Warning: Permanently added '10.128.0.145' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 49.358859][ T8433] bpf_preload (8433) used greatest stack depth: 11008 bytes left executing program [ 61.329842][ T8431] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 63.360323][ T8431] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810e6acb00 (size 232): comm "kworker/u4:2", pid 8433, jiffies 4294942169 (age 14.360s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 f7 03 01 81 88 ff ff 40 e5 82 0f 81 88 ff ff ........@....... backtrace: [<00000000dcb4833e>] __alloc_file+0x1f/0xf0 [<00000000e8b8181c>] alloc_empty_file+0x69/0x120 [<0000000046bd32fe>] alloc_file+0x33/0x1b0 [<000000008fcc4cbe>] alloc_file_clone+0x22/0x70 [<0000000029132f9f>] create_pipe_files+0x182/0x2e0 [<0000000054f341e7>] umd_setup+0xad/0x220 [<0000000084e0a1b4>] call_usermodehelper_exec_async+0xb4/0x1b0 [<0000000014fbbc6a>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810e78a6f0 (size 24): comm "kworker/u4:2", pid 8433, jiffies 4294942169 (age 14.360s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 8e 93 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [<0000000051b0162c>] security_file_alloc+0x2a/0xb0 [<00000000bfb98e39>] __alloc_file+0x5d/0xf0 [<00000000e8b8181c>] alloc_empty_file+0x69/0x120 [<0000000046bd32fe>] alloc_file+0x33/0x1b0 [<000000008fcc4cbe>] alloc_file_clone+0x22/0x70 [<0000000029132f9f>] create_pipe_files+0x182/0x2e0 [<0000000054f341e7>] umd_setup+0xad/0x220 [<0000000084e0a1b4>] call_usermodehelper_exec_async+0xb4/0x1b0 [<0000000014fbbc6a>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888101e3a600 (size 120): comm "kworker/u4:2", pid 58, jiffies 4294942802 (age 8.030s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008d407c4e>] alloc_pid+0x66/0x560 [<00000000628abdba>] copy_process+0x143b/0x25c0 [<00000000bf54a9a2>] kernel_clone+0xf3/0x670 [<000000006c807e6f>] kernel_thread+0x61/0x80 [<00000000e94b2ea5>] call_usermodehelper_exec_work+0xc4/0x120 [<0000000017ee6501>] process_one_work+0x2c9/0x600 [<0000000094ccb3c6>] worker_thread+0x59/0x5d0 [<000000006c7387d4>] kthread+0x178/0x1b0 [<0000000014fbbc6a>] ret_from_fork+0x1f/0x30