Warning: Permanently added '10.128.10.40' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 49.112634][ T8447] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. executing program executing program [ 60.994802][ T8442] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 67.312083][ T8442] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888101832640 (size 32): comm "syz-executor637", pid 8456, jiffies 4294942712 (age 12.870s) hex dump (first 32 bytes): 00 90 fe 00 00 c9 ff ff 40 ee 80 84 ff ff ff ff ........@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101b6c300 (size 32): comm "syz-executor637", pid 8456, jiffies 4294942712 (age 12.870s) hex dump (first 32 bytes): 00 90 fe 00 00 c9 ff ff c0 ee 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101b6c960 (size 32): comm "syz-executor637", pid 8456, jiffies 4294942712 (age 12.870s) hex dump (first 32 bytes): 00 90 fe 00 00 c9 ff ff 00 ef 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101b6c780 (size 32): comm "syz-executor637", pid 8456, jiffies 4294942712 (age 12.870s) hex dump (first 32 bytes): 00 90 fe 00 00 c9 ff ff 80 ef 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881020991e0 (size 32): comm "syz-executor637", pid 8456, jiffies 4294942712 (age 12.870s) hex dump (first 32 bytes): 00 90 fe 00 00 c9 ff ff c0 ef 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101cb0320 (size 32): comm "syz-executor637", pid 8456, jiffies 4294942712 (age 12.870s) hex dump (first 32 bytes): 00 90 fe 00 00 c9 ff ff 00 f0 80 84 ff ff ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888101b6ce60 (size 32): comm "syz-executor637", pid 8456, jiffies 4294942712 (age 12.870s) hex dump (first 32 bytes): 00 90 fe 00 00 c9 ff ff 40 f0 80 84 ff ff ff ff ........@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kvm_dev_ioctl+0x710/0xb60 [] __x64_sys_ioctl+0xfc/0x140 [] do_syscall_64+0x35/0xb0 [] entry_SYSCALL_64_after_hwframe+0x44/0xae