make -C tools/testing/selftests TARGETS="net/forwarding" TEST_PROGS=routerr_bridge_1d_lag.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # overriding timeout to 21600 # selftests: net/forwarding: router_bridge_1d_lag.sh # 4.34 [+4.34] This program is not intended to be run as root. # 8.08 [+3.73] This program is not intended to be run as root. # 11.69 [+3.61] This program is not intended to be run as root. # 15.53 [+3.85] This program is not intended to be run as root. # 25.91 [+10.38] TEST: ping: via 100 [ OK ] # 27.19 [+1.28] TEST: ping: via 200 [ OK ] # 28.62 [+1.43] TEST: ping6: via 100 [ OK ] # 29.92 [+1.30] TEST: ping6: via 200 [ OK ] # 30.02 [+0.10] INFO: Deslave veth7 # 42.29 [+12.27] TEST: ping: via 100 [ OK ] # 43.57 [+1.29] TEST: ping: via 200 [ OK ] # 44.94 [+1.37] TEST: ping6: via 100 [ OK ] # 46.28 [+1.34] TEST: ping6: via 200 [ OK ] # 46.39 [+0.12] INFO: Enslave veth7 to lag2 # 46.85 [+0.46] INFO: Deslave veth1 # 59.08 [+12.23] TEST: ping: via 100 [ OK ] # 60.40 [+1.32] TEST: ping: via 200 [ OK ] # 61.82 [+1.42] TEST: ping6: via 100 [ OK ] # 63.13 [+1.31] TEST: ping6: via 200 [ OK ] # 63.28 [+0.15] INFO: Deslave veth7 # 63.81 [+0.53] INFO: Enslave veth1 to lag2 # 64.26 [+0.46] INFO: Enslave veth7 to lag2 # 76.47 [+12.21] TEST: ping: via 100 [ OK ] # 77.73 [+1.26] TEST: ping: via 200 [ OK ] # 79.11 [+1.38] TEST: ping6: via 100 [ OK ] # 80.43 [+1.31] TEST: ping6: via 200 [ OK ] # 80.54 [+0.12] INFO: Remaster bridge slaves # 95.07 [+14.52] TEST: ping: via 100 [ OK ] # 96.38 [+1.31] TEST: ping: via 200 [ OK ] # 97.75 [+1.37] TEST: ping6: via 100 [ OK ] # 99.06 [+1.31] TEST: ping6: via 200 [ OK ] # 99.19 [+0.12] INFO: Deslave veth2 # 111.52 [+12.34] TEST: ping: via 100 [ OK ] # 112.82 [+1.30] TEST: ping: via 200 [ OK ] # 114.27 [+1.45] TEST: ping6: via 100 [ OK ] # 115.58 [+1.31] TEST: ping6: via 200 [ OK ] # 115.72 [+0.14] INFO: Enslave veth2 to lag3 # 116.25 [+0.53] INFO: Deslave veth4 # 128.56 [+12.31] TEST: ping: via 100 [ OK ] # 129.91 [+1.35] TEST: ping: via 200 [ OK ] # 131.32 [+1.41] TEST: ping6: via 100 [ OK ] # 132.63 [+1.31] TEST: ping6: via 200 [ OK ] # 132.75 [+0.12] INFO: Deslave veth2 # 133.21 [+0.46] INFO: Enslave veth4 to lag3 # 133.69 [+0.48] INFO: Enslave veth2 to lag3 # 145.91 [+12.22] TEST: ping: via 100 [ OK ] # 147.24 [+1.33] TEST: ping: via 200 [ OK ] # 148.63 [+1.39] TEST: ping6: via 100 [ OK ] # 149.92 [+1.29] TEST: ping6: via 200 [ OK ] ok 1 selftests: net/forwarding: router_bridge_1d_lag.sh make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800c33bb40 (size 64): comm "ping6", pid 496, jiffies 4294707805 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888016c04840 (size 64): comm "ping6", pid 501, jiffies DETECTED CRASH, lowering timeout 4294709111 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888001ebba40 (size 64): comm "ping6", pid 557, jiffies 4294724134 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888001d2cf40 (size 64): comm "ping6", pid 562, jiffies 4294725470 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88801431b440 (size 64): comm "ping6", pid 629, jiffies 4294741018 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800c23b540 (size 64): comm "ping6", pid 634, jiffies 4294742314 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880024e9e40 (size 64): comm "ping6", pid 712, jiffies 4294758301 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88801431e640 (size 64): comm "ping6", pid 775, jiffies 4294776948 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800292bd40 (size 64): comm "ping6", pid 780, jiffies 4294778257 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888008e5a840 (size 64): comm "ping6", pid 836, jiffies 4294793462 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880143db840 (size 64): comm "ping6", pid 841, jiffies 4294794760 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880088aa040 (size 64): comm "ping6", pid 908, jiffies 4294810509 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880087f7f40 (size 64): comm "ping6", pid 913, jiffies 4294811821 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888009da9f40 (size 64): comm "ping6", pid 992, jiffies 4294827821 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888014394b40 (size 64): comm "ping6", pid 997, jiffies 4294829111 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 xx__->