0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4040040) 23:25:06 executing program 5: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) BUG: memory leak unreferenced object 0xffff88800baf9e00 (size 184): comm "syz-executor.2", pid 280, jiffies 4297056726 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 2f66cfcf): kmem_cache_alloc_noprof+0x414/0x690 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1f/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801ecac000 (size 128): comm "syz-executor.2", pid 280, jiffies 4297056726 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc dc5ee3d1): __kmalloc_noprof+0x45c/0x6e0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1f/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801b781800 (size 1024): comm "syz-executor.2", pid 15892, jiffies 4297056790 hex dump (first 32 bytes): e0 82 d3 84 ff ff ff ff 01 00 00 00 00 00 00 00 ................ 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... backtrace (crc 75fbb5c1): __kmalloc_cache_noprof+0x42a/0x690 fsnotify_alloc_group+0x98/0x350 inotify_new_group+0x20/0x590 __do_sys_inotify_init+0x16/0xa0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800c7edd80 (size 32): comm "syz-executor.2", pid 15892, jiffies 4297056790 hex dump (first 32 bytes): 80 dd 7e 0c 80 88 ff ff 80 dd 7e 0c 80 88 ff ff ..~.......~..... 00 40 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 .@.............. backtrace (crc c33eb41b): __kmalloc_cache_noprof+0x42a/0x690 inotify_new_group+0x79/0x590 __do_sys_inotify_init+0x16/0xa0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880177fe380 (size 360): comm "syz-executor.2", pid 15892, jiffies 4297056790 hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 40 52 6f 88 ff ff ff ff ........@Ro..... backtrace (crc 4c481e85): kmem_cache_alloc_noprof+0x414/0x690 alloc_empty_file+0x58/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 anon_inode_getfd+0x56/0xb0 __do_sys_inotify_init+0x4e/0xa0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800a590e60 (size 16): comm "syz-executor.2", pid 15892, jiffies 4297056790 hex dump (first 16 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 35cdddfe): kmem_cache_alloc_noprof+0x414/0x690 security_file_alloc+0x35/0x130 init_file+0x95/0x4c0 alloc_empty_file+0x76/0x1e0 alloc_file_pseudo+0x12b/0x220 __anon_inode_getfile+0xe1/0x280 anon_inode_getfd+0x56/0xb0 __do_sys_inotify_init+0x4e/0xa0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801b782000 (size 1024): comm "syz-executor.2", pid 15892, jiffies 4297056796 hex dump (first 32 bytes): e0 82 d3 84 ff ff ff ff 01 00 00 00 00 00 00 00 ................ 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... backtrace (crc 5eddbf4b): __kmalloc_cache_noprof+0x42a/0x690 fsnotify_alloc_group+0x98/0x350 inotify_new_group+0x20/0x590 __do_sys_inotify_init+0x16/0xa0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed