Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts.
syzkaller login: [   49.375028][   T25] audit: type=1400 audit(1593858537.677:8): avc:  denied  { execmem } for  pid=6489 comm="syz-executor094" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
executing program
executing program
[   68.308897][ T6489] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[   70.372231][ T6489] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff8881197ae600 (size 512):
  comm "kworker/u4:2", pid 47, jiffies 4294942909 (age 14.090s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 08 e6 7a 19 81 88 ff ff  ..........z.....
    08 e6 7a 19 81 88 ff ff 18 e6 7a 19 81 88 ff ff  ..z.......z.....
  backtrace:
    [<000000002d53c6de>] rds_message_alloc+0x34/0xc0
    [<00000000c38ca58a>] rds_send_probe.constprop.0+0x42/0x370
    [<0000000091c6b97f>] rds_recv_incoming+0x487/0x5c0
    [<00000000db5d161b>] rds_loop_xmit+0x7b/0xf0
    [<00000000f9d22502>] rds_send_xmit+0x594/0xb90
    [<000000005a0de6b4>] rds_send_worker+0x36/0x150
    [<0000000085fd675e>] process_one_work+0x213/0x4d0
    [<00000000e141ac13>] worker_thread+0x58/0x4b0
    [<00000000b288aba5>] kthread+0x164/0x190
    [<000000004571a1f4>] ret_from_fork+0x1f/0x30

BUG: memory leak
unreferenced object 0xffff88811ea9c400 (size 512):
  comm "syz-executor094", pid 6491, jiffies 4294943515 (age 8.030s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 08 c4 a9 1e 81 88 ff ff  ................
    08 c4 a9 1e 81 88 ff ff 18 c4 a9 1e 81 88 ff ff  ................
  backtrace:
    [<000000002d53c6de>] rds_message_alloc+0x34/0xc0
    [<00000000c38ca58a>] rds_send_probe.constprop.0+0x42/0x370
    [<0000000091c6b97f>] rds_recv_incoming+0x487/0x5c0
    [<00000000db5d161b>] rds_loop_xmit+0x7b/0xf0
    [<00000000f9d22502>] rds_send_xmit+0x594/0xb90
    [<00000000b6ac9987>] rds_sendmsg+0x117e/0x1430
    [<00000000cf1bb357>] sock_sendmsg+0x4c/0x60
    [<00000000a3f97e8c>] __sys_sendto+0x11d/0x1c0
    [<00000000df7be623>] __x64_sys_sendto+0x26/0x30
    [<00000000b2c48037>] do_syscall_64+0x4c/0xe0
    [<000000004777b66c>] entry_SYSCALL_64_after_hwframe+0x44/0xa9