syzkaller login: [ 51.457162][ T24] audit: type=1400 audit(1559766730.234:35): avc: denied { map } for pid=6990 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.224' (ECDSA) to the list of known hosts. [ 57.325901][ T24] audit: type=1400 audit(1559766736.104:36): avc: denied { map } for pid=7002 comm="syz-executor388" path="/root/syz-executor388118361" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 64.421884][ T7003] IPVS: ftp: loaded support on port[0] = 21 [ 64.438923][ T7003] chnl_net:caif_netlink_parms(): no params data found [ 64.450585][ T7003] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.457726][ T7003] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.465051][ T7003] device bridge_slave_0 entered promiscuous mode [ 64.471746][ T7003] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.478786][ T7003] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.486063][ T7003] device bridge_slave_1 entered promiscuous mode [ 64.495655][ T7003] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 64.504507][ T7003] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.515174][ T7003] team0: Port device team_slave_0 added [ 64.520988][ T7003] team0: Port device team_slave_1 added [ 64.578765][ T7003] device hsr_slave_0 entered promiscuous mode [ 64.618090][ T7003] device hsr_slave_1 entered promiscuous mode [ 64.659974][ T7003] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.667057][ T7003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.674307][ T7003] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.681317][ T7003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.695061][ T7003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.702891][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.710540][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.718628][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.725854][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 64.734746][ T7003] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.742401][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.750669][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.757669][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.766117][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.774278][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.781294][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.791121][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.799544][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.807725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.817429][ T7003] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 64.828218][ T7003] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.839067][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.846938][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready executing program [ 64.854955][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.864795][ T7003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.881022][ T24] audit: type=1400 audit(1559766743.664:37): avc: denied { create } for pid=7011 comm="syz-executor388" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 64.881872][ T7011] FAULT_INJECTION: forcing a failure. [ 64.881872][ T7011] name failslab, interval 1, probability 0, space 0, times 1 [ 64.905952][ T24] audit: type=1400 audit(1559766743.664:38): avc: denied { write } for pid=7011 