make -C tools/testing/selftests TARGETS="net/forwarding" TEST_PROGS=vxlan__bridge_1q_port_8472_ipv6.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # overriding timeout to 21600 # selftests: net/forwarding: vxlan_bridge_1q_port_8472_ipv6.sh # 35.91 [+35.91] INFO: Running tests with UDP port 8472 # 37.21 [+1.30] TEST: ping: local->local vid 10 [ OK ] # 38.54 [+1.33] TEST: ping: local->local vid 20 [ OK ] # 50.01 [+11.47] TEST: ping: local->remote 1 vid 10 [ OK ] # 61.76 [+11.75] TEST: ping: local->remote 2 vid 10 [ OK ] # 73.40 [+11.65] TEST: ping: local->remote 1 vid 20 [ OK ] # 85.08 [+11.68] TEST: ping: local->remote 2 vid 20 [ OK ] # 86.88 [+1.80] TEST: ping6: local->local vid 10 [ OK ] # 88.20 [+1.31] TEST: ping6: local->local vid 20 [ OK ] # 99.68 [+11.48] TEST: ping6: local->remote 1 vid 10 [ OK ] # 111.36 [+11.68] TEST: ping6: local->remote 2 vid 10 [ OK ] # 123.04 [+11.68] TEST: ping6: local->remote 1 vid 20 [ OK ] # 134.82 [+11.78] TEST: ping6: local->remote 2 vid 20 [ OK ] ok 1 selftests: net/forwarding: vxlan_bridge_1q_port_8472_ipv6.sh make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak [?2004lunreferenced object 0xffff88800f192640 (size 64): comm "ip", pid 418, jiffies 4294698209 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 udp_sock_create6+0xc5/0x6c0 [ip6_udp_tunnel] vxlan_create_sock+0x1a7/0x1d0 [vxlan] vxlan_socket_create+0xfe/0x510 [vxlan] __vxlan_sock_add+0x3c5/0xa60 [vxlan] vxlan_open+0xc3/0x240 [vxlan] __dev_open+0x220/0x590 __dev_change_flags+0x460/0x6c0 netif_change_flags+0x80/0x160 do_setlink.constprop.0+0x97c/0x2460 rtnl_newlink+0x693/0xa60 rtnetlink_rcv_msg+0x709/0xc00 netlink_rcv_skb+0x121/0x340 unreferenced object 0xffff888009a15240 (size 64): comm "ip", pid 475, jiffies 4294704456 hex dump (first 32 bytes): 00 00 00 00 00 00 00 0 DETECTED CRASH, lowering timeout 0 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 udp_sock_create6+0xc5/0x6c0 [ip6_udp_tunnel] vxlan_create_sock+0x1a7/0x1d0 [vxlan] vxlan_socket_create+0xfe/0x510 [vxlan] __vxlan_sock_add+0x3c5/0xa60 [vxlan] vxlan_open+0xc3/0x240 [vxlan] __dev_open+0x220/0x590 __dev_change_flags+0x460/0x6c0 netif_change_flags+0x80/0x160 do_setlink.constprop.0+0x97c/0x2460 rtnl_newlink+0x693/0xa60 rtnetlink_rcv_msg+0x709/0xc00 netlink_rcv_skb+0x121/0x340 unreferenced object 0xffff88800f192140 (size 64): comm "ping6", pid 660, jiffies 4294766333 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800bd69c40 (size 64): comm "ping6", pid 665, jiffies 4294767646 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800e9a5c40 (size 64): comm "ping6", pid 672, jiffies 4294769298 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800a429a40 (size 64): comm "ping6", pid 691, jiffies 4294781114 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888004efae40 (size 64): comm "ping6", pid 729, jiffies 4294804479 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 xx__->