2026/01/31 01:35:28 executed programs: 264 BUG: memory leak unreferenced object 0xffff888137a2ff00 (size 240): comm "kworker/u8:8", pid 6548, jiffies 4294957104 hex dump (first 32 bytes): 00 81 81 10 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 e0 cb 2d 81 88 ff ff 00 00 00 00 00 00 00 00 ...-............ backtrace (crc 1c66ae97): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_noprof+0x412/0x580 mm/slub.c:5270 skb_clone+0xae/0x2b0 net/core/skbuff.c:2088 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:386 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x2d4/0x340 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26c/0x590 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3340 [inline] worker_thread+0x2b1/0x4f0 kernel/workqueue.c:3421 kthread+0x161/0x310 kernel/kthread.c:463 ret_from_fork+0x23c/0x320 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 BUG: memory leak unreferenced object 0xffff888110818100 (size 240): comm "kworker/u8:4", pid 64, jiffies 4294957200 hex dump (first 32 bytes): 00 bb e4 2e 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 e0 cb 2d 81 88 ff ff 00 00 00 00 00 00 00 00 ...-............ backtrace (crc ce7af355): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_noprof+0x412/0x580 mm/slub.c:5270 skb_clone+0xae/0x2b0 net/core/skbuff.c:2088 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:386 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x2d4/0x340 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26c/0x590 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3340 [inline] worker_thread+0x2b1/0x4f0 kernel/workqueue.c:3421 kthread+0x161/0x310 kernel/kthread.c:463 ret_from_fork+0x23c/0x320 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 BUG: memory leak unreferenced object 0xffff88812ee4bb00 (size 240): comm "kworker/u8:8", pid 6548, jiffies 4294957208 hex dump (first 32 bytes): 00 8a ae 11 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 e0 cb 2d 81 88 ff ff 00 00 00 00 00 00 00 00 ...-............ backtrace (crc 8ec0a3fa): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_noprof+0x412/0x580 mm/slub.c:5270 skb_clone+0xae/0x2b0 net/core/skbuff.c:2088 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:386 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x2d4/0x340 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26c/0x590 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3340 [inline] worker_thread+0x2b1/0x4f0 kernel/workqueue.c:3421 kthread+0x161/0x310 kernel/kthread.c:463 ret_from_fork+0x23c/0x320 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 BUG: memory leak unreferenced object 0xffff888113b54c00 (size 1024): comm "kworker/u8:8", pid 6548, jiffies 4294957208 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc f93b0c45): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4958 [inline] slab_alloc_node mm/slub.c:5263 [inline] __do_kmalloc_node mm/slub.c:5656 [inline] __kmalloc_node_track_caller_noprof+0x47b/0x690 mm/slub.c:5768 kmalloc_reserve+0x96/0x180 net/core/skbuff.c:608 pskb_expand_head+0xd8/0x4f0 net/core/skbuff.c:2283 __skb_cow include/linux/skbuff.h:3853 [inline] skb_cow_head include/linux/skbuff.h:3887 [inline] batadv_skb_head_push+0x8c/0x110 net/batman-adv/mesh-interface.c:71 batadv_send_skb_packet+0x7d/0x200 net/batman-adv/send.c:81 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:391 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:419 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x30f/0x340 net/batman-adv/bat_iv_ogm.c:1697 process_one_work+0x26c/0x590 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3340 [inline] worker_thread+0x2b1/0x4f0 kernel/workqueue.c:3421 kthread+0x161/0x310 kernel/kthread.c:463 ret_from_fork+0x23c/0x320 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 connection error: failed to recv *flatrpc.ExecutorMessageRawT: read tcp 127.0.0.1:33429->127.0.0.1:50132: read: connection reset by peer