4d 65 00 00 00 00 .d.4......Me.... backtrace: [<00000000678b38c1>] kmem_cache_zalloc include/linux/slab.h:654 [inline] [<00000000678b38c1>] __kernfs_iattrs+0xbc/0x470 fs/kernfs/inode.c:43 [<0000000018e244dd>] kernfs_iattrs fs/kernfs/inode.c:66 [inline] [<0000000018e244dd>] kernfs_xattr_set+0x2b/0x80 fs/kernfs/inode.c:304 [<00000000a72d19bc>] selinux_kernfs_init_security+0x26d/0x4c0 security/selinux/hooks.c:3522 [<000000004930e145>] security_kernfs_init_security+0x4e/0xb0 security/security.c:1456 [<000000003efff1bc>] __kernfs_new_node+0x531/0x860 fs/kernfs/dir.c:674 [<000000009d50c83b>] kernfs_new_node fs/kernfs/dir.c:699 [inline] [<000000009d50c83b>] kernfs_create_dir_ns+0x9c/0x230 fs/kernfs/dir.c:1035 [<0000000016b4128b>] kernfs_create_dir include/linux/kernfs.h:561 [inline] [<0000000016b4128b>] cgroup_create kernel/cgroup/cgroup.c:5343 [inline] [<0000000016b4128b>] cgroup_mkdir+0x318/0xf50 kernel/cgroup/cgroup.c:5477 [<000000009164f160>] kernfs_iop_mkdir+0x14d/0x1e0 fs/kernfs/dir.c:1136 [<00000000eda35fa8>] vfs_mkdir+0x493/0x700 fs/namei.c:3712 [<00000000b940b46b>] do_mkdirat+0x150/0x2b0 fs/namei.c:3734 [<0000000095a5c225>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000b5f1d456>] entry_SYSCALL_64_after_hwframe+0x62/0xc7 BUG: leak checking failed