On 2/13/19 7:39 PM, Alexei Starovoitov wrote: > On Wed, Feb 13, 2019 at 05:46:26PM -0700, David Ahern wrote: >> On 2/13/19 12:53 PM, Peter Oskolkov wrote: >>> This patchset implements BPF_LWT_ENCAP_IP mode in bpf_lwt_push_encap >>> BPF helper. It enables BPF programs (specifically, BPF_PROG_TYPE_LWT_IN >>> and BPF_PROG_TYPE_LWT_XMIT prog types) to add IP encapsulation headers >>> to packets (e.g. IP/GRE, GUE, IPIP). >>> >>> This is useful when thousands of different short-lived flows should be >>> encapped, each with different and dynamically determined destination. >>> Although lwtunnels can be used in some of these scenarios, the ability >>> to dynamically generate encap headers adds more flexibility, e.g. >>> when routing depends on the state of the host (reflected in global bpf >>> maps). >>> >> >> >> For the set: >> Reviewed-by: David Ahern <dsah...@gmail.com> > > Applied. Thanks everyone! >
Looks like a cleanup round is needed. I changed the routes to fail with unreachable: @@ -179,16 +175,16 @@ ip -netns ${NS3} tunnel add gre_dev mode gre remote ${IPv4_1} local ${IPv4_GRE} ttl 255 ip -netns ${NS3} link set gre_dev up ip -netns ${NS3} addr add ${IPv4_GRE} dev gre_dev - ip -netns ${NS1} route add ${IPv4_GRE}/32 dev veth5 via ${IPv4_6} - ip -netns ${NS2} route add ${IPv4_GRE}/32 dev veth7 via ${IPv4_8} + ip -netns ${NS1} route add unreachable ${IPv4_GRE}/32 + ip -netns ${NS2} route add unreachable ${IPv4_GRE}/32 # configure IPv6 GRE device in NS3, and a route to it via the "bottom" route ip -netns ${NS3} -6 tunnel add name gre6_dev mode ip6gre remote ${IPv6_1} local ${IPv6_GRE} ttl 255 ip -netns ${NS3} link set gre6_dev up ip -netns ${NS3} -6 addr add ${IPv6_GRE} nodad dev gre6_dev - ip -netns ${NS1} -6 route add ${IPv6_GRE}/128 dev veth5 via ${IPv6_6} - ip -netns ${NS2} -6 route add ${IPv6_GRE}/128 dev veth7 via ${IPv6_8} + ip -netns ${NS1} -6 route add unreachable ${IPv6_GRE}/128 + ip -netns ${NS2} -6 route add unreachable ${IPv6_GRE}/128 # rp_filter gets confused by what these tests are doing, so disable it ip netns exec ${NS1} sysctl -wq net.ipv4.conf.all.rp_filter=0 @@ -220,7 +216,6 @@ and then removed all of the set -e and exit 1's in the script (really should let all of the tests run versus bailing on the first failure). With kmemleak enabled I see a lot of suspected memory leaks - some may not be related to this change but it is triggering the suspected leak: unreferenced object 0xffff88813407a9c0 (size 160): comm "ping", pid 1040, jiffies 4294800240 (age 130.536s) hex dump (first 32 bytes): 00 60 23 28 81 88 ff ff 80 d7 23 82 ff ff ff ff .`#(......#..... c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<00000000dec307f3>] dst_alloc+0x89/0xc1 [<0000000037c7c09a>] rt_dst_alloc+0x57/0xd4 [<00000000850d146d>] ip_route_output_key_hash_rcu+0x57a/0x64d [<0000000059f3e271>] ip_route_output_key_hash+0x6e/0x98 [<0000000093465e72>] ip_route_output_flow+0x1e/0x47 [<000000007eee78d9>] raw_sendmsg+0x551/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881280bdf00 (size 224): comm "ping", pid 1040, jiffies 4294800240 (age 130.536s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 96 27 81 88 ff ff 40 da a2 27 81 88 ff ff ...'....@..'.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88 [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7 [<000000008437d83b>] ip_append_data+0x22/0x28 [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff888127ad6c00 (size 1024): comm "ping", pid 1040, jiffies 4294800240 (age 130.545s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<000000002d199add>] __bpf_prog_run32+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7 [<000000005a652edf>] ip_finish_output+0x17f/0x191 [<00000000cded5fe2>] ip_output+0x58/0x88 unreferenced object 0xffff888131020f00 (size 224): comm "ping", pid 1040, jiffies 4294800240 (age 130.545s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 96 27 81 88 ff ff 40 da a2 27 81 88 ff ff ...'....@..'.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88 [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7 [<000000008437d83b>] ip_append_data+0x22/0x28 [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff88812779cc00 (size 1024): comm "ping", pid 1040, jiffies 4294800240 (age 130.545s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<000000002d199add>] __bpf_prog_run32+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7 [<000000005a652edf>] ip_finish_output+0x17f/0x191 [<00000000cded5fe2>] ip_output+0x58/0x88 unreferenced object 0xffff888131abf980 (size 1632): comm "ping6", pid 1041, jiffies 4294801264 (age 129.529s) hex dump (first 32 bytes): 00 00 00 00 7f 00 00 06 00 00 00 00 00 00 3a 00 ..............:. 0a 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4 [<00000000f5b12125>] sk_alloc+0x2e/0x1aa [<00000000c2b12d1b>] inet6_create+0x1ae/0x3a7 [<000000000a3125dc>] __sock_create+0x1c1/0x22a [<00000000039d3cb8>] sock_create+0x30/0x32 [<000000000556b08a>] __sys_socket+0x3d/0xb3 [<000000007e47d085>] __x64_sys_socket+0x1a/0x1e [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff888127683f00 (size 224): comm "softirq", pid 0, jiffies 4294801264 (age 129.529s) hex dump (first 32 bytes): 00 60 23 28 81 88 ff ff 00 2f 30 35 81 88 ff ff .`#(...../05.... c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<00000000dec307f3>] dst_alloc+0x89/0xc1 [<000000002651f911>] ip6_dst_alloc+0x25/0x63 [<000000008608d224>] ip6_pol_route+0x201/0x2ae [<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b [<000000005d385680>] fib6_rule_lookup+0xe7/0x12c [<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1 [<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364 [<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b [<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c unreferenced object 0xffff88812fb34f00 (size 224): comm "ping6", pid 1041, jiffies 4294801264 (age 129.530s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 96 27 81 88 ff ff 80 f9 ab 31 81 88 ff ff ...'.......1.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62 [<0000000016ddc7e9>] ip6_append_data+0x135/0x148 [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881276bdc00 (size 1024): comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<000000002d199add>] __bpf_prog_run32+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<000000004c67bd98>] ip6_finish_output2+0x477/0x494 [<00000000bf642298>] ip6_finish_output+0x106/0x110 [<00000000365d3055>] ip6_output+0x87/0xbf unreferenced object 0xffff8881278cbf00 (size 224): comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 96 27 81 88 ff ff 80 f9 ab 31 81 88 ff ff ...'.......1.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62 [<0000000016ddc7e9>] ip6_append_data+0x135/0x148 [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881268fdc00 (size 1024): comm "ping6", pid 1041, jiffies 4294801264 (age 129.537s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<000000002d199add>] __bpf_prog_run32+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<000000004c67bd98>] ip6_finish_output2+0x477/0x494 [<00000000bf642298>] ip6_finish_output+0x106/0x110 [<00000000365d3055>] ip6_output+0x87/0xbf unreferenced object 0xffff888127157e80 (size 128): comm "ip", pid 1157, jiffies 4294810718 (age 120.100s) hex dump (first 32 bytes): 06 00 04 00 00 00 00 00 02 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<00000000bd21c202>] __kmalloc+0x102/0x143 [<00000000ac289f37>] lwtunnel_state_alloc+0x1a/0x1c [<000000002acf5ea0>] bpf_build_state+0x8c/0x16a [<00000000e1c85c0f>] lwtunnel_build_state+0x10a/0x148 [<00000000187eb239>] ip6_route_info_create+0x2ae/0x823 [<0000000017a89b3a>] ip6_route_add+0x1a/0x4e [<00000000de590240>] inet6_rtm_newroute+0x62/0x80 [<000000009356b68b>] rtnetlink_rcv_msg+0x22d/0x273 [<000000003da74356>] netlink_rcv_skb+0x8b/0xd9 [<000000005349126a>] rtnetlink_rcv+0x15/0x17 [<00000000d24a54ac>] netlink_unicast+0x118/0x1b1 [<0000000096e0cc4e>] netlink_sendmsg+0x328/0x34d [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<000000003872075e>] ___sys_sendmsg+0x1ad/0x238 unreferenced object 0xffff8881271d1180 (size 64): comm "ip", pid 1157, jiffies 4294810718 (age 120.100s) hex dump (first 32 bytes): 74 65 73 74 5f 6c 77 74 5f 69 70 5f 65 6e 63 61 test_lwt_ip_enca 70 2e 6f 3a 5b 65 6e 63 61 70 5f 67 72 65 36 5d p.o:[encap_gre6] backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<000000004a28667f>] kmemdup+0x20/0x35 [<00000000f0fe083f>] bpf_parse_prog+0x77/0xc3 [<000000005e53fa11>] bpf_build_state+0x108/0x16a [<00000000e1c85c0f>] lwtunnel_build_state+0x10a/0x148 [<00000000187eb239>] ip6_route_info_create+0x2ae/0x823 [<0000000017a89b3a>] ip6_route_add+0x1a/0x4e [<00000000de590240>] inet6_rtm_newroute+0x62/0x80 [<000000009356b68b>] rtnetlink_rcv_msg+0x22d/0x273 [<000000003da74356>] netlink_rcv_skb+0x8b/0xd9 [<000000005349126a>] rtnetlink_rcv+0x15/0x17 [<00000000d24a54ac>] netlink_unicast+0x118/0x1b1 [<0000000096e0cc4e>] netlink_sendmsg+0x328/0x34d [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f unreferenced object 0xffff88813189ea40 (size 1432): comm "ping", pid 1159, jiffies 4294810742 (age 120.076s) hex dump (first 32 bytes): 00 00 00 00 ac 10 01 64 00 00 00 00 00 00 01 00 .......d........ 02 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4 [<00000000f5b12125>] sk_alloc+0x2e/0x1aa [<0000000048f46e3a>] inet_create+0x1ab/0x32e [<000000000a3125dc>] __sock_create+0x1c1/0x22a [<00000000039d3cb8>] sock_create+0x30/0x32 [<000000000556b08a>] __sys_socket+0x3d/0xb3 [<000000007e47d085>] __x64_sys_socket+0x1a/0x1e [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881270f2f00 (size 224): comm "ping", pid 1159, jiffies 4294810743 (age 120.084s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 af 26 81 88 ff ff 40 ea 89 31 81 88 ff ff .0.&....@..1.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88 [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7 [<000000008437d83b>] ip_append_data+0x22/0x28 [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881336dac00 (size 1024): comm "ping", pid 1159, jiffies 4294810743 (age 120.084s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7 [<000000005a652edf>] ip_finish_output+0x17f/0x191 [<00000000cded5fe2>] ip_output+0x58/0x88 unreferenced object 0xffff8881283d0f00 (size 224): comm "ping", pid 1159, jiffies 4294810743 (age 120.084s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 af 26 81 88 ff ff 40 ea 89 31 81 88 ff ff .0.&....@..1.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<00000000e92d2e81>] __ip_append_data+0x44f/0xa88 [<00000000c0fa4285>] ip_append_data.part.19+0xa4/0xb7 [<000000008437d83b>] ip_append_data+0x22/0x28 [<0000000010065ae2>] raw_sendmsg+0xaff/0xbd8 [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881272edc00 (size 1024): comm "ping", pid 1159, jiffies 4294810743 (age 120.093s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<00000000abfa977f>] ip_finish_output2+0x5b6/0x5e7 [<000000005a652edf>] ip_finish_output+0x17f/0x191 [<00000000cded5fe2>] ip_output+0x58/0x88 unreferenced object 0xffff88813355d980 (size 1632): comm "ping6", pid 1160, jiffies 4294811768 (age 119.068s) hex dump (first 32 bytes): 00 00 00 00 7f 00 00 06 00 00 00 00 00 00 3a 00 ..............:. 0a 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<000000006287ee1f>] sk_prot_alloc.isra.27+0x30/0xb4 [<00000000f5b12125>] sk_alloc+0x2e/0x1aa [<00000000c2b12d1b>] inet6_create+0x1ae/0x3a7 [<000000000a3125dc>] __sock_create+0x1c1/0x22a [<00000000039d3cb8>] sock_create+0x30/0x32 [<000000000556b08a>] __sys_socket+0x3d/0xb3 [<000000007e47d085>] __x64_sys_socket+0x1a/0x1e [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff8881282b1f00 (size 224): comm "softirq", pid 0, jiffies 4294811768 (age 119.068s) hex dump (first 32 bytes): 00 10 1c 28 81 88 ff ff 40 ee 25 28 81 88 ff ff ...