Warning: Permanently added '10.128.0.166' (ECDSA) to the list of known hosts. executing program executing program executing program executing program syzkaller login: [ 128.645391][ T8467] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 132.659495][ T8467] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 134.756213][ T8467] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810d76d300 (size 256): comm "syz-executor932", pid 8468, jiffies 4294948311 (age 24.460s) hex dump (first 32 bytes): 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000000dabad42>] kvmalloc_node+0x61/0xf0 [<0000000040924253>] video_usercopy+0x991/0xa50 [<000000003bb6d634>] v4l2_ioctl+0x77/0x90 [<0000000048c3373d>] __x64_sys_ioctl+0xfc/0x140 [<00000000d6f94634>] do_syscall_64+0x2d/0x70 [<00000000896d236e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810d76de00 (size 256): comm "syz-executor932", pid 8470, jiffies 4294949431 (age 13.260s) hex dump (first 32 bytes): 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000000dabad42>] kvmalloc_node+0x61/0xf0 [<0000000040924253>] video_usercopy+0x991/0xa50 [<000000003bb6d634>] v4l2_ioctl+0x77/0x90 [<0000000048c3373d>] __x64_sys_ioctl+0xfc/0x140 [<00000000d6f94634>] do_syscall_64+0x2d/0x70 [<00000000896d236e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810d76d900 (size 256): comm "syz-executor932", pid 8471, jiffies 4294950040 (age 7.170s) hex dump (first 32 bytes): 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000000dabad42>] kvmalloc_node+0x61/0xf0 [<0000000040924253>] video_usercopy+0x991/0xa50 [<000000003bb6d634>] v4l2_ioctl+0x77/0x90 [<0000000048c3373d>] __x64_sys_ioctl+0xfc/0x140 [<00000000d6f94634>] do_syscall_64+0x2d/0x70 [<00000000896d236e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9