Warning: Permanently added '10.128.0.242' (ECDSA) to the list of known hosts. syzkaller login: [ 55.264203][ T24] audit: type=1400 audit(1599179665.582:8): avc: denied { execmem } for pid=6503 comm="syz-executor710" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program executing program [ 71.314224][ T3675] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 75.679472][ T6503] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888118d67400 (size 512): comm "kworker/u4:4", pid 1025, jiffies 4294943540 (age 13.100s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 74 d6 18 81 88 ff ff .........t...... 08 74 d6 18 81 88 ff ff 18 74 d6 18 81 88 ff ff .t.......t...... backtrace: [<00000000be0b1a35>] rds_message_alloc+0x34/0xc0 [<00000000218d4a2e>] rds_send_probe.constprop.0+0x42/0x370 [<000000008591c0af>] rds_recv_incoming+0x487/0x5c0 [<000000001ba8e34f>] rds_loop_xmit+0x7b/0xf0 [<0000000075481b68>] rds_send_xmit+0x594/0xb90 [<000000000334f859>] rds_send_worker+0x36/0x150 [<0000000010085b4b>] process_one_work+0x213/0x4d0 [<00000000b5591fdc>] worker_thread+0x58/0x4b0 [<00000000ac31f234>] kthread+0x164/0x190 [<000000009480c3c0>] ret_from_fork+0x1f/0x30 BUG: memory leak unreferenced object 0xffff88811d045a00 (size 512): comm "syz-executor710", pid 6505, jiffies 4294944086 (age 7.640s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 5a 04 1d 81 88 ff ff .........Z...... 08 5a 04 1d 81 88 ff ff 18 5a 04 1d 81 88 ff ff .Z.......Z...... backtrace: [<00000000be0b1a35>] rds_message_alloc+0x34/0xc0 [<00000000218d4a2e>] rds_send_probe.constprop.0+0x42/0x370 [<000000008591c0af>] rds_recv_incoming+0x487/0x5c0 [<000000001ba8e34f>] rds_loop_xmit+0x7b/0xf0 [<0000000075481b68>] rds_send_xmit+0x594/0xb90 [<0000000092f8efc0>] rds_sendmsg+0x129e/0x1440 [<00000000d81a0e7a>] sock_sendmsg+0x4c/0x60 [<000000002ddefa1f>] __sys_sendto+0x11d/0x1c0 [<00000000e7fb4961>] __x64_sys_sendto+0x26/0x30 [<00000000c99b5c84>] do_syscall_64+0x2d/0x70 [<00000000980075a0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9