[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.176' (ECDSA) to the list of known hosts. executing program executing program syzkaller login: [ 59.801022][ T8438] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810cad7f00 (size 232): comm "kworker/u4:1", pid 8440, jiffies 4294942109 (age 13.520s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 8b 33 01 81 88 ff ff 00 f6 13 10 81 88 ff ff ..3............. backtrace: [<000000005c9865dc>] __alloc_file+0x1f/0xf0 [<00000000759b27df>] alloc_empty_file+0x69/0x120 [<000000009900f65e>] alloc_file+0x33/0x1b0 [<00000000f0b74a1d>] alloc_file_pseudo+0xb2/0x140 [<000000004f3486c5>] create_pipe_files+0x138/0x2e0 [<00000000284b8654>] umd_setup+0x33/0x220 [<00000000d36b9b13>] call_usermodehelper_exec_async+0xb4/0x1b0 [<0000000055ccb011>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888110e70540 (size 24): comm "kworker/u4:1", pid 8440, jiffies 4294942109 (age 13.520s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 8e 93 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [<00000000ab4c363a>] security_file_alloc+0x2a/0xb0 [<0000000015fcf0bb>] __alloc_file+0x5d/0xf0 [<00000000759b27df>] alloc_empty_file+0x69/0x120 [<000000009900f65e>] alloc_file+0x33/0x1b0 [<00000000f0b74a1d>] alloc_file_pseudo+0xb2/0x140 [<000000004f3486c5>] create_pipe_files+0x138/0x2e0 [<00000000284b8654>] umd_setup+0x33/0x220 [<00000000d36b9b13>] call_usermodehelper_exec_async+0xb4/0x1b0 [<0000000055ccb011>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810cacd200 (size 232): comm "kworker/u4:1", pid 8440, jiffies 4294942109 (age 13.520s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 8b 33 01 81 88 ff ff 40 f2 13 10 81 88 ff ff ..3.....@....... backtrace: [<000000005c9865dc>] __alloc_file+0x1f/0xf0 [<00000000759b27df>] alloc_empty_file+0x69/0x120 [<000000009900f65e>] alloc_file+0x33/0x1b0 [<00000000a84e687c>] alloc_file_clone+0x22/0x70 [<00000000dc5f7536>] create_pipe_files+0x182/0x2e0 [<00000000c5e8f18a>] umd_setup+0xad/0x220 [<00000000d36b9b13>] call_usermodehelper_exec_async+0xb4/0x1b0 [<0000000055ccb011>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888110ca8cf0 (size 24): comm "kworker/u4:1", pid 8440, jiffies 4294942109 (age 13.520s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 8e 93 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [<00000000ab4c363a>] security_file_alloc+0x2a/0xb0 [<0000000015fcf0bb>] __alloc_file+0x5d/0xf0 [<00000000759b27df>] alloc_empty_file+0x69/0x120 [<000000009900f65e>] alloc_file+0x33/0x1b0 [<00000000a84e687c>] alloc_file_clone+0x22/0x70 [<00000000dc5f7536>] create_pipe_files+0x182/0x2e0 [<00000000c5e8f18a>] umd_setup+0xad/0x220 [<00000000d36b9b13>] call_usermodehelper_exec_async+0xb4/0x1b0 [<0000000055ccb011>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810151f680 (size 120): comm "kworker/u4:1", pid 24, jiffies 4294942655 (age 8.060s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008f27c6e1>] alloc_pid+0x66/0x560 [<0000000077e35ecf>] copy_process+0x143b/0x25c0 [<000000000fb87e6d>] kernel_clone+0xf3/0x670 [<000000003d61add0>] kernel_thread+0x61/0x80 [<0000000053568955>] call_usermodehelper_exec_work+0xc4/0x120 [<00000000e5d9980d>] process_one_work+0x2c9/0x600 [<00000000d3f5856f>] worker_thread+0x59/0x5d0 [<00000000d35995e1>] kthread+0x178/0x1b0 [<0000000055ccb011>] ret_from_fork+0x1f/0x30 [ 61.841061][ T8438] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)