Warning: Permanently added '10.128.0.37' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 48.560044][ T8451] bpf_preload (8451) used greatest stack depth: 11008 bytes left executing program [ 60.561858][ T8449] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 62.611240][ T8449] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810e651a00 (size 232): comm "kworker/u4:2", pid 8451, jiffies 4294942100 (age 14.400s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 bb 41 02 81 88 ff ff c0 36 55 0f 81 88 ff ff ..A......6U..... backtrace: [<00000000892c6db6>] __alloc_file+0x1f/0xf0 [<00000000383e9489>] alloc_empty_file+0x69/0x120 [<00000000bf4dcd51>] alloc_file+0x33/0x1b0 [<000000002270f6dc>] alloc_file_pseudo+0xb2/0x140 [<000000000ac87f5f>] create_pipe_files+0x138/0x2e0 [<00000000b6422708>] umd_setup+0x33/0x220 [<00000000132f6699>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000c6c64598>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810e651500 (size 232): comm "kworker/u4:2", pid 8451, jiffies 4294942100 (age 14.400s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ e0 bb 41 02 81 88 ff ff 00 9f 53 0f 81 88 ff ff ..A.......S..... backtrace: [<00000000892c6db6>] __alloc_file+0x1f/0xf0 [<00000000383e9489>] alloc_empty_file+0x69/0x120 [<00000000bf4dcd51>] alloc_file+0x33/0x1b0 [<00000000c27d335c>] alloc_file_clone+0x22/0x70 [<0000000042579fb2>] create_pipe_files+0x182/0x2e0 [<00000000054def49>] umd_setup+0xad/0x220 [<00000000132f6699>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000c6c64598>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888101d38200 (size 120): comm "kworker/u4:2", pid 27, jiffies 4294942731 (age 8.090s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000009c7b23a8>] alloc_pid+0x66/0x560 [<00000000d498f943>] copy_process+0x143b/0x25c0 [<0000000017e349dc>] kernel_clone+0xf3/0x670 [<0000000065d90fa5>] kernel_thread+0x61/0x80 [<0000000068f2f35e>] call_usermodehelper_exec_work+0xc4/0x120 [<0000000062953bb0>] process_one_work+0x2c9/0x600 [<00000000e957fab4>] worker_thread+0x59/0x5d0 [<00000000b702b197>] kthread+0x178/0x1b0 [<00000000c6c64598>] ret_from_fork+0x1f/0x30