[  OK  ] Reached target Login Prompts.
[  OK  ] Reached target Multi-User System.
[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
[  OK  ] Started Update UTMP about System Runlevel Changes.

Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.1.2' (ECDSA) to the list of known hosts.
executing program
syzkaller login: [   49.986853][ T8411] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
executing program
[   61.101790][ T8404] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff8881022be8a0 (size 32):
  comm "syz-executor975", pid 8411, jiffies 4294942269 (age 13.220s)
  hex dump (first 32 bytes):
    00 70 fd 00 00 c9 ff ff 20 ee 80 84 ff ff ff ff  .p...... .......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888101cf21e0 (size 32):
  comm "syz-executor975", pid 8411, jiffies 4294942269 (age 13.220s)
  hex dump (first 32 bytes):
    00 70 fd 00 00 c9 ff ff 60 ee 80 84 ff ff ff ff  .p......`.......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888101e9e9e0 (size 32):
  comm "syz-executor975", pid 8411, jiffies 4294942269 (age 13.220s)
  hex dump (first 32 bytes):
    00 70 fd 00 00 c9 ff ff a0 ee 80 84 ff ff ff ff  .p..............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888101cf22c0 (size 32):
  comm "syz-executor975", pid 8411, jiffies 4294942269 (age 13.220s)
  hex dump (first 32 bytes):
    00 70 fd 00 00 c9 ff ff e0 ee 80 84 ff ff ff ff  .p..............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8881020f71a0 (size 32):
  comm "syz-executor975", pid 8411, jiffies 4294942269 (age 13.220s)
  hex dump (first 32 bytes):
    00 70 fd 00 00 c9 ff ff 20 ef 80 84 ff ff ff ff  .p...... .......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888101cc44e0 (size 32):
  comm "syz-executor975", pid 8411, jiffies 4294942269 (age 13.220s)
  hex dump (first 32 bytes):
    00 70 fd 00 00 c9 ff ff 60 ef 80 84 ff ff ff ff  .p......`.......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888101e9eca0 (size 32):
  comm "syz-executor975", pid 8411, jiffies 4294942269 (age 13.220s)
  hex dump (first 32 bytes):
    00 70 fd 00 00 c9 ff ff a0 ef 80 84 ff ff ff ff  .p..............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81043830>] kvm_dev_ioctl+0x710/0xb60
    [<ffffffff815895cc>] __x64_sys_ioctl+0xfc/0x140
    [<ffffffff8439b235>] do_syscall_64+0x35/0xb0
    [<ffffffff84400068>] entry_SYSCALL_64_after_hwframe+0x44/0xae