ioctl$TCSETAW(r0, 0x5407, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, "e4ff0300"}) read(r0, &(0x7f0000000000)=""/4096, 0x1000) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r1, 0x541e) read(r0, &(0x7f0000001000)=""/129, 0x81) BUG: memory leak unreferenced object 0xffff88800cb7e800 (size 184): comm "syz-executor.0", pid 285, jiffies 4297404525 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 75f5af2e): kmem_cache_alloc_noprof+0x397/0x470 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73b0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800cca0200 (size 128): comm "syz-executor.0", pid 285, jiffies 4297404525 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x37c/0x4b0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73b0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801d77d000 (size 512): comm "syz-executor.0", pid 30441, jiffies 4297404566 hex dump (first 32 bytes): 80 8e da 84 ff ff ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... backtrace (crc 6eb568ee): __kmalloc_cache_noprof+0x3ad/0x470 alloc_fs_context+0x58/0x9e0 __x64_sys_fsopen+0xeb/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888044e10000 (size 1024): comm "syz-executor.0", pid 30441, jiffies 4297404566 hex dump (first 32 bytes): 00 00 01 00 00 00 00 40 00 00 00 00 00 00 00 00 .......@........ ff ff ff ff ff ff ff ff 03 00 00 00 3c 00 00 00 ............<... backtrace (crc c7a5eb26): __kmalloc_cache_noprof+0x3ad/0x470 nfs_init_fs_context+0x4f/0x1200 alloc_fs_context+0x570/0x9e0 __x64_sys_fsopen+0xeb/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800e43af00 (size 192): comm "syz-executor.0", pid 30441, jiffies 4297404566 hex dump (first 32 bytes): 00 00 04 41 80 88 ff ff 40 66 00 00 85 02 2e 03 ...A....@f...... 08 af 43 0e 80 88 ff ff e0 37 40 81 ff ff ff ff ..C......7@..... backtrace (crc bf24bf1a): __kmalloc_cache_noprof+0x3ad/0x470 nfs_alloc_fhandle+0x3c/0xa0 nfs_init_fs_context+0x65/0x1200 alloc_fs_context+0x570/0x9e0 __x64_sys_fsopen+0xeb/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88804073a1c0 (size 360): comm "syz-executor.0", pid 30441, jiffies 4297404566 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff e0 fe 6d 88 ff ff ff ff ..........m..... backtrace (crc 30d29ba2): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 anon_inode_getfd+0x56/0xb0 __x64_sys_fsopen+0x18c/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d8ca520 (size 16): comm "syz-executor.0", pid 30441, jiffies 4297404566 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 anon_inode_getfd+0x56/0xb0 __x64_sys_fsopen+0x18c/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed