[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3772c82a-6959-9f8a-9273-0adcbdbcf631@gmail.com>
Date: Wed, 13 Feb 2019 20:44:51 -0700
From: David Ahern <dsahern@...il.com>
To: Peter Oskolkov <posk@...gle.com>
Cc: Alexei Starovoitov <alexei.starovoitov@...il.com>,
Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>, netdev@...r.kernel.org,
Peter Oskolkov <posk@...k.io>,
Willem de Bruijn <willemb@...gle.com>
Subject: Re: [PATCH bpf-next v11 0/7] bpf: add BPF_LWT_ENCAP_IP option to
bpf_lwt_push_encap
On 2/13/19 7:39 PM, Alexei Starovoitov wrote:
> On Wed, Feb 13, 2019 at 05:46:26PM -0700, David Ahern wrote:
>> On 2/13/19 12:53 PM, Peter Oskolkov wrote:
>>> This patchset implements BPF_LWT_ENCAP_IP mode in bpf_lwt_push_encap
>>> BPF helper. It enables BPF programs (specifically, BPF_PROG_TYPE_LWT_IN
>>> and BPF_PROG_TYPE_LWT_XMIT prog types) to add IP encapsulation headers
>>> to packets (e.g. IP/GRE, GUE, IPIP).
>>>
>>> This is useful when thousands of different short-lived flows should be
>>> encapped, each with different and dynamically determined destination.
>>> Although lwtunnels can be used in some of these scenarios, the ability
>>> to dynamically generate encap headers adds more flexibility, e.g.
>>> when routing depends on the state of the host (reflected in global bpf
>>> maps).
>>>
>>
>>
>> For the set:
>> Reviewed-by: David Ahern <dsahern@...il.com>
>
> Applied. Thanks everyone!
>
Looks like a cleanup round is needed.
I changed the routes to fail with unreachable:
@@ -179,16 +175,16 @@
ip -netns ${NS3} tunnel add gre_dev mode gre remote ${IPv4_1} local
${IPv4_GRE} ttl 255
ip -netns ${NS3} link set gre_dev up
ip -netns ${NS3} addr add ${IPv4_GRE} dev gre_dev
- ip -netns ${NS1} route add ${IPv4_GRE}/32 dev veth5 via ${IPv4_6}
- ip -netns ${NS2} route add ${IPv4_GRE}/32 dev veth7 via ${IPv4_8}
+ ip -netns ${NS1} route add unreachable ${IPv4_GRE}/32
+ ip -netns ${NS2} route add unreachable ${IPv4_GRE}/32
# configure IPv6 GRE device in NS3, and a route to it via the "bottom"
route
ip -netns ${NS3} -6 tunnel add name gre6_dev mode ip6gre remote
${IPv6_1} local ${IPv6_GRE} ttl 255
ip -netns ${NS3} link set gre6_dev up
ip -netns ${NS3} -6 addr add ${IPv6_GRE} nodad dev gre6_dev
- ip -netns ${NS1} -6 route add ${IPv6_GRE}/128 dev veth5 via ${IPv6_6}
- ip -netns ${NS2} -6 route add ${IPv6_GRE}/128 dev veth7 via ${IPv6_8}
+ ip -netns ${NS1} -6 route add unreachable ${IPv6_GRE}/128
+ ip -netns ${NS2} -6 route add unreachable ${IPv6_GRE}/128
# rp_filter gets confused by what these tests are doing, so disable it
ip netns exec ${NS1} sysctl -wq net.ipv4.conf.all.rp_filter=0
@@ -220,7 +216,6 @@
and then removed all of the set -e and exit 1's in the script (really
should let all of the tests run versus bailing on the first failure).
With kmemleak enabled I see a lot of suspected memory leaks - some may
not be related to this change but it is triggering the suspected leak:
unreferenced object 0xffff88813407a9c0 (size 160):
comm "ping", pid 1040, jiffies 4294800240 (age 130.536s)
hex dump (first 32 bytes):
00 60 23 28 81 88 ff ff 80 d7 23 82 ff ff ff ff .`#(......#.....
c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<00000000dec307f3>] dst_alloc+0x89/0xc1
[<0000000037c7c09a>] rt_dst_alloc+0x57/0xd4
[<00000000850d146d>] ip_route_output_key_hash_rcu+0x57a/0x64d
[<0000000059f3e271>] ip_route_output_key_hash+0x6e/0x98
[<0000000093465e72>] ip_route_output_flow+0x1e/0x47
[<000000007eee78d9>] raw_sendmsg+0x551/0xbd8
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881280bdf00 (size 224):
comm "ping", pid 1040, jiffies 4294800240 (age 130.536s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 80 96 27 81 88 ff ff 40 da a2 27 81 88 ff ff ...'....@.......
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
[<00000000e92d2e81>] __ip_append_data+0x44f/0xa88
[<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7
[<000000008437d83b>] ip_append_data+0x22/0x28
[<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff888127ad6c00 (size 1024):
comm "ping", pid 1040, jiffies 4294800240 (age 130.545s)
hex dump (first 32 bytes):
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
[<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
[<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
[<0000000034bfc15f>] skb_cow_head+0xae/0xb7
[<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
[<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
[<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
[<000000002d199add>] __bpf_prog_run32+0x42/0x58
[<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
[<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
[<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
[<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7
[<000000005a652edf>] ip_finish_output+0x17f/0x191
[<00000000cded5fe2>] ip_output+0x58/0x88
unreferenced object 0xffff888131020f00 (size 224):
comm "ping", pid 1040, jiffies 4294800240 (age 130.545s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 80 96 27 81 88 ff ff 40 da a2 27 81 88 ff ff ...'....@.......
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
[<00000000e92d2e81>] __ip_append_data+0x44f/0xa88
[<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7
[<000000008437d83b>] ip_append_data+0x22/0x28
[<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff88812779cc00 (size 1024):
comm "ping", pid 1040, jiffies 4294800240 (age 130.545s)
hex dump (first 32 bytes):
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
[<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
[<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
[<0000000034bfc15f>] skb_cow_head+0xae/0xb7
[<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
[<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
[<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
[<000000002d199add>] __bpf_prog_run32+0x42/0x58
[<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
[<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
[<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
[<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7
[<000000005a652edf>] ip_finish_output+0x17f/0x191
[<00000000cded5fe2>] ip_output+0x58/0x88
unreferenced object 0xffff888131abf980 (size 1632):
comm "ping6", pid 1041, jiffies 4294801264 (age 129.529s)
hex dump (first 32 bytes):
00 00 00 00 7f 00 00 06 00 00 00 00 00 00 3a 00 ..............:.
0a 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4
[<00000000f5b12125>] sk_alloc+0x2e/0x1aa
[<00000000c2b12d1b>] inet6_create+0x1ae/0x3a7
[<000000000a3125dc>] __sock_create+0x1c1/0x22a
[<00000000039d3cb8>] sock_create+0x30/0x32
[<000000000556b08a>] __sys_socket+0x3d/0xb3
[<000000007e47d085>] __x64_sys_socket+0x1a/0x1e
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff888127683f00 (size 224):
comm "softirq", pid 0, jiffies 4294801264 (age 129.529s)
hex dump (first 32 bytes):
00 60 23 28 81 88 ff ff 00 2f 30 35 81 88 ff ff .`#(...../05....
c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<00000000dec307f3>] dst_alloc+0x89/0xc1
[<000000002651f911>] ip6_dst_alloc+0x25/0x63
[<000000008608d224>] ip6_pol_route+0x201/0x2ae
[<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b
[<000000005d385680>] fib6_rule_lookup+0xe7/0x12c
[<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1
[<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364
[<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b
[<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
unreferenced object 0xffff88812fb34f00 (size 224):
comm "ping6", pid 1041, jiffies 4294801264 (age 129.530s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 80 96 27 81 88 ff ff 80 f9 ab 31 81 88 ff ff ...'.......1....
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
[<0000000014f706bf>] __ip6_append_data+0x57c/0xc62
[<0000000016ddc7e9>] ip6_append_data+0x135/0x148
[<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881276bdc00 (size 1024):
comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s)
hex dump (first 32 bytes):
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
[<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
[<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
[<0000000034bfc15f>] skb_cow_head+0xae/0xb7
[<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
[<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
[<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
[<000000002d199add>] __bpf_prog_run32+0x42/0x58
[<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
[<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
[<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
[<000000004c67bd98>] ip6_finish_output2+0x477/0x494
[<00000000bf642298>] ip6_finish_output+0x106/0x110
[<00000000365d3055>] ip6_output+0x87/0xbf
unreferenced object 0xffff8881278cbf00 (size 224):
comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 80 96 27 81 88 ff ff 80 f9 ab 31 81 88 ff ff ...'.......1....
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
[<0000000014f706bf>] __ip6_append_data+0x57c/0xc62
[<0000000016ddc7e9>] ip6_append_data+0x135/0x148
[<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881268fdc00 (size 1024):
comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s)
hex dump (first 32 bytes):
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
[<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
[<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
[<0000000034bfc15f>] skb_cow_head+0xae/0xb7
[<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
[<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
[<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
[<000000002d199add>] __bpf_prog_run32+0x42/0x58
[<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
[<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
[<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
[<000000004c67bd98>] ip6_finish_output2+0x477/0x494
[<00000000bf642298>] ip6_finish_output+0x106/0x110
[<00000000365d3055>] ip6_output+0x87/0xbf
unreferenced object 0xffff888127157e80 (size 128):
comm "ip", pid 1157, jiffies 4294810718 (age 120.100s)
hex dump (first 32 bytes):
06 00 04 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<00000000bd21c202>] __kmalloc+0x102/0x143
[<00000000ac289f37>] lwtunnel_state_alloc+0x1a/0x1c
[<000000002acf5ea0>] bpf_build_state+0x8c/0x16a
[<00000000e1c85c0f>] lwtunnel_build_state+0x10a/0x148
[<00000000187eb239>] ip6_route_info_create+0x2ae/0x823
[<0000000017a89b3a>] ip6_route_add+0x1a/0x4e
[<00000000de590240>] inet6_rtm_newroute+0x62/0x80
[<000000009356b68b>] rtnetlink_rcv_msg+0x22d/0x273
[<000000003da74356>] netlink_rcv_skb+0x8b/0xd9
[<000000005349126a>] rtnetlink_rcv+0x15/0x17
[<00000000d24a54ac>] netlink_unicast+0x118/0x1b1
[<0000000096e0cc4e>] netlink_sendmsg+0x328/0x34d
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<000000003872075e>] ___sys_sendmsg+0x1ad/0x238
unreferenced object 0xffff8881271d1180 (size 64):
comm "ip", pid 1157, jiffies 4294810718 (age 120.100s)
hex dump (first 32 bytes):
74 65 73 74 5f 6c 77 74 5f 69 70 5f 65 6e 63 61 test_lwt_ip_enca
70 2e 6f 3a 5b 65 6e 63 61 70 5f 67 72 65 36 5d p.o:[encap_gre6]
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
[<000000004a28667f>] kmemdup+0x20/0x35
[<00000000f0fe083f>] bpf_parse_prog+0x77/0xc3
[<000000005e53fa11>] bpf_build_state+0x108/0x16a
[<00000000e1c85c0f>] lwtunnel_build_state+0x10a/0x148
[<00000000187eb239>] ip6_route_info_create+0x2ae/0x823
[<0000000017a89b3a>] ip6_route_add+0x1a/0x4e
[<00000000de590240>] inet6_rtm_newroute+0x62/0x80
[<000000009356b68b>] rtnetlink_rcv_msg+0x22d/0x273
[<000000003da74356>] netlink_rcv_skb+0x8b/0xd9
[<000000005349126a>] rtnetlink_rcv+0x15/0x17
[<00000000d24a54ac>] netlink_unicast+0x118/0x1b1
[<0000000096e0cc4e>] netlink_sendmsg+0x328/0x34d
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
unreferenced object 0xffff88813189ea40 (size 1432):
comm "ping", pid 1159, jiffies 4294810742 (age 120.076s)
hex dump (first 32 bytes):
00 00 00 00 ac 10 01 64 00 00 00 00 00 00 01 00 .......d........
02 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4
[<00000000f5b12125>] sk_alloc+0x2e/0x1aa
[<0000000048f46e3a>] inet_create+0x1ab/0x32e
[<000000000a3125dc>] __sock_create+0x1c1/0x22a
[<00000000039d3cb8>] sock_create+0x30/0x32
[<000000000556b08a>] __sys_socket+0x3d/0xb3
[<000000007e47d085>] __x64_sys_socket+0x1a/0x1e
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881270f2f00 (size 224):
comm "ping", pid 1159, jiffies 4294810743 (age 120.084s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 30 af 26 81 88 ff ff 40 ea 89 31 81 88 ff ff .0.&....@.......
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
[<00000000e92d2e81>] __ip_append_data+0x44f/0xa88
[<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7
[<000000008437d83b>] ip_append_data+0x22/0x28
[<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881336dac00 (size 1024):
comm "ping", pid 1159, jiffies 4294810743 (age 120.084s)
hex dump (first 32 bytes):
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
[<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
[<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
[<0000000034bfc15f>] skb_cow_head+0xae/0xb7
[<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
[<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
[<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
[<0000000055e881cc>] __bpf_prog_run64+0x42/0x58
[<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
[<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
[<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
[<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7
[<000000005a652edf>] ip_finish_output+0x17f/0x191
[<00000000cded5fe2>] ip_output+0x58/0x88
unreferenced object 0xffff8881283d0f00 (size 224):
comm "ping", pid 1159, jiffies 4294810743 (age 120.084s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 30 af 26 81 88 ff ff 40 ea 89 31 81 88 ff ff .0.&....@.......
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
[<00000000e92d2e81>] __ip_append_data+0x44f/0xa88
[<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7
[<000000008437d83b>] ip_append_data+0x22/0x28
[<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881272edc00 (size 1024):
comm "ping", pid 1159, jiffies 4294810743 (age 120.093s)
hex dump (first 32 bytes):
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
[<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
[<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
[<0000000034bfc15f>] skb_cow_head+0xae/0xb7
[<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
[<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
[<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
[<0000000055e881cc>] __bpf_prog_run64+0x42/0x58
[<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
[<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
[<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
[<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7
[<000000005a652edf>] ip_finish_output+0x17f/0x191
[<00000000cded5fe2>] ip_output+0x58/0x88
unreferenced object 0xffff88813355d980 (size 1632):
comm "ping6", pid 1160, jiffies 4294811768 (age 119.068s)
hex dump (first 32 bytes):
00 00 00 00 7f 00 00 06 00 00 00 00 00 00 3a 00 ..............:.
0a 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4
[<00000000f5b12125>] sk_alloc+0x2e/0x1aa
[<00000000c2b12d1b>] inet6_create+0x1ae/0x3a7
[<000000000a3125dc>] __sock_create+0x1c1/0x22a
[<00000000039d3cb8>] sock_create+0x30/0x32
[<000000000556b08a>] __sys_socket+0x3d/0xb3
[<000000007e47d085>] __x64_sys_socket+0x1a/0x1e
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881282b1f00 (size 224):
comm "softirq", pid 0, jiffies 4294811768 (age 119.068s)
hex dump (first 32 bytes):
00 10 1c 28 81 88 ff ff 40 ee 25 28 81 88 ff ff ...(....@.%(....
c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<00000000dec307f3>] dst_alloc+0x89/0xc1
[<000000002651f911>] ip6_dst_alloc+0x25/0x63
[<000000008608d224>] ip6_pol_route+0x201/0x2ae
[<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b
[<000000005d385680>] fib6_rule_lookup+0xe7/0x12c
[<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1
[<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364
[<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b
[<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
unreferenced object 0xffff88812744bf00 (size 224):
comm "ping6", pid 1160, jiffies 4294811768 (age 119.076s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 30 af 26 81 88 ff ff 80 d9 55 33 81 88 ff ff .0.&......U3....
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
[<0000000014f706bf>] __ip6_append_data+0x57c/0xc62
[<0000000016ddc7e9>] ip6_append_data+0x135/0x148
[<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff888127371c00 (size 1024):
comm "ping6", pid 1160, jiffies 4294811769 (age 119.075s)
hex dump (first 32 bytes):
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
[<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
[<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
[<0000000034bfc15f>] skb_cow_head+0xae/0xb7
[<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
[<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
[<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
[<0000000055e881cc>] __bpf_prog_run64+0x42/0x58
[<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
[<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
[<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
[<000000004c67bd98>] ip6_finish_output2+0x477/0x494
[<00000000bf642298>] ip6_finish_output+0x106/0x110
[<00000000365d3055>] ip6_output+0x87/0xbf
unreferenced object 0xffff88812723cf00 (size 224):
comm "softirq", pid 0, jiffies 4294811770 (age 119.074s)
hex dump (first 32 bytes):
00 10 1c 28 81 88 ff ff 40 ee 25 28 81 88 ff ff ...(....@.%(....
c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<00000000dec307f3>] dst_alloc+0x89/0xc1
[<000000002651f911>] ip6_dst_alloc+0x25/0x63
[<000000008608d224>] ip6_pol_route+0x201/0x2ae
[<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b
[<000000005d385680>] fib6_rule_lookup+0xe7/0x12c
[<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1
[<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364
[<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b
[<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
unreferenced object 0xffff8881273d3f00 (size 224):
comm "ping6", pid 1160, jiffies 4294811770 (age 119.084s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 30 af 26 81 88 ff ff 80 d9 55 33 81 88 ff ff .0.&......U3....
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
[<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
[<0000000014f706bf>] __ip6_append_data+0x57c/0xc62
[<0000000016ddc7e9>] ip6_append_data+0x135/0x148
[<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc
[<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
[<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
[<0000000025dbe598>] __sys_sendto+0x102/0x143
[<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
[<00000000520e974d>] do_syscall_64+0x5c/0x6e
[<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff88812825bc00 (size 1024):
comm "ping6", pid 1160, jiffies 4294811771 (age 119.083s)
hex dump (first 32 bytes):
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ
backtrace:
[<00000000c4c19340>] kmemleak_alloc+0x70/0x94
[<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
[<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
[<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
[<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
[<0000000034bfc15f>] skb_cow_head+0xae/0xb7
[<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
[<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
[<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
[<0000000055e881cc>] __bpf_prog_run64+0x42/0x58
[<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
[<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
[<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
[<000000004c67bd98>] ip6_finish_output2+0x477/0x494
[<00000000bf642298>] ip6_finish_output+0x106/0x110
[<00000000365d3055>] ip6_output+0x87/0xbf
Powered by blists - more mailing lists