comm="syz-executor388" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 64.918796][ T7011] CPU: 1 PID: 7011 Comm: syz-executor388 Not tainted 5.2.0-rc3+ #20 [ 64.950953][ T7011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.960977][ T7011] Call Trace: [ 64.964235][ T7011] dump_stack+0xaa/0xd6 [ 64.968378][ T7011] should_fail.cold+0x3c/0x49 [ 64.973023][ T7011] __should_failslab+0x65/0xa0 [ 64.977765][ T7011] should_failslab+0x9/0x14 [ 64.982240][ T7011] kmem_cache_alloc_node+0x35/0x2a0 [ 64.987407][ T7011] __alloc_skb+0x6e/0x210 [ 64.991708][ T7011] ? netlink_autobind.isra.0+0xd7/0x110 [ 64.997304][ T7011] netlink_sendmsg+0x353/0x480 [ 65.002036][ T7011] sock_sendmsg+0x54/0x70 [ 65.006331][ T7011] ___sys_sendmsg+0x393/0x3c0 [ 65.010973][ T7011] ? _parse_integer+0xbf/0xe0 [ 65.015615][ T7011] ? _kstrtoull+0x92/0xd0 [ 65.019936][ T7011] ? kstrtouint+0x76/0xa0 [ 65.024242][ T7011] ? kstrtouint_from_user+0x7f/0xb0 [ 65.029412][ T7011] ? selinux_file_permission+0x30/0x1f0 [ 65.034932][ T7011] ? __fget_light+0x70/0xb0 [ 65.039400][ T7011] ? __fdget+0x1b/0x20 [ 65.043441][ T7011] ? sockfd_lookup_light+0x6c/0xb0 [ 65.048533][ T7011] __sys_sendmsg+0x80/0xf0 [ 65.052916][ T7011] __x64_sys_sendmsg+0x23/0x30 [ 65.057655][ T7011] do_syscall_64+0x76/0x1a0 [ 65.062142][ T7011] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 65.068012][ T7011] RIP: 0033:0x4425f9 [ 65.071875][ T7011] Code: e8 cc e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 65.091541][ T7011] RSP: 002b:00007ffc4e64fb88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 65.099931][ T7011] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004425f9 [ 65.107875][ T7011] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 65.115829][ T7011] RBP: ffffffffffffffff R08: 0000000000000001 R09: 0000000000000000 [ 65.123770][ T7011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 65.131711][ T7011] R13: 00007ffc4e64fbf0 R14: 0000000000000000 R15: 0000000000000000 executing program [ 72.018573][ T7012] FAULT_INJECTION: forcing a failure. [ 72.018573][ T7012] name failslab, interval 1, probability 0, space 0, times 0 [ 72.031327][ T7012] CPU: 1 PID: 7012 Comm: syz-executor388 Not tainted 5.2.0-rc3+ #20 [ 72.039266][ T7012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.049284][ T7012] Call Trace: [ 72.052543][ T7012] dump_stack+0xaa/0xd6 [ 72.056665][ T7012] should_fail.cold+0x3c/0x49 [ 72.061307][ T7012] __should_failslab+0x65/0xa0 [ 72.066035][ T7012] should_failslab+0x9/0x14 [ 72.070504][ T7012] __kmalloc+0x54/0x2c0 [ 72.074629][ T7012] ? rfkill_alloc+0x7d/0x130 [ 72.079184][ T7012] rfkill_alloc+0x7d/0x130 [ 72.083566][ T7012] wiphy_new_nm+0x5a9/0x820 [ 72.088035][ T7012] ieee80211_alloc_hw_nm+0x158/0x770 [ 72.093283][ T7012] mac80211_hwsim_new_radio+0xad/0x1150 [ 72.098792][ T7012] ? selinux_capable+0x36/0x40 [ 72.103527][ T7012] ? __nla_validate_parse+0x7b/0xab0 [ 72.108867][ T7012] ? security_capable+0x5d/0x80 [ 72.113716][ T7012] hwsim_new_radio_nl+0x369/0x50a [ 72.118710][ T7012] genl_family_rcv_msg+0x2ab/0x5b0 [ 72.123788][ T7012] ? __radix_tree_lookup+0x105/0x130 [ 72.129039][ T7012] genl_rcv_msg+0x54/0x9c [ 72.133334][ T7012] ? genl_family_rcv_msg+0x5b0/0x5b0 [ 72.138581][ T7012] netlink_rcv_skb+0x61/0x170 [ 72.143221][ T7012] genl_rcv+0x29/0x40 [ 72.147176][ T7012] netlink_unicast+0x1ec/0x2d0 [ 72.151902][ T7012] netlink_sendmsg+0x26a/0x480 [ 72.156634][ T7012] sock_sendmsg+0x54/0x70 [ 72.160926][ T7012] ___sys_sendmsg+0x393/0x3c0 [ 72.165595][ T7012] ? _parse_integer+0xbf/0xe0 [ 72.170239][ T7012] ? _kstrtoull+0x92/0xd0 [ 72.174535][ T7012] ? kstrtouint+0x76/0xa0 [ 72.178827][ T7012] ? kstrtouint_from_user+0x7f/0xb0 [ 72.183988][ T7012] ? selinux_file_permission+0x30/0x1f0 [ 72.189499][ T7012] ? __fget_light+0x70/0xb0 [ 72.193968][ T7012] ? __fdget+0x1b/0x20 [ 72.198001][ T7012] ? sockfd_lookup_light+0x6c/0xb0 [ 72.203081][ T7012] __sys_sendmsg+0x80/0xf0 [ 72.207468][ T7012] __x64_sys_sendmsg+0x23/0x30 [ 72.212197][ T7012] do_syscall_64+0x76/0x1a0 [ 72.216687][ T7012] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.222634][ T7012] RIP: 0033:0x4425f9 [ 72.226494][ T7012] Code: e8 cc e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 72.246063][ T7012] RSP: 002b:00007ffc4e64fb88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 72.254461][ T7012] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004425f9 [ 72.262422][ T7012] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 72.270374][ T7012] RBP: ffffffffffffffff R08: 0000000000000001 R09: 0000000000000000 [ 72.278324][ T7012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 72.286264][ T7012] R13: 00007ffc4e64fbf0 R14: 0000000000000000 R15: 0000000000000000 executing program [ 77.690377][ T7013] FAULT_INJECTION: forcing a failure. [ 77.690377][ T7013] name failslab, interval 1, probability 0, space 0, times 0 [ 77.703099][ T7013] CPU: 1 PID: 7013 Comm: syz-executor388 Not tainted 5.2.0-rc3+ #20 [ 77.711040][ T7013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.721061][ T7013] Call Trace: [ 77.724319][ T7013] dump_stack+0xaa/0xd6 [ 77.728441][ T7013] should_fail.cold+0x3c/0x49 [ 77.733119][ T7013] __should_failslab+0x65/0xa0 [ 77.737859][ T7013] should_failslab+0x9/0x14 [ 77.742326][ T7013] __kmalloc+0x54/0x2c0 [ 77.746487][ T7013] ? rfkill_alloc+0x7d/0x130 [ 77.751051][ T7013] rfkill_alloc+0x7d/0x130 [ 77.755434][ T7013] wiphy_new_nm+0x5a9/0x820 [ 77.759904][ T7013] ieee80211_alloc_hw_nm+0x158/0x770 [ 77.765166][ T7013] mac80211_hwsim_new_radio+0xad/0x1150 [ 77.770675][ T7013] ? selinux_capable+0x36/0x40 [ 77.775408][ T7013] ? __nla_validate_parse+0x7b/0xab0 [ 77.780657][ T7013] ? security_capable+0x5d/0x80 [ 77.785472][ T7013] hwsim_new_radio_nl+0x369/0x50a [ 77.790469][ T7013] genl_family_rcv_msg+0x2ab/0x5b0 [ 77.795544][ T7013] ? __radix_tree_lookup+0x105/0x130 [ 77.800794][ T7013] genl_rcv_msg+0x54/0x9c [ 77.805112][ T7013] ? genl_family_rcv_msg+0x5b0/0x5b0 [ 77.810365][ T7013] netlink_rcv_skb+0x61/0x170 [ 77.815014][ T7013] genl_rcv+0x29/0x40 [ 77.818962][ T7013] netlink_unicast+0x1ec/0x2d0 [ 77.823692][ T7013] netlink_sendmsg+0x26a/0x480 [ 77.828424][ T7013] sock_sendmsg+0x54/0x70 [ 77.832730][ T7013] ___sys_sendmsg+0x393/0x3c0 [ 77.837371][ T7013] ? _parse_integer+0xbf/0xe0 [ 77.842010][ T7013] ? _kstrtoull+0x92/0xd0 [ 77.846302][ T7013] ? kstrtouint+0x76/0xa0 [ 77.850601][ T7013] ? kstrtouint_from_user+0x7f/0xb0 [ 77.855767][ T7013] ? selinux_file_permission+0x30/0x1f0 [ 77.861276][ T7013] ? __fget_light+0x70/0xb0 [ 77.865745][ T7013] ? __fdget+0x1b/0x20 [ 77.869812][ T7013] ? sockfd_lookup_light+0x6c/0xb0 [ 77.874904][ T7013] __sys_sendmsg+0x80/0xf0 [ 77.879374][ T7013] __x64_sys_sendmsg+0x23/0x30 [ 77.884103][ T7013] do_syscall_64+0x76/0x1a0 [ 77.888575][ T7013] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.894433][ T7013] RIP: 0033:0x4425f9 [ 77.898297][ T7013] Code: e8 cc e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 77.917864][ T7013] RSP: 002b:00007ffc4e64fb88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 77.926239][ T7013] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004425f9 [ 77.934266][ T7013] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 77.942201][ T7013] RBP: ffffffffffffffff R08: 0000000000000001 R09: 0000000000000000 [ 77.950136][ T7013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 77.958074][ T7013] R13: 00007ffc4e64fbf0 R14: 0000000000000000 R15: 0000000000000000 executing program [ 83.387654][ T7014] FAULT_INJECTION: forcing a failure. [ 83.387654][ T7014] name failslab, interval 1, probability 0, space 0, times 0 [ 83.400400][ T7014] CPU: 0 PID: 7014 Comm: syz-executor388 Not tainted 5.2.0-rc3+ #20 [ 83.408392][ T7014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.418414][ T7014] Call Trace: [ 83.421673][ T7014] dump_stack+0xaa/0xd6 [ 83.425799][ T7014] should_fail.cold+0x3c/0x49 [ 83.432025][ T7014] __should_failslab+0x65/0xa0 [ 83.436760][ T7014] should_failslab+0x9/0x14 [ 83.441233][ T7014] __kmalloc+0x54/0x2c0 [ 83.445360][ T7014] ? rfkill_alloc+0x7d/0x130 [ 83.449913][ T7014] rfkill_alloc+0x7d/0x130 [ 83.454295][ T7014] wiphy_new_nm+0x5a9/0x820 [ 83.458763][ T7014] ieee80211_alloc_hw_nm+0x158/0x770 [ 83.464011][ T7014] mac80211_hwsim_new_radio+0xad/0x1150 [ 83.469523][ T7014] ? selinux_capable+0x36/0x40 [ 83.474254][ T7014] ? __nla_validate_parse+0x7b/0xab0 [ 83.479508][ T7014] ? security_capable+0x5d/0x80 [ 83.484321][ T7014] hwsim_new_radio_nl+0x369/0x50a [ 83.489320][ T7014] genl_family_rcv_msg+0x2ab/0x5b0 [ 83.494394][ T7014] ? __radix_tree_lookup+0x105/0x130 [ 83.499644][ T7014] genl_rcv_msg+0x54/0x9c [ 83.503940][ T7014] ? genl_family_rcv_msg+0x5b0/0x5b0 [ 83.509190][ T7014] netlink_rcv_skb+0x61/0x170 [ 83.513834][ T7014] genl_rcv+0x29/0x40 [ 83.517793][ T7014] netlink_unicast+0x1ec/0x2d0 [ 83.522529][ T7014] netlink_sendmsg+0x26a/0x480 [ 83.527263][ T7014] sock_sendmsg+0x54/0x70 [ 83.531557][ T7014] ___sys_sendmsg+0x393/0x3c0 [ 83.536201][ T7014] ? _parse_integer+0xbf/0xe0 [ 83.540848][ T7014] ? _kstrtoull+0x92/0xd0 [ 83.552418][ T7014] ? kstrtouint+0x76/0xa0 [ 83.556722][ T7014] ? kstrtouint_from_user+0x7f/0xb0 [ 83.561891][ T7014] ? selinux_file_permission+0x30/0x1f0 [ 83.567402][ T7014] ? __fget_light+0x70/0xb0 [ 83.571885][ T7014] ? __fdget+0x1b/0x20 [ 83.575968][ T7014] ? sockfd_lookup_light+0x6c/0xb0 [ 83.581047][ T7014] __sys_sendmsg+0x80/0xf0 [ 83.585427][ T7014] __x64_sys_sendmsg+0x23/0x30 [ 83.590246][ T7014] do_syscall_64+0x76/0x1a0 [ 83.594733][ T7014] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 83.600591][ T7014] RIP: 0033:0x4425f9 [ 83.604473][ T7014] Code: e8 cc e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 83.624041][ T7014] RSP: 002b:00007ffc4e64fb88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 83.632415][ T7014] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004425f9 [ 83.640355][ T7014] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 83.648296][ T7014] RBP: ffffffffffffffff R08: 0000000000000001 R09: 0000000000000000 [ 83.656236][ T7014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 83.664173][ T7014] R13: 00007ffc4e64fbf0 R14: 0000000000000000 R15: 0000000000000000 [ 84.810917][ T7003] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 88.958252][ T7003] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 91.223421][ T7003] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888118b56960 (size 32): comm "syz-executor388", pid 7012, jiffies 4294944475 (age 19.280s) hex dump (first 32 bytes): 70 68 79 33 00 74 61 73 6b 2f 37 30 31 32 00 de phy3.task/7012.. 01 00 5e 00 00 01 00 00 00 00 00 00 00 00 00 00 ..^............. backtrace: [<0000000051ac41cf>] __kmalloc_track_caller+0x15d/0x2c0 [<000000009f67fe61>] kvasprintf+0x6d/0xe0 [<000000000fa70350>] kvasprintf_const+0x96/0xe0 [<000000004250606a>] kobject_set_name_vargs+0x40/0xe0 [<0000000073b46a76>] dev_set_name+0x63/0x90 [<00000000568f5702>] wiphy_new_nm+0x2d9/0x820 [<00000000cae5a185>] ieee80211_alloc_hw_nm+0x158/0x770 [<00000000065e44fe>] mac80211_hwsim_new_radio+0xad/0x1150 [<0000000037bd36a2>] hwsim_new_radio_nl+0x369/0x50a [<00000000b47ca0f8>] genl_family_rcv_msg+0x2ab/0x5b0 [<000000002921a1b5>] genl_rcv_msg+0x54/0x9c [<000000006c49ba3d>] netlink_rcv_skb+0x61/0x170 [<0000000096a75fda>] genl_rcv+0x29/0x40 [<00000000ea1705c6>] netlink_unicast+0x1ec/0x2d0 [<0000000038a3be14>] netlink_sendmsg+0x26a/0x480 [<0000000072d07109>] sock_sendmsg+0x54/0x70 BUG: memory leak unreferenced object 0xffff888118b56bc0 (size 32): comm "syz-executor388", pid 7013, jiffies 4294945042 (age 13.610s) hex dump (first 32 bytes): 70 68 79 34 00 74 61 73 6b 2f 37 30 31 33 00 de phy4.task/7013.. 01 00 5e 00 00 01 00 00 00 00 00 00 00 00 00 00 ..^............. backtrace: [<0000000051ac41cf>] __kmalloc_track_caller+0x15d/0x2c0 [<000000009f67fe61>] kvasprintf+0x6d/0xe0 [<000000000fa70350>] kvasprintf_const+0x96/0xe0 [<000000004250606a>] kobject_set_name_vargs+0x40/0xe0 [<0000000073b46a76>] dev_set_name+0x63/0x90 [<00000000568f5702>] wiphy_new_nm+0x2d9/0x820 [<00000000cae5a185>] ieee80211_alloc_hw_nm+0x158/0x770 [<00000000065e44fe>] mac80211_hwsim_new_radio+0xad/0x1150 [<0000000037bd36a2>] hwsim_new_radio_nl+0x369/0x50a [<00000000b47ca0f8>] genl_family_rcv_msg+0x2ab/0x5b0 [<000000002921a1b5>] genl_rcv_msg+0x54/0x9c [<000000006c49ba3d>] netlink_rcv_skb+0x61/0x170 [<0000000096a75fda>] genl_rcv+0x29/0x40 [<00000000ea1705c6>] netlink_unicast+0x1ec/0x2d0 [<0000000038a3be14>] netlink_sendmsg+0x26a/0x480 [<0000000072d07109>] sock_sendmsg+0x54/0x70 BUG: memory leak unreferenced object 0xffff888120a97760 (size 32): comm "syz-executor388", pid 7014, jiffies 4294945611 (age 7.920s) hex dump (first 32 bytes): 70 68 79 35 00 74 61 73 6b 2f 37 30 31 34 00 de phy5.task/7014.. 01 00 5e 00 00 01 00 00 00 00 00 00 00 00 00 00 ..^............. backtrace: [<0000000051ac41cf>] __kmalloc_track_caller+0x15d/0x2c0 [<000000009f67fe61>] kvasprintf+0x6d/0xe0 [<000000000fa70350>] kvasprintf_const+0x96/0xe0 [<000000004250606a>] kobject_set_name_vargs+0x40/0xe0 [<0000000073b46a76>] dev_set_name+0x63/0x90 [<00000000568f5702>] wiphy_new_nm+0x2d9/0x820 [<00000000cae5a185>] ieee80211_alloc_hw_nm+0x158/0x770 [<00000000065e44fe>] mac80211_hwsim_new_radio+0xad/0x1150 [<0000000037bd36a2>] hwsim_new_radio_nl+0x369/0x50a [<00000000b47ca0f8>] genl_family_rcv_msg+0x2ab/0x5b0 [<000000002921a1b5>] genl_rcv_msg+0x54/0x9c [<000000006c49ba3d>] netlink_rcv_skb+0x61/0x170 [<0000000096a75fda>] genl_rcv+0x29/0x40 [<00000000ea1705c6>] netlink_unicast+0x1ec/0x2d0 [<0000000038a3be14>] netlink_sendmsg+0x26a/0x480 [<0000000072d07109>] sock_sendmsg+0x54/0x70