r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000040), 0x400200, 0x0) fcntl$setstatus(r3, 0x4, 0x42c00) sendfile(r2, r1, 0x0, 0xfdeb) BUG: memory leak unreferenced object 0xffff888055200a00 (size 232): comm "syz-executor.0", pid 31447, jiffies 4296191310 hex dump (first 32 bytes): f0 0d e2 0e 80 88 ff ff f0 0d e2 0e 80 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 2eeda010): kmem_cache_alloc_node_noprof+0x46a/0x780 __alloc_skb+0x159/0x430 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_inquiry_sync+0x1f2/0x230 hci_inquiry+0x59e/0xb90 hci_sock_ioctl+0x2b5/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880540dc340 (size 704): comm "syz-executor.0", pid 31447, jiffies 4296191310 hex dump (first 32 bytes): 80 f2 1a 53 80 88 ff ff 01 04 05 33 8b 9e 09 00 ...S.......3.... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 316ab35b): kmem_cache_alloc_node_noprof+0x46a/0x780 kmalloc_reserve+0x189/0x2b0 __alloc_skb+0x18a/0x430 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_inquiry_sync+0x1f2/0x230 hci_inquiry+0x59e/0xb90 hci_sock_ioctl+0x2b5/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed