From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.1 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id ED06DC4360F for ; Thu, 14 Feb 2019 03:44:58 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 9C7D021B1A for ; Thu, 14 Feb 2019 03:44:58 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Uzmo3Qev" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405541AbfBNDo5 (ORCPT ); Wed, 13 Feb 2019 22:44:57 -0500 Received: from mail-pg1-f196.google.com ([209.85.215.196]:40196 "EHLO mail-pg1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388138AbfBNDo4 (ORCPT ); Wed, 13 Feb 2019 22:44:56 -0500 Received: by mail-pg1-f196.google.com with SMTP id z10so2296614pgp.7 for ; Wed, 13 Feb 2019 19:44:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=jKRRDAD/lMaPufLpfGS+c6ZMjxWmIMHQDUrKH0lCW90=; b=Uzmo3QevditTOOY7SryRs9+ANPRzGWvXH8W2o5RkX+5FN7Irx5L7k5G6saDNbg1KYc 0ghhL2xA7WrEzyfnmB99fQSFnZC8MwtRakP9lkPltRAlQfHmtXe1OX+g3pwJpJaIjqfT 72w2iBJrOBRdgk0kcW6sUlo87WYlBO2EAyhGJ9cQdE8yF1hkRyyCqNjeRqWr66ZfQq96 wPw+R9Z439kdXFkpXCfK+omAiZI/3H1/RrINrVHiNs8oy66/1RdqNCz3YpBiPB057MUX aQyViXo6XSStSTgWaSKcX5cSXLDorFrpMQUos4FnB4MOI7X7MsX4A2gRzWOY0YCCzhJA 8NvQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=jKRRDAD/lMaPufLpfGS+c6ZMjxWmIMHQDUrKH0lCW90=; b=hk9kiRQu3M+2HlZGjpQ3GFhibU5oReaYrOlEnv4lhBTTaO1AvFf6yv5ooxCgqSYdg7 5gJixHTsiGDDySHQ/uJUyl3rWtMgJ2jj2iRFcG5lAbXKVob7NMGm1UX2MtuvmZqSLXDe NzS9ivGQzE4JyLCl34cw0wN5wRn99nBHMD//p/cp3q3EGwVgxsP5ZXh60r0Fb1XZiKFu xKgf8yK6bb+dOQqrO8w8teVQyByXhj2OsfsVyFzskTZxq+VHiSKfKm5Mlf69hu7vGWAe 4rGEmHvi6tkLmf3xXV/xlMqob5IsNI9RvIyiXCqw6zjrigpeBErtMNp5VgsNRhFi4GWr d9sg== X-Gm-Message-State: AHQUAuauvP3ClS6C/WQs+GM3WmuLviKt/SCsN7CUdlyqWq9kyV/zoJ/Q 0OedSTMXSJqc4BifZlvp32Y= X-Google-Smtp-Source: AHgI3Ia3jg3a+6vMIJdQQrhVWmga8/uotYJuGaxvrUA0rGz7RFQd/SbShOb4VO1EGJ2t7KE6+BJURg== X-Received: by 2002:a63:bd51:: with SMTP id d17mr1672549pgp.443.1550115894710; Wed, 13 Feb 2019 19:44:54 -0800 (PST) Received: from ?IPv6:2601:282:800:fd80:1d6b:31d6:ccdb:d65a? ([2601:282:800:fd80:1d6b:31d6:ccdb:d65a]) by smtp.googlemail.com with ESMTPSA id d11sm915500pgi.25.2019.02.13.19.44.52 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 13 Feb 2019 19:44:53 -0800 (PST) Subject: Re: [PATCH bpf-next v11 0/7] bpf: add BPF_LWT_ENCAP_IP option to bpf_lwt_push_encap To: Peter Oskolkov Cc: Alexei Starovoitov , Alexei Starovoitov , Daniel Borkmann , netdev@vger.kernel.org, Peter Oskolkov , Willem de Bruijn References: <20190213195341.184969-1-posk@google.com> <783b5578-cba4-904d-4ade-c8c08b47a3ba@gmail.com> <20190214023916.fu6ymperb4lqi632@ast-mbp> From: David Ahern Message-ID: <3772c82a-6959-9f8a-9273-0adcbdbcf631@gmail.com> Date: Wed, 13 Feb 2019 20:44:51 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20190214023916.fu6ymperb4lqi632@ast-mbp> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On 2/13/19 7:39 PM, Alexei Starovoitov wrote: > On Wed, Feb 13, 2019 at 05:46:26PM -0700, David Ahern wrote: >> On 2/13/19 12:53 PM, Peter Oskolkov wrote: >>> This patchset implements BPF_LWT_ENCAP_IP mode in bpf_lwt_push_encap >>> BPF helper. It enables BPF programs (specifically, BPF_PROG_TYPE_LWT_IN >>> and BPF_PROG_TYPE_LWT_XMIT prog types) to add IP encapsulation headers >>> to packets (e.g. IP/GRE, GUE, IPIP). >>> >>> This is useful when thousands of different short-lived flows should be >>> encapped, each with different and dynamically determined destination. >>> Although lwtunnels can be used in some of these scenarios, the ability >>> to dynamically generate encap headers adds more flexibility, e.g. >>> when routing depends on the state of the host (reflected in global bpf >>> maps). >>> >> >> >> For the set: >> Reviewed-by: David Ahern > > Applied. Thanks everyone! > Looks like a cleanup round is needed. I changed the routes to fail with unreachable: @@ -179,16 +175,16 @@ ip -netns ${NS3} tunnel add gre_dev mode gre remote ${IPv4_1} local ${IPv4_GRE} ttl 255 ip -netns ${NS3} link set gre_dev up ip -netns ${NS3} addr add ${IPv4_GRE} dev gre_dev - ip -netns ${NS1} route add ${IPv4_GRE}/32 dev veth5 via ${IPv4_6} - ip -netns ${NS2} route add ${IPv4_GRE}/32 dev veth7 via ${IPv4_8} + ip -netns ${NS1} route add unreachable ${IPv4_GRE}/32 + ip -netns ${NS2} route add unreachable ${IPv4_GRE}/32 # configure IPv6 GRE device in NS3, and a route to it via the "bottom" route ip -netns ${NS3} -6 tunnel add name gre6_dev mode ip6gre remote ${IPv6_1} local ${IPv6_GRE} ttl 255 ip -netns ${NS3} link set gre6_dev up ip -netns ${NS3} -6 addr add ${IPv6_GRE} nodad dev gre6_dev - ip -netns ${NS1} -6 route add ${IPv6_GRE}/128 dev veth5 via ${IPv6_6} - ip -netns ${NS2} -6 route add ${IPv6_GRE}/128 dev veth7 via ${IPv6_8} + ip -netns ${NS1} -6 route add unreachable ${IPv6_GRE}/128 + ip -netns ${NS2} -6 route add unreachable ${IPv6_GRE}/128 # rp_filter gets confused by what these tests are doing, so disable it ip netns exec ${NS1} sysctl -wq net.ipv4.conf.all.rp_filter=0 @@ -220,7 +216,6 @@ and then removed all of the set -e and exit 1's in the script (really should let all of the tests run versus bailing on the first failure). With kmemleak enabled I see a lot of suspected memory leaks - some may not be related to this change but it is triggering the suspected leak: unreferenced object 0xffff88813407a9c0 (size 160): comm "ping", pid 1040, jiffies 4294800240 (age 130.536s) hex dump (first 32 bytes): 00 60 23 28 81 88 ff ff 80 d7 23 82 ff ff ff ff .`#(......#..... c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<00000000dec307f3>] dst_alloc+0x89/0xc1 [<0000000037c7c09a>] rt_dst_alloc+0x57/0xd4 [<00000000850d146d>] ip_route_output_key_hash_rcu+0x57a/0x64d [<0000000059f3e271>] ip_route_output_key_hash+0x6e/0x98 [<0000000093465e72>] ip_route_output_flow+0x1e/0x47 [<000000007eee78d9>] raw_sendmsg+0x551/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881280bdf00 (size 224): comm "ping", pid 1040, jiffies 4294800240 (age 130.536s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 96 27 81 88 ff ff 40 da a2 27 81 88 ff ff ...'....@..'.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88 [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7 [<000000008437d83b>] ip_append_data+0x22/0x28 [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff888127ad6c00 (size 1024): comm "ping", pid 1040, jiffies 4294800240 (age 130.545s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<000000002d199add>] __bpf_prog_run32+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7 [<000000005a652edf>] ip_finish_output+0x17f/0x191 [<00000000cded5fe2>] ip_output+0x58/0x88 unreferenced object 0xffff888131020f00 (size 224): comm "ping", pid 1040, jiffies 4294800240 (age 130.545s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 96 27 81 88 ff ff 40 da a2 27 81 88 ff ff ...'....@..'.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88 [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7 [<000000008437d83b>] ip_append_data+0x22/0x28 [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff88812779cc00 (size 1024): comm "ping", pid 1040, jiffies 4294800240 (age 130.545s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<000000002d199add>] __bpf_prog_run32+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7 [<000000005a652edf>] ip_finish_output+0x17f/0x191 [<00000000cded5fe2>] ip_output+0x58/0x88 unreferenced object 0xffff888131abf980 (size 1632): comm "ping6", pid 1041, jiffies 4294801264 (age 129.529s) hex dump (first 32 bytes): 00 00 00 00 7f 00 00 06 00 00 00 00 00 00 3a 00 ..............:. 0a 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4 [<00000000f5b12125>] sk_alloc+0x2e/0x1aa [<00000000c2b12d1b>] inet6_create+0x1ae/0x3a7 [<000000000a3125dc>] __sock_create+0x1c1/0x22a [<00000000039d3cb8>] sock_create+0x30/0x32 [<000000000556b08a>] __sys_socket+0x3d/0xb3 [<000000007e47d085>] __x64_sys_socket+0x1a/0x1e [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff888127683f00 (size 224): comm "softirq", pid 0, jiffies 4294801264 (age 129.529s) hex dump (first 32 bytes): 00 60 23 28 81 88 ff ff 00 2f 30 35 81 88 ff ff .`#(...../05.... c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<00000000dec307f3>] dst_alloc+0x89/0xc1 [<000000002651f911>] ip6_dst_alloc+0x25/0x63 [<000000008608d224>] ip6_pol_route+0x201/0x2ae [<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b [<000000005d385680>] fib6_rule_lookup+0xe7/0x12c [<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1 [<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364 [<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b [<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c unreferenced object 0xffff88812fb34f00 (size 224): comm "ping6", pid 1041, jiffies 4294801264 (age 129.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 96 27 81 88 ff ff 80 f9 ab 31 81 88 ff ff ...'.......1.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62 [<0000000016ddc7e9>] ip6_append_data+0x135/0x148 [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881276bdc00 (size 1024): comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<000000002d199add>] __bpf_prog_run32+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<000000004c67bd98>] ip6_finish_output2+0x477/0x494 [<00000000bf642298>] ip6_finish_output+0x106/0x110 [<00000000365d3055>] ip6_output+0x87/0xbf unreferenced object 0xffff8881278cbf00 (size 224): comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 96 27 81 88 ff ff 80 f9 ab 31 81 88 ff ff ...'.......1.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62 [<0000000016ddc7e9>] ip6_append_data+0x135/0x148 [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881268fdc00 (size 1024): comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<000000002d199add>] __bpf_prog_run32+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<000000004c67bd98>] ip6_finish_output2+0x477/0x494 [<00000000bf642298>] ip6_finish_output+0x106/0x110 [<00000000365d3055>] ip6_output+0x87/0xbf unreferenced object 0xffff888127157e80 (size 128): comm "ip", pid 1157, jiffies 4294810718 (age 120.100s) hex dump (first 32 bytes): 06 00 04 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<00000000bd21c202>] __kmalloc+0x102/0x143 [<00000000ac289f37>] lwtunnel_state_alloc+0x1a/0x1c [<000000002acf5ea0>] bpf_build_state+0x8c/0x16a [<00000000e1c85c0f>] lwtunnel_build_state+0x10a/0x148 [<00000000187eb239>] ip6_route_info_create+0x2ae/0x823 [<0000000017a89b3a>] ip6_route_add+0x1a/0x4e [<00000000de590240>] inet6_rtm_newroute+0x62/0x80 [<000000009356b68b>] rtnetlink_rcv_msg+0x22d/0x273 [<000000003da74356>] netlink_rcv_skb+0x8b/0xd9 [<000000005349126a>] rtnetlink_rcv+0x15/0x17 [<00000000d24a54ac>] netlink_unicast+0x118/0x1b1 [<0000000096e0cc4e>] netlink_sendmsg+0x328/0x34d [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<000000003872075e>] ___sys_sendmsg+0x1ad/0x238 unreferenced object 0xffff8881271d1180 (size 64): comm "ip", pid 1157, jiffies 4294810718 (age 120.100s) hex dump (first 32 bytes): 74 65 73 74 5f 6c 77 74 5f 69 70 5f 65 6e 63 61 test_lwt_ip_enca 70 2e 6f 3a 5b 65 6e 63 61 70 5f 67 72 65 36 5d p.o:[encap_gre6] backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<000000004a28667f>] kmemdup+0x20/0x35 [<00000000f0fe083f>] bpf_parse_prog+0x77/0xc3 [<000000005e53fa11>] bpf_build_state+0x108/0x16a [<00000000e1c85c0f>] lwtunnel_build_state+0x10a/0x148 [<00000000187eb239>] ip6_route_info_create+0x2ae/0x823 [<0000000017a89b3a>] ip6_route_add+0x1a/0x4e [<00000000de590240>] inet6_rtm_newroute+0x62/0x80 [<000000009356b68b>] rtnetlink_rcv_msg+0x22d/0x273 [<000000003da74356>] netlink_rcv_skb+0x8b/0xd9 [<000000005349126a>] rtnetlink_rcv+0x15/0x17 [<00000000d24a54ac>] netlink_unicast+0x118/0x1b1 [<0000000096e0cc4e>] netlink_sendmsg+0x328/0x34d [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f unreferenced object 0xffff88813189ea40 (size 1432): comm "ping", pid 1159, jiffies 4294810742 (age 120.076s) hex dump (first 32 bytes): 00 00 00 00 ac 10 01 64 00 00 00 00 00 00 01 00 .......d........ 02 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4 [<00000000f5b12125>] sk_alloc+0x2e/0x1aa [<0000000048f46e3a>] inet_create+0x1ab/0x32e [<000000000a3125dc>] __sock_create+0x1c1/0x22a [<00000000039d3cb8>] sock_create+0x30/0x32 [<000000000556b08a>] __sys_socket+0x3d/0xb3 [<000000007e47d085>] __x64_sys_socket+0x1a/0x1e [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881270f2f00 (size 224): comm "ping", pid 1159, jiffies 4294810743 (age 120.084s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 af 26 81 88 ff ff 40 ea 89 31 81 88 ff ff .0.&....@..1.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88 [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7 [<000000008437d83b>] ip_append_data+0x22/0x28 [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881336dac00 (size 1024): comm "ping", pid 1159, jiffies 4294810743 (age 120.084s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7 [<000000005a652edf>] ip_finish_output+0x17f/0x191 [<00000000cded5fe2>] ip_output+0x58/0x88 unreferenced object 0xffff8881283d0f00 (size 224): comm "ping", pid 1159, jiffies 4294810743 (age 120.084s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 af 26 81 88 ff ff 40 ea 89 31 81 88 ff ff .0.&....@..1.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88 [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7 [<000000008437d83b>] ip_append_data+0x22/0x28 [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881272edc00 (size 1024): comm "ping", pid 1159, jiffies 4294810743 (age 120.093s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7 [<000000005a652edf>] ip_finish_output+0x17f/0x191 [<00000000cded5fe2>] ip_output+0x58/0x88 unreferenced object 0xffff88813355d980 (size 1632): comm "ping6", pid 1160, jiffies 4294811768 (age 119.068s) hex dump (first 32 bytes): 00 00 00 00 7f 00 00 06 00 00 00 00 00 00 3a 00 ..............:. 