Warning: Permanently added '10.128.0.117' (ECDSA) to the list of known hosts. executing program executing program executing program BUG: memory leak unreferenced object 0xffff88810fa5aa00 (size 512): comm "kworker/u4:1", pid 22, jiffies 4294943521 (age 19.630s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 aa a5 0f 81 88 ff ff ................ 08 aa a5 0f 81 88 ff ff 18 aa a5 0f 81 88 ff ff ................ backtrace: [<000000002cc849a9>] kmalloc include/linux/slab.h:557 [inline] [<000000002cc849a9>] kzalloc include/linux/slab.h:682 [inline] [<000000002cc849a9>] rds_message_alloc+0x40/0xc0 net/rds/message.c:291 [<000000000cbdf522>] rds_send_probe.constprop.0+0x42/0x3e0 net/rds/send.c:1434 [<0000000045cb8f8c>] rds_recv_incoming+0x252/0x690 net/rds/recv.c:343 [<000000001e5f2a16>] rds_loop_xmit+0xa3/0x120 net/rds/loop.c:96 [<0000000059fc452e>] rds_send_xmit+0x763/0xe20 net/rds/send.c:367 [<000000009b4b32f5>] rds_send_worker+0x42/0x150 net/rds/threads.c:200 [<0000000080e9b7a5>] process_one_work+0x2c9/0x600 kernel/workqueue.c:2275 [<000000001545bd9f>] worker_thread+0x59/0x5d0 kernel/workqueue.c:2421 [<00000000a6f773f5>] kthread+0x178/0x1b0 kernel/kthread.c:292 [<00000000522dbc1b>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 BUG: memory leak unreferenced object 0xffff888103bf7a00 (size 512): comm "syz-executor864", pid 8464, jiffies 4294944110 (age 13.740s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 7a bf 03 81 88 ff ff .........z...... 08 7a bf 03 81 88 ff ff 18 7a bf 03 81 88 ff ff .z.......z...... backtrace: [<000000002cc849a9>] kmalloc include/linux/slab.h:557 [inline] [<000000002cc849a9>] kzalloc include/linux/slab.h:682 [inline] [<000000002cc849a9>] rds_message_alloc+0x40/0xc0 net/rds/message.c:291 [<000000000cbdf522>] rds_send_probe.constprop.0+0x42/0x3e0 net/rds/send.c:1434 [<0000000045cb8f8c>] rds_recv_incoming+0x252/0x690 net/rds/recv.c:343 [<000000001e5f2a16>] rds_loop_xmit+0xa3/0x120 net/rds/loop.c:96 [<0000000059fc452e>] rds_send_xmit+0x763/0xe20 net/rds/send.c:367 [<000000004a9cb6f6>] rds_sendmsg+0x16cd/0x1970 net/rds/send.c:1382 [<00000000b4fbd7bf>] sock_sendmsg_nosec net/socket.c:652 [inline] [<00000000b4fbd7bf>] sock_sendmsg+0x56/0x80 net/socket.c:672 [<0000000087f08990>] __sys_sendto+0x15c/0x200 net/socket.c:1975 [<0000000063381b2a>] __do_sys_sendto net/socket.c:1987 [inline] [<0000000063381b2a>] __se_sys_sendto net/socket.c:1983 [inline] [<0000000063381b2a>] __x64_sys_sendto+0x26/0x30 net/socket.c:1983 [<000000000f2fea2e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000095f40888>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888103bf7c00 (size 512): comm "syz-executor864", pid 8465, jiffies 4294944699 (age 7.850s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 7c bf 03 81 88 ff ff .........|...... 08 7c bf 03 81 88 ff ff 18 7c bf 03 81 88 ff ff .|.......|...... backtrace: [<000000002cc849a9>] kmalloc include/linux/slab.h:557 [inline] [<000000002cc849a9>] kzalloc include/linux/slab.h:682 [inline] [<000000002cc849a9>] rds_message_alloc+0x40/0xc0 net/rds/message.c:291 [<000000000cbdf522>] rds_send_probe.constprop.0+0x42/0x3e0 net/rds/send.c:1434 [<0000000045cb8f8c>] rds_recv_incoming+0x252/0x690 net/rds/recv.c:343 [<000000001e5f2a16>] rds_loop_xmit+0xa3/0x120 net/rds/loop.c:96 [<0000000059fc452e>] rds_send_xmit+0x763/0xe20 net/rds/send.c:367 [<000000004a9cb6f6>] rds_sendmsg+0x16cd/0x1970 net/rds/send.c:1382 [<00000000b4fbd7bf>] sock_sendmsg_nosec net/socket.c:652 [inline] [<00000000b4fbd7bf>] sock_sendmsg+0x56/0x80 net/socket.c:672 [<0000000087f08990>] __sys_sendto+0x15c/0x200 net/socket.c:1975 [<0000000063381b2a>] __do_sys_sendto net/socket.c:1987 [inline] [<0000000063381b2a>] __se_sys_sendto net/socket.c:1983 [inline] [<0000000063381b2a>] __x64_sys_sendto+0x26/0x30 net/socket.c:1983 [<000000000f2fea2e>] do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 [<0000000095f40888>] entry_SYSCALL_64_after_hwframe+0x44/0xa9