BUG: memory leak unreferenced object 0xffff8881206c6800 (size 2048): comm "kworker/0:3", pid 5848, jiffies 4294944979 hex dump (first 32 bytes): a0 a6 bc 10 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 02 00 00 00 20 0c cb d9 ............ ... backtrace (crc 6725e8e2): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] __kmalloc_cache_noprof+0x325/0x3d0 mm/slub.c:4354 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] keypair_create drivers/net/wireguard/noise.c:100 [inline] wg_noise_handshake_begin_session+0x85/0x320 drivers/net/wireguard/noise.c:827 wg_packet_send_handshake_response+0xd1/0x130 drivers/net/wireguard/send.c:96 wg_receive_handshake_packet drivers/net/wireguard/receive.c:154 [inline] wg_packet_handshake_receive_worker+0xed/0x560 drivers/net/wireguard/receive.c:213 process_one_work+0x26b/0x620 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3321 [inline] worker_thread+0x2c4/0x4f0 kernel/workqueue.c:3402 kthread+0x15b/0x310 kernel/kthread.c:464 ret_from_fork+0xec/0x1b0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 BUG: memory leak unreferenced object 0xffff888111036800 (size 2048): comm "kworker/0:4", pid 6338, jiffies 4294945191 hex dump (first 32 bytes): e0 0c b8 10 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 02 00 00 00 7d af a0 a8 ............}... backtrace (crc 71e5d302): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] __kmalloc_cache_noprof+0x325/0x3d0 mm/slub.c:4354 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] keypair_create drivers/net/wireguard/noise.c:100 [inline] wg_noise_handshake_begin_session+0x85/0x320 drivers/net/wireguard/noise.c:827 wg_packet_send_handshake_response+0xd1/0x130 drivers/net/wireguard/send.c:96 wg_receive_handshake_packet drivers/net/wireguard/receive.c:154 [inline] wg_packet_handshake_receive_worker+0xed/0x560 drivers/net/wireguard/receive.c:213 process_one_work+0x26b/0x620 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3321 [inline] worker_thread+0x2c4/0x4f0 kernel/workqueue.c:3402 kthread+0x15b/0x310 kernel/kthread.c:464 ret_from_fork+0xec/0x1b0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 BUG: memory leak unreferenced object 0xffff888121c4f000 (size 2048): comm "kworker/0:7", pid 6596, jiffies 4294945909 hex dump (first 32 bytes): 30 20 b8 10 81 88 ff ff 00 00 00 00 00 00 00 00 0 .............. 00 00 00 00 00 00 00 00 02 00 00 00 d3 78 6b a0 .............xk. backtrace (crc d7ef47ec): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] __kmalloc_cache_noprof+0x325/0x3d0 mm/slub.c:4354 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] keypair_create drivers/net/wireguard/noise.c:100 [inline] wg_noise_handshake_begin_session+0x85/0x320 drivers/net/wireguard/noise.c:827 wg_receive_handshake_packet drivers/net/wireguard/receive.c:176 [inline] wg_packet_handshake_receive_worker+0x3ac/0x560 drivers/net/wireguard/receive.c:213 process_one_work+0x26b/0x620 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3321 [inline] worker_thread+0x2c4/0x4f0 kernel/workqueue.c:3402 kthread+0x15b/0x310 kernel/kthread.c:464 ret_from_fork+0xec/0x1b0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 BUG: memory leak unreferenced object 0xffff88811d0d66c0 (size 192): comm "udevd", pid 5198, jiffies 4294966160 hex dump (first 32 bytes): 44 40 00 00 02 00 00 00 00 00 00 00 00 00 00 00 D@.............. 00 00 00 00 00 00 00 00 40 b2 85 03 81 88 ff ff ........@....... backtrace (crc 3f0250f9): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_lru_noprof+0x31d/0x3d0 mm/slub.c:4216 __d_alloc+0x31/0x300 fs/dcache.c:1690 d_alloc+0x23/0xb0 fs/dcache.c:1769 d_alloc_parallel+0x62/0x670 fs/dcache.c:2533 __lookup_slow+0x75/0x1f0 fs/namei.c:1802 lookup_slow fs/namei.c:1834 [inline] walk_component+0x1a2/0x250 fs/namei.c:2138 link_path_walk+0x348/0x610 fs/namei.c:2506 path_openat+0xc9/0x1eb0 fs/namei.c:4042 do_filp_open+0x102/0x1f0 fs/namei.c:4073 do_sys_openat2+0xc1/0x140 fs/open.c:1437 do_sys_open fs/open.c:1452 [inline] __do_sys_openat fs/open.c:1468 [inline] __se_sys_openat fs/open.c:1463 [inline] __x64_sys_openat+0xb2/0x100 fs/open.c:1463 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff8881007b20c0 (size 192): comm "udevd", pid 5198, jiffies 4294966188 hex dump (first 32 bytes): 44 40 00 00 02 00 00 00 00 00 00 00 00 00 00 00 D@.............. 00 00 00 00 00 00 00 00 40 b2 85 03 81 88 ff ff ........@....... backtrace (crc 71dc9090): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_lru_noprof+0x31d/0x3d0 mm/slub.c:4216 __d_alloc+0x31/0x300 fs/dcache.c:1690 d_alloc+0x23/0xb0 fs/dcache.c:1769 d_alloc_parallel+0x62/0x670 fs/dcache.c:2533 __lookup_slow+0x75/0x1f0 fs/namei.c:1802 lookup_slow fs/namei.c:1834 [inline] walk_component+0x1a2/0x250 fs/namei.c:2138 link_path_walk+0x348/0x610 fs/namei.c:2506 path_openat+0xc9/0x1eb0 fs/namei.c:4042 do_filp_open+0x102/0x1f0 fs/namei.c:4073 do_sys_openat2+0xc1/0x140 fs/open.c:1437 do_sys_open fs/open.c:1452 [inline] __do_sys_openat fs/open.c:1468 [inline] __se_sys_openat fs/open.c:1463 [inline] __x64_sys_openat+0xb2/0x100 fs/open.c:1463 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88811fe66a80 (size 192): comm "udevd", pid 5198, jiffies 4294966217 hex dump (first 32 bytes): 44 40 00 00 02 00 00 00 00 00 00 00 00 00 00 00 D@.............. 00 00 00 00 00 00 00 00 40 b2 85 03 81 88 ff ff ........@....... backtrace (crc bed949b3): kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline] slab_post_alloc_hook mm/slub.c:4152 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_lru_noprof+0x31d/0x3d0 mm/slub.c:4216 __d_alloc+0x31/0x300 fs/dcache.c:1690 d_alloc+0x23/0xb0 fs/dcache.c:1769 d_alloc_parallel+0x62/0x670 fs/dcache.c:2533 __lookup_slow+0x75/0x1f0 fs/namei.c:1802 lookup_slow fs/namei.c:1834 [inline] walk_component+0x1a2/0x250 fs/namei.c:2138 link_path_walk+0x348/0x610 fs/namei.c:2506 path_openat+0xc9/0x1eb0 fs/namei.c:4042 do_filp_open+0x102/0x1f0 fs/namei.c:4073 do_sys_openat2+0xc1/0x140 fs/open.c:1437 do_sys_open fs/open.c:1452 [inline] __do_sys_openat fs/open.c:1468 [inline] __se_sys_openat fs/open.c:1463 [inline] __x64_sys_openat+0xb2/0x100 fs/open.c:1463 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f