0a 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4 [<00000000f5b12125>] sk_alloc+0x2e/0x1aa [<00000000c2b12d1b>] inet6_create+0x1ae/0x3a7 [<000000000a3125dc>] __sock_create+0x1c1/0x22a [<00000000039d3cb8>] sock_create+0x30/0x32 [<000000000556b08a>] __sys_socket+0x3d/0xb3 [<000000007e47d085>] __x64_sys_socket+0x1a/0x1e [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881282b1f00 (size 224): comm "softirq", pid 0, jiffies 4294811768 (age 119.068s) hex dump (first 32 bytes): 00 10 1c 28 81 88 ff ff 40 ee 25 28 81 88 ff ff ...(....@.%(.... c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<00000000dec307f3>] dst_alloc+0x89/0xc1 [<000000002651f911>] ip6_dst_alloc+0x25/0x63 [<000000008608d224>] ip6_pol_route+0x201/0x2ae [<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b [<000000005d385680>] fib6_rule_lookup+0xe7/0x12c [<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1 [<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364 [<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b [<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c unreferenced object 0xffff88812744bf00 (size 224): comm "ping6", pid 1160, jiffies 4294811768 (age 119.076s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 af 26 81 88 ff ff 80 d9 55 33 81 88 ff ff .0.&......U3.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62 [<0000000016ddc7e9>] ip6_append_data+0x135/0x148 [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff888127371c00 (size 1024): comm "ping6", pid 1160, jiffies 4294811769 (age 119.075s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<000000004c67bd98>] ip6_finish_output2+0x477/0x494 [<00000000bf642298>] ip6_finish_output+0x106/0x110 [<00000000365d3055>] ip6_output+0x87/0xbf unreferenced object 0xffff88812723cf00 (size 224): comm "softirq", pid 0, jiffies 4294811770 (age 119.074s) hex dump (first 32 bytes): 00 10 1c 28 81 88 ff ff 40 ee 25 28 81 88 ff ff ...(....@.%(.... c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<00000000dec307f3>] dst_alloc+0x89/0xc1 [<000000002651f911>] ip6_dst_alloc+0x25/0x63 [<000000008608d224>] ip6_pol_route+0x201/0x2ae [<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b [<000000005d385680>] fib6_rule_lookup+0xe7/0x12c [<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1 [<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364 [<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b [<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c unreferenced object 0xffff8881273d3f00 (size 224): comm "ping6", pid 1160, jiffies 4294811770 (age 119.084s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 af 26 81 88 ff ff 80 d9 55 33 81 88 ff ff .0.&......U3.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62 [<0000000016ddc7e9>] ip6_append_data+0x135/0x148 [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff88812825bc00 (size 1024): comm "ping6", pid 1160, jiffies 4294811771 (age 119.083s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<000000004c67bd98>] ip6_finish_output2+0x477/0x494 [<00000000bf642298>] ip6_finish_output+0x106/0x110 [<00000000365d3055>] ip6_output+0x87/0xbf