2020/04/10 23:04:51 executed programs: 1
BUG: memory leak
unreferenced object 0xffff8881153dfe00 (size 512):
  comm "kworker/u4:3", pid 347, jiffies 4294966595 (age 14.300s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 08 fe 3d 15 81 88 ff ff  ..........=.....
    08 fe 3d 15 81 88 ff ff 18 fe 3d 15 81 88 ff ff  ..=.......=.....
  backtrace:
    [<000000008b4fc0e6>] kmalloc include/linux/slab.h:560 [inline]
    [<000000008b4fc0e6>] kzalloc include/linux/slab.h:669 [inline]
    [<000000008b4fc0e6>] rds_message_alloc+0x37/0xc0 net/rds/message.c:291
    [<000000004055b5bf>] rds_send_probe.constprop.0+0x42/0x380 net/rds/send.c:1431
    [<000000003a0a9f9a>] rds_recv_incoming+0x485/0x5d0 net/rds/recv.c:343
    [<000000002759fdc0>] rds_loop_xmit+0x7b/0xf0 net/rds/loop.c:96
    [<00000000c45e3840>] rds_send_xmit+0x583/0xb00 net/rds/send.c:367
    [<00000000e0787b34>] rds_send_worker+0x36/0x150 net/rds/threads.c:200
    [<00000000cb824f38>] process_one_work+0x21e/0x4b0 kernel/workqueue.c:2266
    [<000000008c845520>] worker_thread+0x55/0x4a0 kernel/workqueue.c:2412
    [<00000000024b87cc>] kthread+0x160/0x190 kernel/kthread.c:268
    [<0000000008444055>] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352

BUG: memory leak
unreferenced object 0xffff8881153f7200 (size 512):
  comm "syz-executor.0", pid 6871, jiffies 4294967184 (age 8.410s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 08 72 3f 15 81 88 ff ff  .........r?.....
    08 72 3f 15 81 88 ff ff 18 72 3f 15 81 88 ff ff  .r?......r?.....
  backtrace:
    [<000000008b4fc0e6>] kmalloc include/linux/slab.h:560 [inline]
    [<000000008b4fc0e6>] kzalloc include/linux/slab.h:669 [inline]
    [<000000008b4fc0e6>] rds_message_alloc+0x37/0xc0 net/rds/message.c:291
    [<000000004055b5bf>] rds_send_probe.constprop.0+0x42/0x380 net/rds/send.c:1431
    [<000000003a0a9f9a>] rds_recv_incoming+0x485/0x5d0 net/rds/recv.c:343
    [<000000002759fdc0>] rds_loop_xmit+0x7b/0xf0 net/rds/loop.c:96
    [<00000000c45e3840>] rds_send_xmit+0x583/0xb00 net/rds/send.c:367
    [<00000000a5b6ebd5>] rds_sendmsg+0x1420/0x16f0 net/rds/send.c:1379
    [<000000000e350572>] sock_sendmsg_nosec net/socket.c:652 [inline]
    [<000000000e350572>] sock_sendmsg+0x4c/0x60 net/socket.c:672
    [<000000002d896b00>] __sys_sendto+0x11d/0x1c0 net/socket.c:2000
    [<00000000acee95b0>] __do_sys_sendto net/socket.c:2012 [inline]
    [<00000000acee95b0>] __se_sys_sendto net/socket.c:2008 [inline]
    [<00000000acee95b0>] __x64_sys_sendto+0x26/0x30 net/socket.c:2008
    [<00000000be344524>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295
    [<00000000a6613eee>] entry_SYSCALL_64_after_hwframe+0x44/0xa9

BUG: memory leak
unreferenced object 0xffff8881252e5c00 (size 512):
  comm "syz-executor.0", pid 6872, jiffies 4294967184 (age 8.410s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 08 5c 2e 25 81 88 ff ff  .........\.%....
    08 5c 2e 25 81 88 ff ff 18 5c 2e 25 81 88 ff ff  .\.%.....\.%....
  backtrace:
    [<000000008b4fc0e6>] kmalloc include/linux/slab.h:560 [inline]
    [<000000008b4fc0e6>] kzalloc include/linux/slab.h:669 [inline]
    [<000000008b4fc0e6>] rds_message_alloc+0x37/0xc0 net/rds/message.c:291
    [<000000004055b5bf>] rds_send_probe.constprop.0+0x42/0x380 net/rds/send.c:1431
    [<000000003a0a9f9a>] rds_recv_incoming+0x485/0x5d0 net/rds/recv.c:343
    [<000000002759fdc0>] rds_loop_xmit+0x7b/0xf0 net/rds/loop.c:96
    [<00000000c45e3840>] rds_send_xmit+0x583/0xb00 net/rds/send.c:367
    [<00000000a5b6ebd5>] rds_sendmsg+0x1420/0x16f0 net/rds/send.c:1379
    [<000000000e350572>] sock_sendmsg_nosec net/socket.c:652 [inline]
    [<000000000e350572>] sock_sendmsg+0x4c/0x60 net/socket.c:672
    [<000000002d896b00>] __sys_sendto+0x11d/0x1c0 net/socket.c:2000
    [<00000000acee95b0>] __do_sys_sendto net/socket.c:2012 [inline]
    [<00000000acee95b0>] __se_sys_sendto net/socket.c:2008 [inline]
    [<00000000acee95b0>] __x64_sys_sendto+0x26/0x30 net/socket.c:2008
    [<00000000be344524>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295
    [<00000000a6613eee>] entry_SYSCALL_64_after_hwframe+0x44/0xa9