, 0x2000020, &(0x7f0000009980)={[{@dots}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffe7c}}, {@dots}, {@nodots}, {@nodots}], [{@fowner_gt={'fowner>', r4}}, {@pcr={'pcr', 0x3d, 0x40}}, {@subj_type={'subj_type', 0x3d, 'tmpfs\x00'}}, {@uid_lt}, {@permit_directio}]}) recvfrom(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x2003, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='./file0\x00') BUG: memory leak unreferenced object 0xffff88801e67c8c0 (size 232): comm "syz-executor.6", pid 4775, jiffies 4294942058 hex dump (first 32 bytes): f0 8c d6 16 80 88 ff ff f0 8c d6 16 80 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 1767a2df): kmem_cache_alloc_node_noprof+0x30f/0x3e0 __alloc_skb+0x2ab/0x370 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_cmd_sync_status+0x4c/0x70 hci_dev_cmd+0x695/0x980 hci_sock_ioctl+0x493/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888013c49380 (size 704): comm "syz-executor.6", pid 4775, jiffies 4294942058 hex dump (first 32 bytes): 80 a2 54 1f 80 88 ff ff 0f 08 02 00 00 01 20 06 ..T........... . 0a 80 80 00 02 00 00 00 14 00 07 00 ff 02 00 00 ................ backtrace (crc b887f6ec): kmem_cache_alloc_node_noprof+0x30f/0x3e0 kmalloc_reserve+0x189/0x2b0 __alloc_skb+0x161/0x370 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_cmd_sync_status+0x4c/0x70 hci_dev_cmd+0x695/0x980 hci_sock_ioctl+0x493/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed