executing program executing program executing program BUG: memory leak unreferenced object 0xffff888101b28700 (size 120): comm "kworker/u4:3", pid 437, jiffies 4294942946 (age 12.470s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000675e497f>] alloc_pid+0x66/0x560 kernel/pid.c:180 [<00000000c6c95c36>] copy_process+0x143b/0x25c0 kernel/fork.c:2113 [<0000000012098785>] kernel_clone+0xf3/0x670 kernel/fork.c:2462 [<00000000ae9a95c3>] kernel_thread+0x61/0x80 kernel/fork.c:2514 [<00000000463c00f5>] call_usermodehelper_exec_work kernel/umh.c:172 [inline] [<00000000463c00f5>] call_usermodehelper_exec_work+0xc4/0x120 kernel/umh.c:158 [<000000002c6c1e03>] process_one_work+0x2c9/0x600 kernel/workqueue.c:2275 [<0000000044ae9c04>] worker_thread+0x59/0x5d0 kernel/workqueue.c:2421 [<00000000fffa9ec5>] kthread+0x178/0x1b0 kernel/kthread.c:292 [<000000004d0e1a18>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 BUG: memory leak unreferenced object 0xffff88810f27bd00 (size 232): comm "kworker/u4:3", pid 8430, jiffies 4294942946 (age 12.470s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 60 ce c8 02 81 88 ff ff c0 0c 3c 10 81 88 ff ff `.........<..... backtrace: [<00000000a589c25e>] kmem_cache_zalloc include/linux/slab.h:672 [inline] [<00000000a589c25e>] __alloc_file+0x1f/0xf0 fs/file_table.c:101 [<000000003d8d4d38>] alloc_empty_file+0x69/0x120 fs/file_table.c:150 [<0000000015456638>] alloc_file+0x33/0x1b0 fs/file_table.c:192 [<000000007954128c>] alloc_file_pseudo+0xb2/0x140 fs/file_table.c:232 [<00000000ce9baf8e>] create_pipe_files+0x138/0x2e0 fs/pipe.c:911 [<000000009b5bf6c3>] umd_setup+0x33/0x220 kernel/usermode_driver.c:104 [<00000000edfc625e>] call_usermodehelper_exec_async+0xb4/0x1b0 kernel/umh.c:101 [<000000004d0e1a18>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296