inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xe000006c) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000120) BUG: memory leak unreferenced object 0xffff888046964640 (size 240): comm "syz-executor.0", pid 293, jiffies 4296175996 (age 23.324s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [<00000000a55e59a2>] alloc_pid+0xcd/0xd80 [<00000000f13c9666>] copy_process+0x3bbb/0x6d10 [<0000000008e99348>] kernel_clone+0xe7/0xa60 [<00000000cbfc5d4b>] __do_sys_clone+0xc8/0x110 [<00000000663b59d8>] do_syscall_64+0x3b/0x90 [<00000000c68c9a86>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: leak checking failed