r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write$bt_hci(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="01"], 0xb) BUG: memory leak unreferenced object 0xffff88800d6d2400 (size 184): comm "syz-executor.0", pid 278, jiffies 4295494442 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc bcebe228): kmem_cache_alloc_noprof+0x414/0x670 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1f/0x73d0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88804cd19c80 (size 288): comm "syz-executor.0", pid 278, jiffies 4295494466 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace (crc 3214f1d9): kmem_cache_alloc_noprof+0x414/0x670 alloc_pid+0xd5/0x1100 copy_process+0x4800/0x73d0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88804d524000 (size 2048): comm "syz-executor.0", pid 10439, jiffies 4295494499 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1f 00 03 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace (crc f981f49): __kmalloc_noprof+0x45c/0x6e0 sk_prot_alloc+0x157/0x280 sk_alloc+0x34/0xbd0 bt_sock_alloc+0x3a/0x3b0 hci_sock_create+0xb2/0x170 bt_sock_create+0x15d/0x2c0 __sock_create+0x369/0x810 __sys_socket+0x145/0x260 __x64_sys_socket+0x73/0xb0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800aadbd00 (size 32): comm "syz-executor.0", pid 10439, jiffies 4295494499 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 03 00 00 00 4b 00 00 00 00 00 00 00 ........K....... backtrace (crc ad019dda): __kmalloc_noprof+0x45c/0x6e0 security_sk_alloc+0x101/0x160 sk_prot_alloc+0x20b/0x280 sk_alloc+0x34/0xbd0 bt_sock_alloc+0x3a/0x3b0 hci_sock_create+0xb2/0x170 bt_sock_create+0x15d/0x2c0 __sock_create+0x369/0x810 __sys_socket+0x145/0x260 __x64_sys_socket+0x73/0xb0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88804fbb6140 (size 232): comm "syz-executor.0", pid 10439, jiffies 4295494502 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 40 52 4d 80 88 ff ff .........@RM.... backtrace (crc 1a2f3ae): kmem_cache_alloc_node_noprof+0x3ef/0x690 __alloc_skb+0x2ab/0x370 alloc_skb_with_frags+0x8f/0x7c0 sock_alloc_send_pskb+0x7e5/0x960 hci_sock_sendmsg+0x190/0x2270 sock_write_iter+0x57e/0x610 vfs_write+0xbe9/0x1150 ksys_write+0x1ef/0x240 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed