Warning: Permanently added '10.128.1.50' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 58.839154][ T8397] syz-executor292[8397]: segfault at 0 ip 000000000043d1ee sp 00007ffff6eeea48 error 4 in syz-executor292235257[401000+86000] [ 58.852908][ T8397] Code: fd d7 c9 0f bc d1 c5 fe 7f 27 c5 fe 7f 6f 20 c5 fe 7f 77 40 c5 fe 7f 7f 60 49 83 c0 1f 49 29 d0 48 8d 7c 17 61 e9 c2 04 00 00 fe 6f 1e c5 fe 6f 56 20 c5 fd 74 cb c5 fd d7 d1 49 83 f8 21 0f executing program [ 64.121003][ T8401] syz-executor292[8401]: segfault at 0 ip 000000000043d1ee sp 00007ffff6eeea48 error 4 in syz-executor292235257[401000+86000] [ 64.136263][ T8401] Code: fd d7 c9 0f bc d1 c5 fe 7f 27 c5 fe 7f 6f 20 c5 fe 7f 77 40 c5 fe 7f 7f 60 49 83 c0 1f 49 29 d0 48 8d 7c 17 61 e9 c2 04 00 00 fe 6f 1e c5 fe 6f 56 20 c5 fd 74 cb c5 fd d7 d1 49 83 f8 21 0f executing program [ 69.344972][ T8405] syz-executor292[8405]: segfault at 0 ip 000000000043d1ee sp 00007ffff6eeea48 error 4 in syz-executor292235257[401000+86000] [ 69.358532][ T8405] Code: fd d7 c9 0f bc d1 c5 fe 7f 27 c5 fe 7f 6f 20 c5 fe 7f 77 40 c5 fe 7f 7f 60 49 83 c0 1f 49 29 d0 48 8d 7c 17 61 e9 c2 04 00 00 fe 6f 1e c5 fe 6f 56 20 c5 fd 74 cb c5 fd d7 d1 49 83 f8 21 0f [ 74.402577][ T8390] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811141d500 (size 232): comm "kworker/u4:5", pid 8402, jiffies 4294943667 (age 12.510s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 60 ba 04 01 81 88 ff ff c0 39 54 0f 81 88 ff ff `........9T..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file+0x69/0x120 [] alloc_file+0x33/0x1b0 [] alloc_file_pseudo+0xb2/0x140 [] create_pipe_files+0x138/0x2e0 [] umd_setup+0x33/0x220 [] call_usermodehelper_exec_async+0xb4/0x1b0 [] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff8881101321f8 (size 24): comm "kworker/u4:5", pid 8402, jiffies 4294943667 (age 12.510s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 0e 94 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [] security_file_alloc+0x2a/0xb0 [] __alloc_file+0x5d/0xf0 [] alloc_empty_file+0x69/0x120 [] alloc_file+0x33/0x1b0 [] alloc_file_pseudo+0xb2/0x140 [] create_pipe_files+0x138/0x2e0 [] umd_setup+0x33/0x220 [] call_usermodehelper_exec_async+0xb4/0x1b0 [] ret_from_fork+0x1f/0x30