0x34, 0x37, 0x2c, 0x3a]}}}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '&,\xea^\xab/@'}}, {@smackfsdef={'smackfsdef', 0x3d, '.$#'}}, {@euid_gt={'euid>', 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@hash}, {@smackfsdef={'smackfsdef', 0x3d, 'cgroup2\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'cgroup2\x00'}}, {@euid_lt={'euid<', r2}}]}) mount$cgroup2(0x20000000, &(0x7f0000000480)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) BUG: memory leak unreferenced object 0xffff888052b6d280 (size 232): comm "syz-executor.3", pid 45096, jiffies 4296636169 hex dump (first 32 bytes): c0 a3 bf 55 80 88 ff ff f0 8d 7d 16 80 88 ff ff ...U......}..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f466433c): kmem_cache_alloc_node_noprof+0x46a/0x780 __alloc_skb+0x159/0x430 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_cmd_sync_status+0x4c/0x70 hci_dev_cmd+0x4d5/0x980 hci_sock_ioctl+0x493/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800d57dd40 (size 704): comm "syz-executor.3", pid 45096, jiffies 4296636169 hex dump (first 32 bytes): 80 72 48 53 80 88 ff ff 1a 0c 01 00 07 02 ee 00 .rHS............ 6e 66 73 5f 63 6c 69 65 6e 74 00 41 43 54 49 4f nfs_client.ACTIO backtrace (crc 1ecaa5ff): kmem_cache_alloc_node_noprof+0x46a/0x780 kmalloc_reserve+0x189/0x2b0 __alloc_skb+0x18a/0x430 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_cmd_sync_status+0x4c/0x70 hci_dev_cmd+0x4d5/0x980 hci_sock_ioctl+0x493/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff888055bfa3c0 (size 232): comm "syz-executor.3", pid 45325, jiffies 4296637004 hex dump (first 32 bytes): f0 8d 7d 16 80 88 ff ff 80 d2 b6 52 80 88 ff ff ..}........R.... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 93ac5322): kmem_cache_alloc_node_noprof+0x46a/0x780 __alloc_skb+0x159/0x430 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_cmd_sync_status+0x4c/0x70 hci_dev_cmd+0x4d5/0x980 hci_sock_ioctl+0x493/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880545b70c0 (size 704): comm "syz-executor.3", pid 45325, jiffies 4296637005 hex dump (first 32 bytes): c0 63 5b 54 80 88 ff ff 1a 0c 01 00 11 02 7a 02 .c[T..........z. 7e 4a 50 b0 37 fa 52 b2 ac 72 d7 4e e9 9f 12 af ~JP.7.R..r.N.... backtrace (crc 8435784a): kmem_cache_alloc_node_noprof+0x46a/0x780 kmalloc_reserve+0x189/0x2b0 __alloc_skb+0x18a/0x430 hci_cmd_sync_alloc+0x34/0x300 __hci_cmd_sync_sk+0xf7/0x5c0 __hci_cmd_sync_status_sk+0x4d/0x1a0 hci_cmd_sync_status+0x4c/0x70 hci_dev_cmd+0x4d5/0x980 hci_sock_ioctl+0x493/0x810 sock_do_ioctl+0xd1/0x240 sock_ioctl+0x40d/0x630 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed