Warning: Permanently added '10.128.0.228' (ECDSA) to the list of known hosts. executing program executing program syzkaller login: [ 589.499329][ T8392] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 593.532462][ T8392] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888101a56980 (size 120): comm "kworker/u4:2", pid 59, jiffies 4294995559 (age 12.770s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000af2e2337>] alloc_pid+0x66/0x560 [<0000000076abb78e>] copy_process+0x1465/0x25e0 [<00000000b4dd332f>] kernel_clone+0xf3/0x670 [<0000000064844c82>] kernel_thread+0x61/0x80 [<0000000019636f7f>] call_usermodehelper_exec_work+0xc4/0x120 [<00000000b34173a0>] process_one_work+0x2c9/0x600 [<000000003bcde618>] worker_thread+0x59/0x5d0 [<00000000e01a19ff>] kthread+0x178/0x1b0 [<00000000412df4d2>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810f2e8300 (size 232): comm "kworker/u4:2", pid 8394, jiffies 4294995559 (age 12.770s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 b7 04 01 81 88 ff ff c0 e0 31 10 81 88 ff ff ..........1..... backtrace: [<000000007ba55240>] __alloc_file+0x1f/0xf0 [<000000005ab76ca8>] alloc_empty_file+0x69/0x120 [<00000000cc7aa727>] alloc_file+0x33/0x1b0 [<00000000b1586185>] alloc_file_clone+0x22/0x70 [<00000000adc1e50c>] create_pipe_files+0x182/0x2e0 [<000000007998079f>] umd_setup+0xad/0x220 [<000000004259a21b>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000412df4d2>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888112986348 (size 24): comm "kworker/u4:2", pid 8394, jiffies 4294995559 (age 12.770s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 0e 94 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [<00000000e277ea3c>] security_file_alloc+0x2a/0xb0 [<00000000f4d35b32>] __alloc_file+0x5d/0xf0 [<000000005ab76ca8>] alloc_empty_file+0x69/0x120 [<00000000cc7aa727>] alloc_file+0x33/0x1b0 [<00000000b1586185>] alloc_file_clone+0x22/0x70 [<00000000adc1e50c>] create_pipe_files+0x182/0x2e0 [<000000007998079f>] umd_setup+0xad/0x220 [<000000004259a21b>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000412df4d2>] ret_from_fork+0x1f/0x30