BUG: memory leak
unreferenced object 0xffff888118580200 (size 512):
  comm "syz-executor.4", pid 5149, jiffies 4294942020 (age 10.700s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815477b8>] __kmalloc+0x48/0x150
    [<ffffffff83e80a43>] tcf_pedit_init+0x323/0x9c0
    [<ffffffff83e7640e>] tcf_action_init_1+0x25e/0x370
    [<ffffffff83e7681c>] tcf_action_init+0x2fc/0x420
    [<ffffffff83e78bd2>] tcf_action_add+0xa2/0x280
    [<ffffffff83e78f46>] tc_ctl_action+0x196/0x210
    [<ffffffff83ddb2af>] rtnetlink_rcv_msg+0x22f/0x5b0
    [<ffffffff83f07e81>] netlink_rcv_skb+0x91/0x1d0
    [<ffffffff83f06dc8>] netlink_unicast+0x2b8/0x430
    [<ffffffff83f072c1>] netlink_sendmsg+0x381/0x710
    [<ffffffff83d754e6>] sock_sendmsg+0x56/0xb0
    [<ffffffff83d75a31>] ____sys_sendmsg+0x321/0x420
    [<ffffffff83d79e41>] ___sys_sendmsg+0xb1/0x110
    [<ffffffff83d79fcd>] __sys_sendmsg+0x8d/0x100
    [<ffffffff849d02c8>] do_syscall_64+0x38/0xb0
    [<ffffffff84a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff88811877d600 (size 512):
  comm "syz-executor.0", pid 5151, jiffies 4294942096 (age 9.950s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815477b8>] __kmalloc+0x48/0x150
    [<ffffffff83e80a43>] tcf_pedit_init+0x323/0x9c0
    [<ffffffff83e7640e>] tcf_action_init_1+0x25e/0x370
    [<ffffffff83e7681c>] tcf_action_init+0x2fc/0x420
    [<ffffffff83e78bd2>] tcf_action_add+0xa2/0x280
    [<ffffffff83e78f46>] tc_ctl_action+0x196/0x210
    [<ffffffff83ddb2af>] rtnetlink_rcv_msg+0x22f/0x5b0
    [<ffffffff83f07e81>] netlink_rcv_skb+0x91/0x1d0
    [<ffffffff83f06dc8>] netlink_unicast+0x2b8/0x430
    [<ffffffff83f072c1>] netlink_sendmsg+0x381/0x710
    [<ffffffff83d754e6>] sock_sendmsg+0x56/0xb0
    [<ffffffff83d75a31>] ____sys_sendmsg+0x321/0x420
    [<ffffffff83d79e41>] ___sys_sendmsg+0xb1/0x110
    [<ffffffff83d79fcd>] __sys_sendmsg+0x8d/0x100
    [<ffffffff849d02c8>] do_syscall_64+0x38/0xb0
    [<ffffffff84a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888117dac200 (size 512):
  comm "syz-executor.3", pid 5153, jiffies 4294942149 (age 9.420s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff815477b8>] __kmalloc+0x48/0x150
    [<ffffffff83e80a43>] tcf_pedit_init+0x323/0x9c0
    [<ffffffff83e7640e>] tcf_action_init_1+0x25e/0x370
    [<ffffffff83e7681c>] tcf_action_init+0x2fc/0x420
    [<ffffffff83e78bd2>] tcf_action_add+0xa2/0x280
    [<ffffffff83e78f46>] tc_ctl_action+0x196/0x210
    [<ffffffff83ddb2af>] rtnetlink_rcv_msg+0x22f/0x5b0
    [<ffffffff83f07e81>] netlink_rcv_skb+0x91/0x1d0
    [<ffffffff83f06dc8>] netlink_unicast+0x2b8/0x430
    [<ffffffff83f072c1>] netlink_sendmsg+0x381/0x710
    [<ffffffff83d754e6>] sock_sendmsg+0x56/0xb0
    [<ffffffff83d75a31>] ____sys_sendmsg+0x321/0x420
    [<ffffffff83d79e41>] ___sys_sendmsg+0xb1/0x110
    [<ffffffff83d79fcd>] __sys_sendmsg+0x8d/0x100
    [<ffffffff849d02c8>] do_syscall_64+0x38/0xb0
    [<ffffffff84a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

