2025/11/07 17:00:42 executed programs: 390 2025/11/07 17:00:49 executed programs: 404 BUG: memory leak unreferenced object 0xffff88800af3ed00 (size 240): comm "kworker/u8:7", pid 6026, jiffies 4294978144 hex dump (first 32 bytes): 00 cf 09 0a 80 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 50 1d 29 81 88 ff ff 00 00 00 00 00 00 00 00 .P.)............ backtrace (crc ddbbdb62): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4975 [inline] slab_alloc_node mm/slub.c:5280 [inline] kmem_cache_alloc_noprof+0x397/0x5a0 mm/slub.c:5287 skb_clone+0xae/0x2b0 net/core/skbuff.c:2050 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:386 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x2e0/0x370 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26b/0x620 kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x2c4/0x4f0 kernel/workqueue.c:3427 kthread+0x15b/0x310 kernel/kthread.c:463 ret_from_fork+0x210/0x240 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 BUG: memory leak unreferenced object 0xffff88800c657400 (size 1024): comm "kworker/u8:7", pid 6026, jiffies 4294978144 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 26d5ddf0): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4975 [inline] slab_alloc_node mm/slub.c:5280 [inline] __do_kmalloc_node mm/slub.c:5641 [inline] __kmalloc_node_track_caller_noprof+0x3aa/0x6b0 mm/slub.c:5751 kmalloc_reserve+0x96/0x180 net/core/skbuff.c:601 pskb_expand_head+0xdc/0x540 net/core/skbuff.c:2241 __skb_cow include/linux/skbuff.h:3853 [inline] skb_cow_head include/linux/skbuff.h:3887 [inline] batadv_skb_head_push+0x8f/0x110 net/batman-adv/mesh-interface.c:71 batadv_send_skb_packet+0x7f/0x210 net/batman-adv/send.c:81 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:391 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x31b/0x370 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26b/0x620 kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x2c4/0x4f0 kernel/workqueue.c:3427 kthread+0x15b/0x310 kernel/kthread.c:463 ret_from_fork+0x210/0x240 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 BUG: memory leak unreferenced object 0xffff88800a4add00 (size 240): comm "kworker/u8:7", pid 6026, jiffies 4294978192 hex dump (first 32 bytes): 00 af 03 0a 80 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 20 c9 2a 81 88 ff ff 00 00 00 00 00 00 00 00 . .*............ backtrace (crc aea77380): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4975 [inline] slab_alloc_node mm/slub.c:5280 [inline] kmem_cache_alloc_noprof+0x397/0x5a0 mm/slub.c:5287 skb_clone+0xae/0x2b0 net/core/skbuff.c:2050 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:386 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x2e0/0x370 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26b/0x620 kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x2c4/0x4f0 kernel/workqueue.c:3427 kthread+0x15b/0x310 kernel/kthread.c:463 ret_from_fork+0x210/0x240 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 BUG: memory leak unreferenced object 0xffff88810da71800 (size 1024): comm "kworker/u8:7", pid 6026, jiffies 4294978192 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 6e442d25): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4975 [inline] slab_alloc_node mm/slub.c:5280 [inline] __do_kmalloc_node mm/slub.c:5641 [inline] __kmalloc_node_track_caller_noprof+0x3aa/0x6b0 mm/slub.c:5751 kmalloc_reserve+0x96/0x180 net/core/skbuff.c:601 pskb_expand_head+0xdc/0x540 net/core/skbuff.c:2241 __skb_cow include/linux/skbuff.h:3853 [inline] skb_cow_head include/linux/skbuff.h:3887 [inline] batadv_skb_head_push+0x8f/0x110 net/batman-adv/mesh-interface.c:71 batadv_send_skb_packet+0x7f/0x210 net/batman-adv/send.c:81 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:391 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x31b/0x370 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26b/0x620 kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x2c4/0x4f0 kernel/workqueue.c:3427 kthread+0x15b/0x310 kernel/kthread.c:463 ret_from_fork+0x210/0x240 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 BUG: memory leak unreferenced object 0xffff88800a03af00 (size 240): comm "kworker/u8:7", pid 6026, jiffies 4294978200 hex dump (first 32 bytes): 00 2d d8 0a 80 88 ff ff 00 00 00 00 00 00 00 00 .-.............. 00 20 c9 2a 81 88 ff ff 00 00 00 00 00 00 00 00 . .*............ backtrace (crc 331f2e5f): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4975 [inline] slab_alloc_node mm/slub.c:5280 [inline] kmem_cache_alloc_noprof+0x397/0x5a0 mm/slub.c:5287 skb_clone+0xae/0x2b0 net/core/skbuff.c:2050 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:386 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x2e0/0x370 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26b/0x620 kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x2c4/0x4f0 kernel/workqueue.c:3427 kthread+0x15b/0x310 kernel/kthread.c:463 ret_from_fork+0x210/0x240 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 BUG: memory leak unreferenced object 0xffff888128859c00 (size 1024): comm "kworker/u8:7", pid 6026, jiffies 4294978200 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 30b3f01f): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4975 [inline] slab_alloc_node mm/slub.c:5280 [inline] __do_kmalloc_node mm/slub.c:5641 [inline] __kmalloc_node_track_caller_noprof+0x3aa/0x6b0 mm/slub.c:5751 kmalloc_reserve+0x96/0x180 net/core/skbuff.c:601 pskb_expand_head+0xdc/0x540 net/core/skbuff.c:2241 __skb_cow include/linux/skbuff.h:3853 [inline] skb_cow_head include/linux/skbuff.h:3887 [inline] batadv_skb_head_push+0x8f/0x110 net/batman-adv/mesh-interface.c:71 batadv_send_skb_packet+0x7f/0x210 net/batman-adv/send.c:81 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:391 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x31b/0x370 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26b/0x620 kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x2c4/0x4f0 kernel/workqueue.c:3427 kthread+0x15b/0x310 kernel/kthread.c:463 ret_from_fork+0x210/0x240 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 connection error: failed to recv *flatrpc.ExecutorMessageRawT: read tcp 127.0.0.1:46211->127.0.0.1:42286: read: connection reset by peer