Warning: Permanently added '10.128.0.20' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 52.791161][ T8465] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. executing program [ 63.510335][ T8460] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 65.916191][ T8460] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888102707040 (size 32): comm "syz-executor074", pid 8465, jiffies 4294942552 (age 13.190s) hex dump (first 32 bytes): 00 50 fe 00 00 c9 ff ff 80 ee 80 84 ff ff ff ff .P.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888102707b80 (size 32): comm "syz-executor074", pid 8465, jiffies 4294942552 (age 13.190s) hex dump (first 32 bytes): 00 50 fe 00 00 c9 ff ff c0 ee 80 84 ff ff ff ff .P.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881021106c0 (size 32): comm "syz-executor074", pid 8474, jiffies 4294943080 (age 7.910s) hex dump (first 32 bytes): 00 10 02 01 00 c9 ff ff 80 ee 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88810247cc60 (size 32): comm "syz-executor074", pid 8474, jiffies 4294943080 (age 7.910s) hex dump (first 32 bytes): 00 10 02 01 00 c9 ff ff c0 ee 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881021100a0 (size 32): comm "syz-executor074", pid 8474, jiffies 4294943080 (age 7.910s) hex dump (first 32 bytes): 00 10 02 01 00 c9 ff ff 40 ef 80 84 ff ff ff ff ........@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101832580 (size 32): comm "syz-executor074", pid 8474, jiffies 4294943080 (age 7.910s) hex dump (first 32 bytes): 00 10 02 01 00 c9 ff ff 80 ef 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888102626620 (size 32): comm "syz-executor074", pid 8474, jiffies 4294943080 (age 7.910s) hex dump (first 32 bytes): 00 10 02 01 00 c9 ff ff c0 ef 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae