make -C tools/testing/selftests TARGETS="net/forwarding" TEST_PROGS=vxlan__bridge_1d_port_8472_ipv6.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # overriding timeout to 21600 # selftests: net/forwarding: vxlan_bridge_1d_port_8472_ipv6.sh # 27.34 [+27.34] INFO: Running tests with UDP port 8472 # 28.63 [+1.29] TEST: ping: local->local [ OK ] # 40.34 [+11.71] TEST: ping: local->remote 1 [ OK ] # 52.02 [+11.68] TEST: ping: local->remote 2 [ OK ] # 53.77 [+1.75] TEST: ping6: local->local [ OK ] # 65.27 [+11.50] TEST: ping6: local->remote 1 [ OK ] # 77.12 [+11.85] TEST: ping6: local->remote 2 [ OK ] ok 1 selftests: net/forwarding: vxlan_bridge_1d_port_8472_ipv6.sh make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800a241040 (size 64): comm "ip", pid 327, jiffies 4294688472 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 udp_sock_create6+0xc5/0x6c0 [ip6_udp_tunnel] vxlan_create_sock+0x1a7/0x1d0 [vxlan] vxlan_socket_create+0xfe/0x510 [vxlan] __vxlan_sock_add+0x3c5/0xa60 [vxlan] vxlan_open+0xc3/0x240 [vxlan] __dev_open+0x220/0x590 __dev_change_flags+0x460/0x6c0 netif_change_flags+0x80/0x160 do_setlink.constprop.0+0x97c/0x2460 rtnl_newlink+0x693/0xa60 rtnetlink_rcv_msg+0x709/0xc00 netlink_rcv_skb+0x121/0x340 unreferenced object 0xffff888002746b40 (size 64): comm "ip", pid 380, jiffies 4294694027 hex dump (first 32 bytes): 00 00 00 00 00 00 00 0 DETECTED CRASH, lowering timeout 0 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 udp_sock_create6+0xc5/0x6c0 [ip6_udp_tunnel] vxlan_create_sock+0x1a7/0x1d0 [vxlan] vxlan_socket_create+0xfe/0x510 [vxlan] __vxlan_sock_add+0x3c5/0xa60 [vxlan] vxlan_open+0xc3/0x240 [vxlan] __dev_open+0x220/0x590 __dev_change_flags+0x460/0x6c0 netif_change_flags+0x80/0x160 do_setlink.constprop.0+0x97c/0x2460 rtnl_newlink+0x693/0xa60 rtnetlink_rcv_msg+0x709/0xc00 netlink_rcv_skb+0x121/0x340 unreferenced object 0xffff88800a05d340 (size 64): comm "ip", pid 419, jiffies 4294698043 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 udp_sock_create6+0xc5/0x6c0 [ip6_udp_tunnel] vxlan_create_sock+0x1a7/0x1d0 [vxlan] vxlan_socket_create+0xfe/0x510 [vxlan] __vxlan_sock_add+0x3c5/0xa60 [vxlan] vxlan_open+0xc3/0x240 [vxlan] __dev_open+0x220/0x590 __dev_change_flags+0x460/0x6c0 netif_change_flags+0x80/0x160 do_setlink.constprop.0+0x97c/0x2460 rtnl_newlink+0x693/0xa60 rtnetlink_rcv_msg+0x709/0xc00 netlink_rcv_skb+0x121/0x340 unreferenced object 0xffff88800e4cca40 (size 64): comm "ping6", pid 545, jiffies 4294733180 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800a698040 (size 64): comm "ping6", pid 552, jiffies 4294734878 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 xx__->