lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 13 Feb 2019 20:44:51 -0700
From:   David Ahern <dsahern@...il.com>
To:     Peter Oskolkov <posk@...gle.com>
Cc:     Alexei Starovoitov <alexei.starovoitov@...il.com>,
        Alexei Starovoitov <ast@...nel.org>,
        Daniel Borkmann <daniel@...earbox.net>, netdev@...r.kernel.org,
        Peter Oskolkov <posk@...k.io>,
        Willem de Bruijn <willemb@...gle.com>
Subject: Re: [PATCH bpf-next v11 0/7] bpf: add BPF_LWT_ENCAP_IP option to
 bpf_lwt_push_encap

On 2/13/19 7:39 PM, Alexei Starovoitov wrote:
> On Wed, Feb 13, 2019 at 05:46:26PM -0700, David Ahern wrote:
>> On 2/13/19 12:53 PM, Peter Oskolkov wrote:
>>> This patchset implements BPF_LWT_ENCAP_IP mode in bpf_lwt_push_encap
>>> BPF helper. It enables BPF programs (specifically, BPF_PROG_TYPE_LWT_IN
>>> and BPF_PROG_TYPE_LWT_XMIT prog types) to add IP encapsulation headers
>>> to packets (e.g. IP/GRE, GUE, IPIP).
>>>
>>> This is useful when thousands of different short-lived flows should be
>>> encapped, each with different and dynamically determined destination.
>>> Although lwtunnels can be used in some of these scenarios, the ability
>>> to dynamically generate encap headers adds more flexibility, e.g.
>>> when routing depends on the state of the host (reflected in global bpf
>>> maps).
>>>
>>
>>
>> For the set:
>> Reviewed-by: David Ahern <dsahern@...il.com>
> 
> Applied. Thanks everyone!
> 

Looks like a cleanup round is needed.

I changed the routes to fail with unreachable:

@@ -179,16 +175,16 @@
 	ip -netns ${NS3} tunnel add gre_dev mode gre remote ${IPv4_1} local
${IPv4_GRE} ttl 255
 	ip -netns ${NS3} link set gre_dev up
 	ip -netns ${NS3} addr add ${IPv4_GRE} dev gre_dev
-	ip -netns ${NS1} route add ${IPv4_GRE}/32 dev veth5 via ${IPv4_6}
-	ip -netns ${NS2} route add ${IPv4_GRE}/32 dev veth7 via ${IPv4_8}
+	ip -netns ${NS1} route add unreachable ${IPv4_GRE}/32
+	ip -netns ${NS2} route add unreachable ${IPv4_GRE}/32


 	# configure IPv6 GRE device in NS3, and a route to it via the "bottom"
route
 	ip -netns ${NS3} -6 tunnel add name gre6_dev mode ip6gre remote
${IPv6_1} local ${IPv6_GRE} ttl 255
 	ip -netns ${NS3} link set gre6_dev up
 	ip -netns ${NS3} -6 addr add ${IPv6_GRE} nodad dev gre6_dev
-	ip -netns ${NS1} -6 route add ${IPv6_GRE}/128 dev veth5 via ${IPv6_6}
-	ip -netns ${NS2} -6 route add ${IPv6_GRE}/128 dev veth7 via ${IPv6_8}
+	ip -netns ${NS1} -6 route add unreachable ${IPv6_GRE}/128
+	ip -netns ${NS2} -6 route add unreachable ${IPv6_GRE}/128

 	# rp_filter gets confused by what these tests are doing, so disable it
 	ip netns exec ${NS1} sysctl -wq net.ipv4.conf.all.rp_filter=0
@@ -220,7 +216,6 @@


and then removed all of the set -e and exit 1's in the script (really
should let all of the tests run versus bailing on the first failure).

With kmemleak enabled I see a lot of suspected memory leaks - some may
not be related to this change but it is triggering the suspected leak:


unreferenced object 0xffff88813407a9c0 (size 160):
  comm "ping", pid 1040, jiffies 4294800240 (age 130.536s)
  hex dump (first 32 bytes):
    00 60 23 28 81 88 ff ff 80 d7 23 82 ff ff ff ff  .`#(......#.....
    c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<00000000dec307f3>] dst_alloc+0x89/0xc1
    [<0000000037c7c09a>] rt_dst_alloc+0x57/0xd4
    [<00000000850d146d>] ip_route_output_key_hash_rcu+0x57a/0x64d
    [<0000000059f3e271>] ip_route_output_key_hash+0x6e/0x98
    [<0000000093465e72>] ip_route_output_flow+0x1e/0x47
    [<000000007eee78d9>] raw_sendmsg+0x551/0xbd8
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881280bdf00 (size 224):
  comm "ping", pid 1040, jiffies 4294800240 (age 130.536s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 80 96 27 81 88 ff ff 40 da a2 27 81 88 ff ff  ...'....@.......
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
    [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88
    [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7
    [<000000008437d83b>] ip_append_data+0x22/0x28
    [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff888127ad6c00 (size 1024):
  comm "ping", pid 1040, jiffies 4294800240 (age 130.545s)
  hex dump (first 32 bytes):
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
    [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
    [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
    [<0000000034bfc15f>] skb_cow_head+0xae/0xb7
    [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
    [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
    [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
    [<000000002d199add>] __bpf_prog_run32+0x42/0x58
    [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
    [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
    [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
    [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7
    [<000000005a652edf>] ip_finish_output+0x17f/0x191
    [<00000000cded5fe2>] ip_output+0x58/0x88
unreferenced object 0xffff888131020f00 (size 224):
  comm "ping", pid 1040, jiffies 4294800240 (age 130.545s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 80 96 27 81 88 ff ff 40 da a2 27 81 88 ff ff  ...'....@.......
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
    [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88
    [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7
    [<000000008437d83b>] ip_append_data+0x22/0x28
    [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff88812779cc00 (size 1024):
  comm "ping", pid 1040, jiffies 4294800240 (age 130.545s)
  hex dump (first 32 bytes):
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
    [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
    [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
    [<0000000034bfc15f>] skb_cow_head+0xae/0xb7
    [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
    [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
    [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
    [<000000002d199add>] __bpf_prog_run32+0x42/0x58
    [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
    [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
    [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
    [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7
    [<000000005a652edf>] ip_finish_output+0x17f/0x191
    [<00000000cded5fe2>] ip_output+0x58/0x88
unreferenced object 0xffff888131abf980 (size 1632):
  comm "ping6", pid 1041, jiffies 4294801264 (age 129.529s)
  hex dump (first 32 bytes):
    00 00 00 00 7f 00 00 06 00 00 00 00 00 00 3a 00  ..............:.
    0a 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00  ...A............
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4
    [<00000000f5b12125>] sk_alloc+0x2e/0x1aa
    [<00000000c2b12d1b>] inet6_create+0x1ae/0x3a7
    [<000000000a3125dc>] __sock_create+0x1c1/0x22a
    [<00000000039d3cb8>] sock_create+0x30/0x32
    [<000000000556b08a>] __sys_socket+0x3d/0xb3
    [<000000007e47d085>] __x64_sys_socket+0x1a/0x1e
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff888127683f00 (size 224):
  comm "softirq", pid 0, jiffies 4294801264 (age 129.529s)
  hex dump (first 32 bytes):
    00 60 23 28 81 88 ff ff 00 2f 30 35 81 88 ff ff  .`#(...../05....
    c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<00000000dec307f3>] dst_alloc+0x89/0xc1
    [<000000002651f911>] ip6_dst_alloc+0x25/0x63
    [<000000008608d224>] ip6_pol_route+0x201/0x2ae
    [<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b
    [<000000005d385680>] fib6_rule_lookup+0xe7/0x12c
    [<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1
    [<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364
    [<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b
    [<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
unreferenced object 0xffff88812fb34f00 (size 224):
  comm "ping6", pid 1041, jiffies 4294801264 (age 129.530s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 80 96 27 81 88 ff ff 80 f9 ab 31 81 88 ff ff  ...'.......1....
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
    [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62
    [<0000000016ddc7e9>] ip6_append_data+0x135/0x148
    [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881276bdc00 (size 1024):
  comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s)
  hex dump (first 32 bytes):
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
    [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
    [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
    [<0000000034bfc15f>] skb_cow_head+0xae/0xb7
    [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
    [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
    [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
    [<000000002d199add>] __bpf_prog_run32+0x42/0x58
    [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
    [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
    [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
    [<000000004c67bd98>] ip6_finish_output2+0x477/0x494
    [<00000000bf642298>] ip6_finish_output+0x106/0x110
    [<00000000365d3055>] ip6_output+0x87/0xbf
unreferenced object 0xffff8881278cbf00 (size 224):
  comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 80 96 27 81 88 ff ff 80 f9 ab 31 81 88 ff ff  ...'.......1....
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
    [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62
    [<0000000016ddc7e9>] ip6_append_data+0x135/0x148
    [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881268fdc00 (size 1024):
  comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s)
  hex dump (first 32 bytes):
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
    [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
    [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
    [<0000000034bfc15f>] skb_cow_head+0xae/0xb7
    [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
    [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
    [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
    [<000000002d199add>] __bpf_prog_run32+0x42/0x58
    [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
    [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
    [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
    [<000000004c67bd98>] ip6_finish_output2+0x477/0x494
    [<00000000bf642298>] ip6_finish_output+0x106/0x110
    [<00000000365d3055>] ip6_output+0x87/0xbf
unreferenced object 0xffff888127157e80 (size 128):
  comm "ip", pid 1157, jiffies 4294810718 (age 120.100s)
  hex dump (first 32 bytes):
    06 00 04 00 00 00 00 00 02 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<00000000bd21c202>] __kmalloc+0x102/0x143
    [<00000000ac289f37>] lwtunnel_state_alloc+0x1a/0x1c
    [<000000002acf5ea0>] bpf_build_state+0x8c/0x16a
    [<00000000e1c85c0f>] lwtunnel_build_state+0x10a/0x148
    [<00000000187eb239>] ip6_route_info_create+0x2ae/0x823
    [<0000000017a89b3a>] ip6_route_add+0x1a/0x4e
    [<00000000de590240>] inet6_rtm_newroute+0x62/0x80
    [<000000009356b68b>] rtnetlink_rcv_msg+0x22d/0x273
    [<000000003da74356>] netlink_rcv_skb+0x8b/0xd9
    [<000000005349126a>] rtnetlink_rcv+0x15/0x17
    [<00000000d24a54ac>] netlink_unicast+0x118/0x1b1
    [<0000000096e0cc4e>] netlink_sendmsg+0x328/0x34d
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<000000003872075e>] ___sys_sendmsg+0x1ad/0x238
unreferenced object 0xffff8881271d1180 (size 64):
  comm "ip", pid 1157, jiffies 4294810718 (age 120.100s)
  hex dump (first 32 bytes):
    74 65 73 74 5f 6c 77 74 5f 69 70 5f 65 6e 63 61  test_lwt_ip_enca
    70 2e 6f 3a 5b 65 6e 63 61 70 5f 67 72 65 36 5d  p.o:[encap_gre6]
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
    [<000000004a28667f>] kmemdup+0x20/0x35
    [<00000000f0fe083f>] bpf_parse_prog+0x77/0xc3
    [<000000005e53fa11>] bpf_build_state+0x108/0x16a
    [<00000000e1c85c0f>] lwtunnel_build_state+0x10a/0x148
    [<00000000187eb239>] ip6_route_info_create+0x2ae/0x823
    [<0000000017a89b3a>] ip6_route_add+0x1a/0x4e
    [<00000000de590240>] inet6_rtm_newroute+0x62/0x80
    [<000000009356b68b>] rtnetlink_rcv_msg+0x22d/0x273
    [<000000003da74356>] netlink_rcv_skb+0x8b/0xd9
    [<000000005349126a>] rtnetlink_rcv+0x15/0x17
    [<00000000d24a54ac>] netlink_unicast+0x118/0x1b1
    [<0000000096e0cc4e>] netlink_sendmsg+0x328/0x34d
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
unreferenced object 0xffff88813189ea40 (size 1432):
  comm "ping", pid 1159, jiffies 4294810742 (age 120.076s)
  hex dump (first 32 bytes):
    00 00 00 00 ac 10 01 64 00 00 00 00 00 00 01 00  .......d........
    02 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00  ...A............
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4
    [<00000000f5b12125>] sk_alloc+0x2e/0x1aa
    [<0000000048f46e3a>] inet_create+0x1ab/0x32e
    [<000000000a3125dc>] __sock_create+0x1c1/0x22a
    [<00000000039d3cb8>] sock_create+0x30/0x32
    [<000000000556b08a>] __sys_socket+0x3d/0xb3
    [<000000007e47d085>] __x64_sys_socket+0x1a/0x1e
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881270f2f00 (size 224):
  comm "ping", pid 1159, jiffies 4294810743 (age 120.084s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 30 af 26 81 88 ff ff 40 ea 89 31 81 88 ff ff  .0.&....@.......
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
    [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88
    [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7
    [<000000008437d83b>] ip_append_data+0x22/0x28
    [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881336dac00 (size 1024):
  comm "ping", pid 1159, jiffies 4294810743 (age 120.084s)
  hex dump (first 32 bytes):
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
    [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
    [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
    [<0000000034bfc15f>] skb_cow_head+0xae/0xb7
    [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
    [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
    [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
    [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58
    [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
    [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
    [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
    [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7
    [<000000005a652edf>] ip_finish_output+0x17f/0x191
    [<00000000cded5fe2>] ip_output+0x58/0x88
unreferenced object 0xffff8881283d0f00 (size 224):
  comm "ping", pid 1159, jiffies 4294810743 (age 120.084s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 30 af 26 81 88 ff ff 40 ea 89 31 81 88 ff ff  .0.&....@.......
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
    [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88
    [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7
    [<000000008437d83b>] ip_append_data+0x22/0x28
    [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881272edc00 (size 1024):
  comm "ping", pid 1159, jiffies 4294810743 (age 120.093s)
  hex dump (first 32 bytes):
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
    [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
    [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
    [<0000000034bfc15f>] skb_cow_head+0xae/0xb7
    [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
    [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
    [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
    [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58
    [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
    [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
    [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
    [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7
    [<000000005a652edf>] ip_finish_output+0x17f/0x191
    [<00000000cded5fe2>] ip_output+0x58/0x88
unreferenced object 0xffff88813355d980 (size 1632):
  comm "ping6", pid 1160, jiffies 4294811768 (age 119.068s)
  hex dump (first 32 bytes):
    00 00 00 00 7f 00 00 06 00 00 00 00 00 00 3a 00  ..............:.
    0a 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00  ...A............
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4
    [<00000000f5b12125>] sk_alloc+0x2e/0x1aa
    [<00000000c2b12d1b>] inet6_create+0x1ae/0x3a7
    [<000000000a3125dc>] __sock_create+0x1c1/0x22a
    [<00000000039d3cb8>] sock_create+0x30/0x32
    [<000000000556b08a>] __sys_socket+0x3d/0xb3
    [<000000007e47d085>] __x64_sys_socket+0x1a/0x1e
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff8881282b1f00 (size 224):
  comm "softirq", pid 0, jiffies 4294811768 (age 119.068s)
  hex dump (first 32 bytes):
    00 10 1c 28 81 88 ff ff 40 ee 25 28 81 88 ff ff  ...(....@.%(....
    c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<00000000dec307f3>] dst_alloc+0x89/0xc1
    [<000000002651f911>] ip6_dst_alloc+0x25/0x63
    [<000000008608d224>] ip6_pol_route+0x201/0x2ae
    [<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b
    [<000000005d385680>] fib6_rule_lookup+0xe7/0x12c
    [<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1
    [<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364
    [<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b
    [<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
unreferenced object 0xffff88812744bf00 (size 224):
  comm "ping6", pid 1160, jiffies 4294811768 (age 119.076s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 30 af 26 81 88 ff ff 80 d9 55 33 81 88 ff ff  .0.&......U3....
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
    [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62
    [<0000000016ddc7e9>] ip6_append_data+0x135/0x148
    [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff888127371c00 (size 1024):
  comm "ping6", pid 1160, jiffies 4294811769 (age 119.075s)
  hex dump (first 32 bytes):
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
    [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
    [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
    [<0000000034bfc15f>] skb_cow_head+0xae/0xb7
    [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
    [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
    [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
    [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58
    [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
    [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
    [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
    [<000000004c67bd98>] ip6_finish_output2+0x477/0x494
    [<00000000bf642298>] ip6_finish_output+0x106/0x110
    [<00000000365d3055>] ip6_output+0x87/0xbf
unreferenced object 0xffff88812723cf00 (size 224):
  comm "softirq", pid 0, jiffies 4294811770 (age 119.074s)
  hex dump (first 32 bytes):
    00 10 1c 28 81 88 ff ff 40 ee 25 28 81 88 ff ff  ...(....@.%(....
    c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<00000000dec307f3>] dst_alloc+0x89/0xc1
    [<000000002651f911>] ip6_dst_alloc+0x25/0x63
    [<000000008608d224>] ip6_pol_route+0x201/0x2ae
    [<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b
    [<000000005d385680>] fib6_rule_lookup+0xe7/0x12c
    [<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1
    [<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364
    [<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b
    [<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
unreferenced object 0xffff8881273d3f00 (size 224):
  comm "ping6", pid 1160, jiffies 4294811770 (age 119.084s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 30 af 26 81 88 ff ff 80 d9 55 33 81 88 ff ff  .0.&......U3....
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa
    [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9
    [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62
    [<0000000016ddc7e9>] ip6_append_data+0x135/0x148
    [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc
    [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82
    [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f
    [<0000000025dbe598>] __sys_sendto+0x102/0x143
    [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c
    [<00000000520e974d>] do_syscall_64+0x5c/0x6e
    [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
    [<000000005a49f8d9>] 0xffffffffffffffff
unreferenced object 0xffff88812825bc00 (size 1024):
  comm "ping6", pid 1160, jiffies 4294811771 (age 119.083s)
  hex dump (first 32 bytes):
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
    5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
  backtrace:
    [<00000000c4c19340>] kmemleak_alloc+0x70/0x94
    [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c
    [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f
    [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d
    [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1
    [<0000000034bfc15f>] skb_cow_head+0xae/0xb7
    [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c
    [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29
    [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757
    [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58
    [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6
    [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef
    [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb
    [<000000004c67bd98>] ip6_finish_output2+0x477/0x494
    [<00000000bf642298>] ip6_finish_output+0x106/0x110
    [<00000000365d3055>] ip6_output+0x87/0xbf

Powered by blists - more mailing lists