[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.230' (ECDSA) to the list of known hosts. executing program executing program syzkaller login: [ 68.354513][ T8436] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888101c6e0c0 (size 168): comm "kworker/u4:1", pid 24, jiffies 4294942873 (age 14.420s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000341663a6>] prepare_creds+0x27/0x410 [<000000003e546eae>] copy_creds+0x3a/0x230 [<00000000810908ad>] copy_process+0x6a3/0x25c0 [<000000006c514c21>] kernel_clone+0xf3/0x670 [<0000000031cda4df>] kernel_thread+0x61/0x80 [<00000000149392e8>] call_usermodehelper_exec_work+0xc4/0x120 [<000000007665b532>] process_one_work+0x2c9/0x600 [<000000004461ae5d>] worker_thread+0x59/0x5d0 [<00000000d559c5c4>] kthread+0x178/0x1b0 [<00000000e301f39f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88811116e800 (size 32): comm "kworker/u4:1", pid 24, jiffies 4294942873 (age 14.420s) hex dump (first 32 bytes): b0 8e 93 00 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000085e5fcb6>] security_prepare_creds+0x9f/0xc0 [<00000000b81d73fc>] prepare_creds+0x2c7/0x410 [<000000003e546eae>] copy_creds+0x3a/0x230 [<00000000810908ad>] copy_process+0x6a3/0x25c0 [<000000006c514c21>] kernel_clone+0xf3/0x670 [<0000000031cda4df>] kernel_thread+0x61/0x80 [<00000000149392e8>] call_usermodehelper_exec_work+0xc4/0x120 [<000000007665b532>] process_one_work+0x2c9/0x600 [<000000004461ae5d>] worker_thread+0x59/0x5d0 [<00000000d559c5c4>] kthread+0x178/0x1b0 [<00000000e301f39f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff888101845600 (size 232): comm "kworker/u4:1", pid 8438, jiffies 4294942873 (age 14.420s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 60 4a 04 01 81 88 ff ff 40 bb ba 0f 81 88 ff ff `J......@....... backtrace: [<00000000d767c548>] __alloc_file+0x1f/0xf0 [<00000000f6c394e5>] alloc_empty_file+0x69/0x120 [<0000000083084126>] alloc_file+0x33/0x1b0 [<0000000039e2ac26>] alloc_file_pseudo+0xb2/0x140 [<000000006d59e380>] create_pipe_files+0x138/0x2e0 [<000000008772486c>] umd_setup+0x33/0x220 [<0000000050e3330a>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000e301f39f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff8881123ce7e0 (size 24): comm "kworker/u4:1", pid 8438, jiffies 4294942873 (age 14.420s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 8e 93 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [<00000000a6f8978a>] security_file_alloc+0x2a/0xb0 [<00000000f90b866b>] __alloc_file+0x5d/0xf0 [<00000000f6c394e5>] alloc_empty_file+0x69/0x120 [<0000000083084126>] alloc_file+0x33/0x1b0 [<0000000039e2ac26>] alloc_file_pseudo+0xb2/0x140 [<000000006d59e380>] create_pipe_files+0x138/0x2e0 [<000000008772486c>] umd_setup+0x33/0x220 [<0000000050e3330a>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000e301f39f>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88810d301900 (size 232): comm "kworker/u4:1", pid 8438, jiffies 4294942873 (age 14.420s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 60 4a 04 01 81 88 ff ff c0 bc ba 0f 81 88 ff ff `J.............. backtrace: [<00000000d767c548>] __alloc_file+0x1f/0xf0 [<00000000f6c394e5>] alloc_empty_file+0x69/0x120 [<0000000083084126>] alloc_file+0x33/0x1b0 [<00000000d5a11b5e>] alloc_file_clone+0x22/0x70 [<000000004fd5fecf>] create_pipe_files+0x182/0x2e0 [<00000000159ce6df>] umd_setup+0xad/0x220 [<0000000050e3330a>] call_usermodehelper_exec_async+0xb4/0x1b0 [<00000000e301f39f>] ret_from_fork+0x1f/0x30