r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$rfkill(r0, &(0x7f00000000c0), 0x8) BUG: memory leak unreferenced object 0xffff88800c9e3600 (size 168): comm "syz-executor.4", pid 4831, jiffies 4295578468 (age 22.376s) hex dump (first 32 bytes): 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000083e65804>] prepare_creds+0x25/0x5e0 kernel/cred.c:258 [<000000006f36f0d8>] copy_creds+0x72/0x580 kernel/cred.c:358 [<0000000056d15421>] copy_process+0xfdc/0x7800 kernel/fork.c:2002 [<00000000bacb823e>] kernel_clone+0xe7/0x980 kernel/fork.c:2506 [<000000009a460255>] __do_sys_clone+0xc8/0x110 kernel/fork.c:2623 [<000000007727c5ea>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<0000000041a01deb>] entry_SYSCALL_64_after_hwframe+0x62/0xc7 BUG: memory leak unreferenced object 0xffff8880483d6000 (size 32): comm "syz-executor.4", pid 4831, jiffies 4295578468 (age 22.376s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000715090bc>] kmalloc include/linux/slab.h:557 [inline] [<00000000715090bc>] kzalloc include/linux/slab.h:664 [inline] [<00000000715090bc>] lsm_cred_alloc security/security.c:536 [inline] [<00000000715090bc>] security_prepare_creds+0x112/0x190 security/security.c:1649 [<0000000072030723>] prepare_creds+0x452/0x5e0 kernel/cred.c:285 [<000000006f36f0d8>] copy_creds+0x72/0x580 kernel/cred.c:358 [<0000000056d15421>] copy_process+0xfdc/0x7800 kernel/fork.c:2002 [<00000000bacb823e>] kernel_clone+0xe7/0x980 kernel/fork.c:2506 [<000000009a460255>] __do_sys_clone+0xc8/0x110 kernel/fork.c:2623 [<000000007727c5ea>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<0000000041a01deb>] entry_SYSCALL_64_after_hwframe+0x62/0xc7 BUG: memory leak unreferenced object 0xffff88804a1e0500 (size 488): comm "syz-executor.4", pid 8488, jiffies 4295578541 (age 22.303s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a0 64 e7 0f 80 88 ff ff d0 88 43 08 80 88 ff ff .d........C..... backtrace: [<0000000030eb1be3>] kmem_cache_zalloc include/linux/slab.h:654 [inline] [<0000000030eb1be3>] __alloc_file+0x21/0x320 fs/file_table.c:101 [<00000000ea924244>] alloc_empty_file+0x6d/0x170 fs/file_table.c:151 [<00000000f0fb456f>] path_openat+0xe3/0x26e0 fs/namei.c:3417 [<000000005ab7ac12>] do_filp_open+0x190/0x3e0 fs/namei.c:3458 [<00000000b2ce1d8a>] do_sys_openat2+0x171/0x420 fs/open.c:1186 [<000000003f355df9>] do_sys_open fs/open.c:1202 [inline] [<000000003f355df9>] __do_sys_openat fs/open.c:1218 [inline] [<000000003f355df9>] __se_sys_openat fs/open.c:1213 [inline] [<000000003f355df9>] __x64_sys_openat+0x13f/0x1f0 fs/open.c:1213 [<000000007727c5ea>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<0000000041a01deb>] entry_SYSCALL_64_after_hwframe+0x62/0xc7 BUG: memory leak unreferenced object 0xffff888009875cc0 (size 16): comm "syz-executor.4", pid 8488, jiffies 4295578541 (age 22.303s) hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 49 00 00 00 01 00 00 00 ........I....... backtrace: [<000000003adf62df>] kmem_cache_zalloc include/linux/slab.h:654 [inline] [<000000003adf62df>] lsm_file_alloc security/security.c:571 [inline] [<000000003adf62df>] security_file_alloc+0x34/0x170 security/security.c:1472 [<000000007e1234c9>] __alloc_file+0xb7/0x320 fs/file_table.c:106 [<00000000ea924244>] alloc_empty_file+0x6d/0x170 fs/file_table.c:151 [<00000000f0fb456f>] path_openat+0xe3/0x26e0 fs/namei.c:3417 [<000000005ab7ac12>] do_filp_open+0x190/0x3e0 fs/namei.c:3458 [<00000000b2ce1d8a>] do_sys_openat2+0x171/0x420 fs/open.c:1186 [<000000003f355df9>] do_sys_open fs/open.c:1202 [inline] [<000000003f355df9>] __do_sys_openat fs/open.c:1218 [inline] [<000000003f355df9>] __se_sys_openat fs/open.c:1213 [inline] [<000000003f355df9>] __x64_sys_openat+0x13f/0x1f0 fs/open.c:1213 [<000000007727c5ea>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<0000000041a01deb>] entry_SYSCALL_64_after_hwframe+0x62/0xc7 BUG: memory leak unreferenced object 0xffff88804d88b680 (size 488): comm "syz-executor.4", pid 8488, jiffies 4295578545 (age 22.299s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a0 64 e7 0f 80 88 ff ff d0 88 43 08 80 88 ff ff .d........C..... backtrace: [<0000000030eb1be3>] kmem_cache_zalloc include/linux/slab.h:654 [inline] [<0000000030eb1be3>] __alloc_file+0x21/0x320 fs/file_table.c:101 [<00000000ea924244>] alloc_empty_file+0x6d/0x170 fs/file_table.c:151 [<00000000f0fb456f>] path_openat+0xe3/0x26e0 fs/namei.c:3417 [<000000005ab7ac12>] do_filp_open+0x190/0x3e0 fs/namei.c:3458 [<00000000b2ce1d8a>] do_sys_openat2+0x171/0x420 fs/open.c:1186 [<000000003f355df9>] do_sys_open fs/open.c:1202 [inline] [<000000003f355df9>] __do_sys_openat fs/open.c:1218 [inline] [<000000003f355df9>] __se_sys_openat fs/open.c:1213 [inline] [<000000003f355df9>] __x64_sys_openat+0x13f/0x1f0 fs/open.c:1213 [<000000007727c5ea>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<0000000041a01deb>] entry_SYSCALL_64_after_hwframe+0x62/0xc7 BUG: leak checking failed