(....@.%(.... c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<00000000dec307f3>] dst_alloc+0x89/0xc1 [<000000002651f911>] ip6_dst_alloc+0x25/0x63 [<000000008608d224>] ip6_pol_route+0x201/0x2ae [<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b [<000000005d385680>] fib6_rule_lookup+0xe7/0x12c [<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1 [<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364 [<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b [<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c unreferenced object 0xffff88812744bf00 (size 224): comm "ping6", pid 1160, jiffies 4294811768 (age 119.076s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 af 26 81 88 ff ff 80 d9 55 33 81 88 ff ff .0.&......U3.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62 [<0000000016ddc7e9>] ip6_append_data+0x135/0x148 [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff888127371c00 (size 1024): comm "ping6", pid 1160, jiffies 4294811769 (age 119.075s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<000000004c67bd98>] ip6_finish_output2+0x477/0x494 [<00000000bf642298>] ip6_finish_output+0x106/0x110 [<00000000365d3055>] ip6_output+0x87/0xbf unreferenced object 0xffff88812723cf00 (size 224): comm "softirq", pid 0, jiffies 4294811770 (age 119.074s) hex dump (first 32 bytes): 00 10 1c 28 81 88 ff ff 40 ee 25 28 81 88 ff ff ...(....@.%(.... c1 7f c8 81 ff ff ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<00000000dec307f3>] dst_alloc+0x89/0xc1 [<000000002651f911>] ip6_dst_alloc+0x25/0x63 [<000000008608d224>] ip6_pol_route+0x201/0x2ae [<000000000084a9eb>] ip6_pol_route_output+0x19/0x1b [<000000005d385680>] fib6_rule_lookup+0xe7/0x12c [<000000001a93c416>] ip6_route_output_flags+0xc5/0xd1 [<0000000023cbe9f3>] ip6_dst_lookup_tail+0x1a3/0x364 [<000000003afeb57e>] ip6_dst_lookup_flow+0x47/0x9b [<00000000938dbf6b>] rawv6_sendmsg+0x45f/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c unreferenced object 0xffff8881273d3f00 (size 224): comm "ping6", pid 1160, jiffies 4294811770 (age 119.084s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 30 af 26 81 88 ff ff 80 d9 55 33 81 88 ff ff .0.&......U3.... backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<0000000025231f88>] kmem_cache_alloc+0xd8/0x1fa [<0000000043c55b9b>] __alloc_skb+0x66/0x1b9 [<0000000014f706bf>] __ip6_append_data+0x57c/0xc62 [<0000000016ddc7e9>] ip6_append_data+0x135/0x148 [<00000000210a1bd5>] rawv6_sendmsg+0xb19/0xdfc [<00000000f564ad0b>] inet_sendmsg+0x3f/0x82 [<00000000a0a71539>] sock_sendmsg_nosec+0x18/0x2f [<0000000025dbe598>] __sys_sendto+0x102/0x143 [<000000000f989e54>] __x64_sys_sendto+0x28/0x2c [<00000000520e974d>] do_syscall_64+0x5c/0x6e [<00000000413f2b33>] entry_SYSCALL_64_after_hwframe+0x49/0xbe [<000000005a49f8d9>] 0xffffffffffffffff unreferenced object 0xffff88812825bc00 (size 1024): comm "ping6", pid 1160, jiffies 4294811771 (age 119.083s) hex dump (first 32 bytes): 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ backtrace: [<00000000c4c19340>] kmemleak_alloc+0x70/0x94 [<000000003251fc6a>] slab_post_alloc_hook+0x47/0x5c [<000000006cd7857e>] __kmalloc_track_caller+0xfe/0x13f [<00000000ebec8a26>] __kmalloc_reserve.isra.17+0x2d/0x6d [<00000000827ebff0>] pskb_expand_head+0xcc/0x2d1 [<0000000034bfc15f>] skb_cow_head+0xae/0xb7 [<000000008f8c30fc>] bpf_lwt_push_ip_encap+0xb1/0x34c [<000000007add911b>] bpf_lwt_xmit_push_encap+0x1d/0x29 [<00000000eecbf798>] ___bpf_prog_run+0xbc3/0x1757 [<0000000055e881cc>] __bpf_prog_run64+0x42/0x58 [<00000000d0c1f29b>] run_lwt_bpf.constprop.4+0xff/0x2e6 [<00000000b9ad5b04>] bpf_xmit+0x3d/0xef [<000000003ba220bf>] lwtunnel_xmit+0xc7/0xeb [<000000004c67bd98>] ip6_finish_output2+0x477/0x494 [<00000000bf642298>] ip6_finish_output+0x106/0x110 [<00000000365d3055>] ip6_output+0x87/0xbf