connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) 23:00:40 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) BUG: memory leak unreferenced object 0xffff88805448adc0 (size 232): comm "softirq", pid 0, jiffies 4296212683 hex dump (first 32 bytes): 00 75 24 53 80 88 ff ff f0 0d 93 17 80 88 ff ff .u$S............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 95ebe4f8): kmem_cache_alloc_bulk_noprof+0x38c/0x5e0 napi_skb_cache_get+0x5e7/0x750 __alloc_skb+0x2ae/0x430 napi_alloc_skb+0x37b/0x6e0 e1000_clean_rx_irq+0x2de/0x1190 e1000_clean+0x95f/0x2540 __napi_poll+0xb7/0x6c0 net_rx_action+0x9cf/0xdb0 handle_softirqs+0x1b1/0x7d0 __irq_exit_rcu+0xc4/0x100 irq_exit_rcu+0x9/0x20 common_interrupt+0xbd/0xd0 asm_common_interrupt+0x26/0x40 BUG: memory leak unreferenced object 0xffff88804d98dd40 (size 704): comm "syz-executor.1", pid 35281, jiffies 4296212777 hex dump (first 32 bytes): 40 a6 3a 52 80 88 ff ff 01 04 05 33 8b 9e 00 00 @.:R.......3.... 0a 00 00 00 08 00 01 00 02 00 00 00 08 00 02 00 ................ backtrace (crc 7a6c927a): kmem_cache_alloc_node_noprof+0x46a/0x780 kmalloc_reserve+0x189/0x2b0 __alloc_skb+0x18a/0x430 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_inquiry_sync+0x1f2/0x230 hci_inquiry+0x59e/0xb90 hci_sock_ioctl+0x2b5/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888053247500 (size 232): comm "syz-executor.1", pid 53068, jiffies 4296529625 hex dump (first 32 bytes): f0 0d 93 17 80 88 ff ff c0 ad 48 54 80 88 ff ff ..........HT.... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 57ffb922): kmem_cache_alloc_node_noprof+0x46a/0x780 __alloc_skb+0x159/0x430 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_cmd_sync_status+0x4c/0x70 hci_dev_cmd+0x4d5/0x980 hci_sock_ioctl+0x493/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888055762d80 (size 704): comm "syz-executor.1", pid 53068, jiffies 4296529625 hex dump (first 32 bytes): 40 7b 24 53 80 88 ff ff 1a 0c 01 00 65 02 9a 07 @{$S........e... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 8a9f8a59): kmem_cache_alloc_node_noprof+0x46a/0x780 kmalloc_reserve+0x189/0x2b0 __alloc_skb+0x18a/0x430 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_cmd_sync_status+0x4c/0x70 hci_dev_cmd+0x4d5/0x980 hci_sock_ioctl+0x493/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed