r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000140), 0x6) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) dup3(r0, r1, 0x0) ioctl$sock_bt_hci(r1, 0x8903, &(0x7f00000000c0)) BUG: memory leak unreferenced object 0xffff888015efc700 (size 360): comm "syz-executor.3", pid 16314, jiffies 4296736040 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff a0 9f 6e 88 ff ff ff ff ..........n..... backtrace (crc f22fcd7c): kmem_cache_alloc_noprof+0x2fe/0x3d0 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18cb/0x2c20 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800c3e2e00 (size 16): comm "syz-executor.3", pid 16314, jiffies 4296736040 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x2fe/0x3d0 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 __do_sys_perf_event_open+0x18cb/0x2c20 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed