BUG: memory leak unreferenced object 0xffff888101b6e600 (size 120): comm "kworker/u4:1", pid 24, jiffies 4294942824 (age 14.100s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000033e6a782>] alloc_pid+0x66/0x560 kernel/pid.c:180 [<00000000fab2039a>] copy_process+0x143b/0x25c0 kernel/fork.c:2113 [<00000000b3deb5a2>] kernel_clone+0xf3/0x670 kernel/fork.c:2462 [<00000000eb07d4d3>] kernel_thread+0x61/0x80 kernel/fork.c:2514 [<00000000a201be4d>] call_usermodehelper_exec_work kernel/umh.c:172 [inline] [<00000000a201be4d>] call_usermodehelper_exec_work+0xc4/0x120 kernel/umh.c:158 [<00000000cacb6dbe>] process_one_work+0x2c9/0x600 kernel/workqueue.c:2275 [<00000000fa39bf3e>] worker_thread+0x59/0x5d0 kernel/workqueue.c:2421 [<000000003c733e09>] kthread+0x178/0x1b0 kernel/kthread.c:292 [<00000000a113a567>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 BUG: memory leak unreferenced object 0xffff88810e6a8100 (size 232): comm "kworker/u4:1", pid 8454, jiffies 4294942824 (age 14.100s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 60 1a 04 01 81 88 ff ff 80 a4 bc 0f 81 88 ff ff `............... backtrace: [<000000006b85bde0>] kmem_cache_zalloc include/linux/slab.h:672 [inline] [<000000006b85bde0>] __alloc_file+0x1f/0xf0 fs/file_table.c:101 [<00000000a13d5895>] alloc_empty_file+0x69/0x120 fs/file_table.c:150 [<00000000f79eea34>] alloc_file+0x33/0x1b0 fs/file_table.c:192 [<0000000004ea1b00>] alloc_file_pseudo+0xb2/0x140 fs/file_table.c:232 [<00000000069e570a>] create_pipe_files+0x138/0x2e0 fs/pipe.c:911 [<000000009bb4c6ad>] umd_setup+0x33/0x220 kernel/usermode_driver.c:104 [<000000007f4db87a>] call_usermodehelper_exec_async+0xb4/0x1b0 kernel/umh.c:101 [<00000000a113a567>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 BUG: memory leak unreferenced object 0xffff8881106c21b0 (size 24): comm "kworker/u4:1", pid 8454, jiffies 4294942824 (age 14.100s) hex dump (first 24 bytes): 00 00 00 00 00 00 00 00 b0 8e 93 00 81 88 ff ff ................ 00 00 00 00 00 00 00 00 ........ backtrace: [<00000000cd98a5d0>] kmem_cache_zalloc include/linux/slab.h:672 [inline] [<00000000cd98a5d0>] lsm_file_alloc security/security.c:569 [inline] [<00000000cd98a5d0>] security_file_alloc+0x2a/0xb0 security/security.c:1457 [<000000001dd07a71>] __alloc_file+0x5d/0xf0 fs/file_table.c:106 [<00000000a13d5895>] alloc_empty_file+0x69/0x120 fs/file_table.c:150 [<00000000f79eea34>] alloc_file+0x33/0x1b0 fs/file_table.c:192 [<0000000004ea1b00>] alloc_file_pseudo+0xb2/0x140 fs/file_table.c:232 [<00000000069e570a>] create_pipe_files+0x138/0x2e0 fs/pipe.c:911 [<000000009bb4c6ad>] umd_setup+0x33/0x220 kernel/usermode_driver.c:104 [<000000007f4db87a>] call_usermodehelper_exec_async+0xb4/0x1b0 kernel/umh.c:101 [<00000000a113a567>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 BUG: memory leak unreferenced object 0xffff88810e6a8400 (size 232): comm "kworker/u4:1", pid 8454, jiffies 4294942824 (age 14.100s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 60 1a 04 01 81 88 ff ff 40 a5 bc 0f 81 88 ff ff `.......@....... backtrace: [<000000006b85bde0>] kmem_cache_zalloc include/linux/slab.h:672 [inline] [<000000006b85bde0>] __alloc_file+0x1f/0xf0 fs/file_table.c:101 [<00000000a13d5895>] alloc_empty_file+0x69/0x120 fs/file_table.c:150 [<00000000f79eea34>] alloc_file+0x33/0x1b0 fs/file_table.c:192 [<000000003fcf32a0>] alloc_file_clone+0x22/0x70 fs/file_table.c:244 [<000000009783ec11>] create_pipe_files+0x182/0x2e0 fs/pipe.c:922 [<0000000099721797>] umd_setup+0xad/0x220 kernel/usermode_driver.c:115 [<000000007f4db87a>] call_usermodehelper_exec_async+0xb4/0x1b0 kernel/umh.c:101 [<00000000a113a567>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 BUG: memory leak unreferenced object 0xffff8881011cd580 (size 120): comm "kworker/u4:1", pid 24, jiffies 4294943427 (age 8.070s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000033e6a782>] alloc_pid+0x66/0x560 kernel/pid.c:180 [<00000000fab2039a>] copy_process+0x143b/0x25c0 kernel/fork.c:2113 [<00000000b3deb5a2>] kernel_clone+0xf3/0x670 kernel/fork.c:2462 [<00000000eb07d4d3>] kernel_thread+0x61/0x80 kernel/fork.c:2514 [<00000000a201be4d>] call_usermodehelper_exec_work kernel/umh.c:172 [inline] [<00000000a201be4d>] call_usermodehelper_exec_work+0xc4/0x120 kernel/umh.c:158 [<00000000cacb6dbe>] process_one_work+0x2c9/0x600 kernel/workqueue.c:2275 [<00000000fa39bf3e>] worker_thread+0x59/0x5d0 kernel/workqueue.c:2421 [<000000003c733e09>] kthread+0x178/0x1b0 kernel/kthread.c:292 [<00000000a113a567>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296