r0 = syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x100) mknodat$loop(r0, &(0x7f0000000140)='./file0\x00', 0x408, 0x0) BUG: memory leak unreferenced object 0xffff88803cafe900 (size 184): comm "syz-executor.4", pid 287, jiffies 4295999222 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 908f5760): kmem_cache_alloc_noprof+0x397/0x470 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73b0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800e365600 (size 128): comm "syz-executor.4", pid 287, jiffies 4295999222 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 3586e13): __kmalloc_noprof+0x37c/0x4b0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf5a/0x73b0 kernel_clone+0xea/0x820 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88803e7d6800 (size 1024): comm "syz-executor.4", pid 10432, jiffies 4295999286 hex dump (first 32 bytes): a0 49 d3 84 ff ff ff ff 01 00 00 00 00 00 00 00 .I.............. 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... backtrace (crc f29ecb13): __kmalloc_cache_noprof+0x3ad/0x470 fsnotify_alloc_group+0x98/0x350 inotify_new_group+0x20/0x590 __do_sys_inotify_init+0x16/0xa0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800cf44d40 (size 32): comm "syz-executor.4", pid 10432, jiffies 4295999286 hex dump (first 32 bytes): 40 4d f4 0c 80 88 ff ff 40 4d f4 0c 80 88 ff ff @M......@M...... 00 40 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 .@.............. backtrace (crc 6497a55c): __kmalloc_cache_noprof+0x3ad/0x470 inotify_new_group+0x79/0x590 __do_sys_inotify_init+0x16/0xa0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88803f4b0540 (size 360): comm "syz-executor.4", pid 10432, jiffies 4295999286 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 60 be 6d 88 ff ff ff ff ........`.m..... backtrace (crc e788e00f): kmem_cache_alloc_noprof+0x397/0x470 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 anon_inode_getfd+0x56/0xb0 __do_sys_inotify_init+0x4e/0xa0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800ee7fc40 (size 16): comm "syz-executor.4", pid 10432, jiffies 4295999286 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x397/0x470 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 anon_inode_getfd+0x56/0xb0 __do_sys_inotify_init+0x4e/0xa0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed