Warning: Permanently added '10.128.0.228' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 55.735986][ T8429] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. executing program [ 66.669478][ T8424] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 68.974835][ T8424] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888101e256e0 (size 32): comm "syz-executor134", pid 8429, jiffies 4294942842 (age 13.290s) hex dump (first 32 bytes): 00 f0 dd 00 00 c9 ff ff 20 ee 80 84 ff ff ff ff ........ ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881019249c0 (size 32): comm "syz-executor134", pid 8429, jiffies 4294942842 (age 13.290s) hex dump (first 32 bytes): 00 f0 dd 00 00 c9 ff ff 60 ee 80 84 ff ff ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88810161fac0 (size 32): comm "syz-executor134", pid 8429, jiffies 4294942842 (age 13.290s) hex dump (first 32 bytes): 00 f0 dd 00 00 c9 ff ff e0 ee 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101c9dd80 (size 32): comm "syz-executor134", pid 8429, jiffies 4294942842 (age 13.290s) hex dump (first 32 bytes): 00 f0 dd 00 00 c9 ff ff 20 ef 80 84 ff ff ff ff ........ ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101da47a0 (size 32): comm "syz-executor134", pid 8429, jiffies 4294942842 (age 13.290s) hex dump (first 32 bytes): 00 f0 dd 00 00 c9 ff ff 60 ef 80 84 ff ff ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88810161f7a0 (size 32): comm "syz-executor134", pid 8429, jiffies 4294942842 (age 13.290s) hex dump (first 32 bytes): 00 f0 dd 00 00 c9 ff ff a0 ef 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888102225220 (size 32): comm "syz-executor134", pid 8429, jiffies 4294942842 (age 13.290s) hex dump (first 32 bytes): 00 f0 dd 00 00 c9 ff ff e0 ef 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae