2020/04/10 23:04:51 executed programs: 1 BUG: memory leak unreferenced object 0xffff8881153dfe00 (size 512): comm "kworker/u4:3", pid 347, jiffies 4294966595 (age 14.300s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 fe 3d 15 81 88 ff ff ..........=..... 08 fe 3d 15 81 88 ff ff 18 fe 3d 15 81 88 ff ff ..=.......=..... backtrace: [<000000008b4fc0e6>] kmalloc include/linux/slab.h:560 [inline] [<000000008b4fc0e6>] kzalloc include/linux/slab.h:669 [inline] [<000000008b4fc0e6>] rds_message_alloc+0x37/0xc0 net/rds/message.c:291 [<000000004055b5bf>] rds_send_probe.constprop.0+0x42/0x380 net/rds/send.c:1431 [<000000003a0a9f9a>] rds_recv_incoming+0x485/0x5d0 net/rds/recv.c:343 [<000000002759fdc0>] rds_loop_xmit+0x7b/0xf0 net/rds/loop.c:96 [<00000000c45e3840>] rds_send_xmit+0x583/0xb00 net/rds/send.c:367 [<00000000e0787b34>] rds_send_worker+0x36/0x150 net/rds/threads.c:200 [<00000000cb824f38>] process_one_work+0x21e/0x4b0 kernel/workqueue.c:2266 [<000000008c845520>] worker_thread+0x55/0x4a0 kernel/workqueue.c:2412 [<00000000024b87cc>] kthread+0x160/0x190 kernel/kthread.c:268 [<0000000008444055>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352 BUG: memory leak unreferenced object 0xffff8881153f7200 (size 512): comm "syz-executor.0", pid 6871, jiffies 4294967184 (age 8.410s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 72 3f 15 81 88 ff ff .........r?..... 08 72 3f 15 81 88 ff ff 18 72 3f 15 81 88 ff ff .r?......r?..... backtrace: [<000000008b4fc0e6>] kmalloc include/linux/slab.h:560 [inline] [<000000008b4fc0e6>] kzalloc include/linux/slab.h:669 [inline] [<000000008b4fc0e6>] rds_message_alloc+0x37/0xc0 net/rds/message.c:291 [<000000004055b5bf>] rds_send_probe.constprop.0+0x42/0x380 net/rds/send.c:1431 [<000000003a0a9f9a>] rds_recv_incoming+0x485/0x5d0 net/rds/recv.c:343 [<000000002759fdc0>] rds_loop_xmit+0x7b/0xf0 net/rds/loop.c:96 [<00000000c45e3840>] rds_send_xmit+0x583/0xb00 net/rds/send.c:367 [<00000000a5b6ebd5>] rds_sendmsg+0x1420/0x16f0 net/rds/send.c:1379 [<000000000e350572>] sock_sendmsg_nosec net/socket.c:652 [inline] [<000000000e350572>] sock_sendmsg+0x4c/0x60 net/socket.c:672 [<000000002d896b00>] __sys_sendto+0x11d/0x1c0 net/socket.c:2000 [<00000000acee95b0>] __do_sys_sendto net/socket.c:2012 [inline] [<00000000acee95b0>] __se_sys_sendto net/socket.c:2008 [inline] [<00000000acee95b0>] __x64_sys_sendto+0x26/0x30 net/socket.c:2008 [<00000000be344524>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<00000000a6613eee>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881252e5c00 (size 512): comm "syz-executor.0", pid 6872, jiffies 4294967184 (age 8.410s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 08 5c 2e 25 81 88 ff ff .........\.%.... 08 5c 2e 25 81 88 ff ff 18 5c 2e 25 81 88 ff ff .\.%.....\.%.... backtrace: [<000000008b4fc0e6>] kmalloc include/linux/slab.h:560 [inline] [<000000008b4fc0e6>] kzalloc include/linux/slab.h:669 [inline] [<000000008b4fc0e6>] rds_message_alloc+0x37/0xc0 net/rds/message.c:291 [<000000004055b5bf>] rds_send_probe.constprop.0+0x42/0x380 net/rds/send.c:1431 [<000000003a0a9f9a>] rds_recv_incoming+0x485/0x5d0 net/rds/recv.c:343 [<000000002759fdc0>] rds_loop_xmit+0x7b/0xf0 net/rds/loop.c:96 [<00000000c45e3840>] rds_send_xmit+0x583/0xb00 net/rds/send.c:367 [<00000000a5b6ebd5>] rds_sendmsg+0x1420/0x16f0 net/rds/send.c:1379 [<000000000e350572>] sock_sendmsg_nosec net/socket.c:652 [inline] [<000000000e350572>] sock_sendmsg+0x4c/0x60 net/socket.c:672 [<000000002d896b00>] __sys_sendto+0x11d/0x1c0 net/socket.c:2000 [<00000000acee95b0>] __do_sys_sendto net/socket.c:2012 [inline] [<00000000acee95b0>] __se_sys_sendto net/socket.c:2008 [inline] [<00000000acee95b0>] __x64_sys_sendto+0x26/0x30 net/socket.c:2008 [<00000000be344524>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<00000000a6613eee>] entry_SYSCALL_64_after_hwframe+0x44/0xa9