Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. syzkaller login: [ 49.375028][ T25] audit: type=1400 audit(1593858537.677:8): avc: denied { execmem } for pid=6489 comm="syz-executor094" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program [ 68.308897][ T6489] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 70.372231][ T6489] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881197ae600 (size 512): comm "kworker/u4:2", pid 47, jiffies 4294942909 (age 14.090s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 e6 7a 19 81 88 ff ff ..........z..... 08 e6 7a 19 81 88 ff ff 18 e6 7a 19 81 88 ff ff ..z.......z..... backtrace: [<000000002d53c6de>] rds_message_alloc+0x34/0xc0 [<00000000c38ca58a>] rds_send_probe.constprop.0+0x42/0x370 [<0000000091c6b97f>] rds_recv_incoming+0x487/0x5c0 [<00000000db5d161b>] rds_loop_xmit+0x7b/0xf0 [<00000000f9d22502>] rds_send_xmit+0x594/0xb90 [<000000005a0de6b4>] rds_send_worker+0x36/0x150 [<0000000085fd675e>] process_one_work+0x213/0x4d0 [<00000000e141ac13>] worker_thread+0x58/0x4b0 [<00000000b288aba5>] kthread+0x164/0x190 [<000000004571a1f4>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88811ea9c400 (size 512): comm "syz-executor094", pid 6491, jiffies 4294943515 (age 8.030s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 c4 a9 1e 81 88 ff ff ................ 08 c4 a9 1e 81 88 ff ff 18 c4 a9 1e 81 88 ff ff ................ backtrace: [<000000002d53c6de>] rds_message_alloc+0x34/0xc0 [<00000000c38ca58a>] rds_send_probe.constprop.0+0x42/0x370 [<0000000091c6b97f>] rds_recv_incoming+0x487/0x5c0 [<00000000db5d161b>] rds_loop_xmit+0x7b/0xf0 [<00000000f9d22502>] rds_send_xmit+0x594/0xb90 [<00000000b6ac9987>] rds_sendmsg+0x117e/0x1430 [<00000000cf1bb357>] sock_sendmsg+0x4c/0x60 [<00000000a3f97e8c>] __sys_sendto+0x11d/0x1c0 [<00000000df7be623>] __x64_sys_sendto+0x26/0x30 [<00000000b2c48037>] do_syscall_64+0x4c/0xe0 [<000000004777b66c>] entry_SYSCALL_64_after_hwframe+0x44/0xa9