Warning: Permanently added '10.128.0.240' (ECDSA) to the list of known hosts. executing program executing program syzkaller login: [ 63.406015][ T8393] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888112e7ec00 (size 232): comm "kworker/u4:3", pid 8399, jiffies 4294942552 (age 12.750s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 60 ea 04 01 81 88 ff ff c0 53 32 10 81 88 ff ff `........S2..... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file+0x69/0x120 [] alloc_file+0x33/0x1b0 [] alloc_file_pseudo+0xb2/0x140 [] create_pipe_files+0x138/0x2e0 [] umd_setup+0x33/0x220 [] call_usermodehelper_exec_async+0xb4/0x1b0 [] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810e7608a0 (size 24): comm "kworker/u4:3", pid 8399, jiffies 4294942552 (age 12.750s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 0e 94 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [] security_file_alloc+0x2a/0xb0 [] __alloc_file+0x5d/0xf0 [] alloc_empty_file+0x69/0x120 [] alloc_file+0x33/0x1b0 [] alloc_file_pseudo+0xb2/0x140 [] create_pipe_files+0x138/0x2e0 [] umd_setup+0x33/0x220 [] call_usermodehelper_exec_async+0xb4/0x1b0 [] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888112e7e500 (size 232): comm "kworker/u4:3", pid 8399, jiffies 4294942552 (age 12.750s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 60 ea 04 01 81 88 ff ff 80 ba 16 10 81 88 ff ff `............... backtrace: [] __alloc_file+0x1f/0xf0 [] alloc_empty_file+0x69/0x120 [] alloc_file+0x33/0x1b0 [] alloc_file_clone+0x22/0x70 [] create_pipe_files+0x182/0x2e0 [] umd_setup+0xad/0x220 [] call_usermodehelper_exec_async+0xb4/0x1b0 [] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff8881107cc660 (size 24): comm "kworker/u4:3", pid 8399, jiffies 4294942552 (age 12.750s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 0e 94 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [] security_file_alloc+0x2a/0xb0 [] __alloc_file+0x5d/0xf0 [] alloc_empty_file+0x69/0x120 [] alloc_file+0x33/0x1b0 [] alloc_file_clone+0x22/0x70 [] create_pipe_files+0x182/0x2e0 [] umd_setup+0xad/0x220 [] call_usermodehelper_exec_async+0xb4/0x1b0 [] ret_from_fork+0x1f/0x30