r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) request_key(&(0x7f0000000d00)='id_legacy\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000d80)='o\xd1[+\xb5z-\x8d', 0x0) BUG: memory leak unreferenced object 0xffff88800e1c0140 (size 240): comm "syz-executor.7", pid 298, jiffies 4295634108 (age 21.433s) hex dump (first 32 bytes): 02 00 00 00 01 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 ea ff ff ff ff ff ff ff ff ff ff ................ backtrace: [<00000000ecb904df>] alloc_pid+0xcd/0xd80 kernel/pid.c:180 [<00000000399cb626>] copy_process+0x3cf4/0x6cb0 kernel/fork.c:2180 [<000000006c6dbf06>] kernel_clone+0xe7/0xa60 kernel/fork.c:2555 [<00000000166e1990>] __do_sys_clone+0xc8/0x110 kernel/fork.c:2672 [<00000000b22ee319>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<00000000b22ee319>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<000000002f3cc5c7>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: leak checking failed