[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.86' (ECDSA) to the list of known hosts. executing program executing program executing program syzkaller login: [ 67.846505][ T8412] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810164ae00 (size 120): comm "kworker/u4:3", pid 301, jiffies 4294943007 (age 12.670s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000090e540e5>] alloc_pid+0x66/0x560 [<00000000cc361de4>] copy_process+0x143b/0x25c0 [<000000001a5ec605>] kernel_clone+0xf3/0x670 [<00000000e742baab>] kernel_thread+0x61/0x80 [<00000000ce704702>] call_usermodehelper_exec_work+0xc4/0x120 [<000000003d2ad9a5>] process_one_work+0x2c9/0x600 [<00000000d04fea20>] worker_thread+0x59/0x5d0 [<00000000b59bb63d>] kthread+0x178/0x1b0 [<00000000cb7c806f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888110247200 (size 232): comm "kworker/u4:3", pid 8416, jiffies 4294943007 (age 12.670s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 47 04 01 81 88 ff ff c0 d9 b2 0f 81 88 ff ff .G.............. backtrace: [<0000000078d2e4fa>] __alloc_file+0x1f/0xf0 [<00000000b2fb9873>] alloc_empty_file+0x69/0x120 [<00000000731d145f>] alloc_file+0x33/0x1b0 [<00000000e6dbe01a>] alloc_file_pseudo+0xb2/0x140 [<000000004ae6c20e>] create_pipe_files+0x138/0x2e0 [<00000000a7c228b0>] umd_setup+0x33/0x220 [<00000000c0d39b81>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000cb7c806f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810fb93c20 (size 608): comm "kworker/u4:3", pid 8416, jiffies 4294943007 (age 12.670s) hex dump (first 32 bytes): 80 11 04 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ backtrace: [<000000008f764664>] alloc_inode+0xbe/0x100 [<0000000062a81fab>] new_inode_pseudo+0x13/0x70 [<00000000294e93ac>] create_pipe_files+0x2b/0x2e0 [<00000000493ecbe3>] umd_setup+0xad/0x220 [<00000000c0d39b81>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000cb7c806f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810f1e56c0 (size 192): comm "kworker/u4:3", pid 8416, jiffies 4294943007 (age 12.670s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ d0 56 1e 0f 81 88 ff ff d0 56 1e 0f 81 88 ff ff .V.......V...... backtrace: [<000000009392a8cd>] alloc_pipe_info+0x8f/0x320 [<000000005047268b>] create_pipe_files+0x4d/0x2e0 [<00000000493ecbe3>] umd_setup+0xad/0x220 [<00000000c0d39b81>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000cb7c806f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810c8a0800 (size 1024): comm "kworker/u4:3", pid 8416, jiffies 4294943007 (age 12.670s) hex dump (first 32 bytes): c0 ae 04 04 00 ea ff ff 14 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ backtrace: [<000000006124650f>] alloc_pipe_info+0x154/0x320 [<000000005047268b>] create_pipe_files+0x4d/0x2e0 [<00000000493ecbe3>] umd_setup+0xad/0x220 [<00000000c0d39b81>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000cb7c806f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810fb2dcc0 (size 192): comm "kworker/u4:3", pid 8416, jiffies 4294943007 (age 12.670s) hex dump (first 32 bytes): 00 00 50 40 02 00 00 00 00 00 00 00 00 00 00 00 ..P@............ 00 00 00 00 00 00 00 00 c0 dc b2 0f 81 88 ff ff ................ backtrace: [<00000000fc3c678e>] __d_alloc+0x2a/0x270 [<00000000915b05b6>] d_alloc_pseudo+0x19/0x40 [<000000008af849d5>] alloc_file_pseudo+0x5f/0x140 [<000000004ae6c20e>] create_pipe_files+0x138/0x2e0 [<00000000493ecbe3>] umd_setup+0xad/0x220 [<00000000c0d39b81>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000cb7c806f>] ret_from_fork+0x1f/0x30