open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="20000000fe0000"], 0x0) 10:33:14 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="20000000fe0000"], 0x0) BUG: memory leak unreferenced object 0xffff88800da5c100 (size 184): comm "syz-executor.1", pid 290, jiffies 4295367921 hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 281137c): kmem_cache_alloc_noprof+0x414/0x670 prepare_creds+0x2c/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1f/0x73d0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800f55a400 (size 128): comm "syz-executor.1", pid 290, jiffies 4295367922 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 ................ backtrace (crc 67da4532): __kmalloc_noprof+0x45c/0x6e0 security_prepare_creds+0x101/0x160 prepare_creds+0x579/0x7e0 copy_creds+0x7a/0xa20 copy_process+0xf1f/0x73d0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801e873680 (size 288): comm "syz-executor.1", pid 290, jiffies 4295367939 hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace (crc 850b6d2d): kmem_cache_alloc_noprof+0x414/0x670 alloc_pid+0xd5/0x1100 copy_process+0x4800/0x73d0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88800b8eeca0 (size 1136): comm "syz-executor.1", pid 6599, jiffies 4295367963 hex dump (first 32 bytes): c0 81 0c 00 00 00 00 00 00 00 00 00 00 02 08 00 ................ ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ backtrace (crc ff282103): kmem_cache_alloc_lru_noprof+0x418/0x680 alloc_inode+0x181/0x250 path_from_stashed+0x1b2/0x660 pidfs_alloc_file+0x101/0x250 pidfd_prepare+0x133/0x200 __x64_sys_pidfd_open+0xff/0x1a0 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8880445185c0 (size 120): comm "syz-executor.1", pid 6599, jiffies 4295367963 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ a0 ec 8e 0b 80 88 ff ff d8 85 51 44 80 88 ff ff ..........QD.... backtrace (crc c18b5e6f): kmem_cache_alloc_noprof+0x414/0x670 security_inode_alloc+0x3e/0x130 inode_init_always_gfp+0xc94/0xff0 alloc_inode+0x8d/0x250 path_from_stashed+0x1b2/0x660 pidfs_alloc_file+0x101/0x250 pidfd_prepare+0x133/0x200 __x64_sys_pidfd_open+0xff/0x1a0 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801e1a5028 (size 312): comm "syz-executor.1", pid 6599, jiffies 4295367963 hex dump (first 32 bytes): 10 00 20 00 80 88 ff ff 02 00 00 00 11 00 1a 00 .. ............. 00 d1 6f 88 ff ff ff ff 00 00 00 00 00 00 00 00 ..o............. backtrace (crc 3a1a6549): kmem_cache_alloc_lru_noprof+0x418/0x680 __d_alloc+0x31/0xa10 path_from_stashed+0x373/0x660 pidfs_alloc_file+0x101/0x250 pidfd_prepare+0x133/0x200 __x64_sys_pidfd_open+0xff/0x1a0 do_syscall_64+0xbf/0x390 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed