$ext4(&(0x7f0000000600)='ext4\x00', &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001cc0)={[{@quota}, {@delalloc}], [{@subj_type={'subj_type', 0x3d, '%%}]*\\@('}}, {@audit}, {@euid_gt}, {@permit_directio}, {@obj_user={'obj_user', 0x3d, 'access=client'}}, {@pcr={'pcr', 0x3d, 0x25}}, {@appraise}]}) BUG: memory leak unreferenced object 0xffff8880159fe000 (size 4096): comm "syz-executor.6", pid 10276, jiffies 4295358383 (age 39.610s) hex dump (first 32 bytes): 20 d2 1b 2f 80 88 ff ff 22 01 00 00 00 00 ad de ../...."....... 01 00 00 00 aa aa aa aa aa 10 00 aa aa aa aa aa ................ backtrace: [<00000000d6ccd173>] kmalloc_trace+0x26/0xc0 [<00000000a93092e0>] hci_conn_add+0xab/0x16c0 [<00000000b4618284>] hci_connect_acl+0x3f4/0x600 [<00000000ba2b1e97>] hci_connect_sco+0x4e/0x1090 [<00000000c51937f3>] sco_sock_connect+0x2c2/0x9e0 [<000000006f866471>] __sys_connect_file+0x165/0x1b0 [<000000009929b651>] __sys_connect+0x169/0x1a0 [<00000000a2564cb6>] __x64_sys_connect+0x73/0xb0 [<000000002d6eb7ab>] do_syscall_64+0x3f/0x90 [<000000002ec38b1c>] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 BUG: memory leak unreferenced object 0xffff888035a70800 (size 1024): comm "kworker/u7:7", pid 299, jiffies 4295359261 (age 38.732s) hex dump (first 32 bytes): 00 e0 9f 15 80 88 ff ff 00 c0 69 0b 80 88 ff ff ..........i..... fd 03 00 00 00 00 00 00 00 06 0c 00 00 00 00 00 ................ backtrace: [<00000000d6ccd173>] kmalloc_trace+0x26/0xc0 [<0000000031d27387>] l2cap_conn_add.part.0+0x64/0xe40 [<0000000019bc7b7b>] l2cap_connect_cfm+0x23b/0x1000 [<00000000bce5f766>] hci_conn_failed+0x167/0x2a0 [<00000000a63237d6>] hci_abort_conn_sync+0x803/0xb60 [<00000000202a0040>] abort_conn_sync+0x18f/0x3b0 [<00000000f50f25f4>] hci_cmd_sync_work+0x14a/0x2a0 [<000000007352268d>] process_one_work+0x7c8/0x1450 [<00000000c78f24be>] worker_thread+0x80e/0x1190 [<0000000043793964>] kthread+0x33f/0x440 [<00000000ca86bb36>] ret_from_fork+0x48/0x80 [<000000004441f8d4>] ret_from_fork_asm+0x1b/0x30 BUG: leak checking failed