Warning: Permanently added '10.128.0.69' (ECDSA) to the list of known hosts.
executing program
syzkaller login: [   47.983236][ T8426] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
executing program
[   58.676826][ T8421] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[   60.898087][ T8421] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff888101e5df20 (size 32):
  comm "syz-executor271", pid 8426, jiffies 4294942069 (age 12.960s)
  hex dump (first 32 bytes):
    00 90 fe 00 00 c9 ff ff 20 ee 80 84 ff ff ff ff  ........ .......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88810208ee20 (size 32):
  comm "syz-executor271", pid 8426, jiffies 4294942069 (age 12.960s)
  hex dump (first 32 bytes):
    00 90 fe 00 00 c9 ff ff 60 ee 80 84 ff ff ff ff  ........`.......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881027c4840 (size 32):
  comm "syz-executor271", pid 8426, jiffies 4294942069 (age 12.960s)
  hex dump (first 32 bytes):
    00 90 fe 00 00 c9 ff ff a0 ee 80 84 ff ff ff ff  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888101e851e0 (size 32):
  comm "syz-executor271", pid 8426, jiffies 4294942069 (age 12.960s)
  hex dump (first 32 bytes):
    00 90 fe 00 00 c9 ff ff e0 ee 80 84 ff ff ff ff  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88810208e780 (size 32):
  comm "syz-executor271", pid 8426, jiffies 4294942069 (age 12.960s)
  hex dump (first 32 bytes):
    00 90 fe 00 00 c9 ff ff 20 ef 80 84 ff ff ff ff  ........ .......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888101e5d120 (size 32):
  comm "syz-executor271", pid 8426, jiffies 4294942069 (age 12.960s)
  hex dump (first 32 bytes):
    00 90 fe 00 00 c9 ff ff 60 ef 80 84 ff ff ff ff  ........`.......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff88810208e260 (size 32):
  comm "syz-executor271", pid 8426, jiffies 4294942069 (age 12.960s)
  hex dump (first 32 bytes):
    00 90 fe 00 00 c9 ff ff e0 ef 80 84 ff ff ff ff  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae