make -C tools/testing/selftests TARGETS="net/forwarding" TEST_PROGS=vxlan__bridge_1q_ipv6.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # overriding timeout to 21600 # selftests: net/forwarding: vxlan_bridge_1q_ipv6.sh # 32.87 [+32.87] INFO: Running tests with UDP port 4789 # 34.18 [+1.30] TEST: ping: local->local vid 10 [ OK ] # 35.49 [+1.32] TEST: ping: local->local vid 20 [ OK ] # 47.14 [+11.65] TEST: ping: local->remote 1 vid 10 [ OK ] # 58.73 [+11.59] TEST: ping: local->remote 2 vid 10 [ OK ] # 70.25 [+11.52] TEST: ping: local->remote 1 vid 20 [ OK ] # 81.90 [+11.65] TEST: ping: local->remote 2 vid 20 [ OK ] # 83.63 [+1.72] TEST: ping6: local->local vid 10 [ OK ] # 84.93 [+1.31] TEST: ping6: local->local vid 20 [ OK ] # 96.36 [+11.43] TEST: ping6: local->remote 1 vid 10 [ OK ] # 107.83 [+11.48] TEST: ping6: local->remote 2 vid 10 [ OK ] # 119.62 [+11.79] TEST: ping6: local->remote 1 vid 20 [ OK ] # 131.40 [+11.78] TEST: ping6: local->remote 2 vid 20 [ OK ] # 153.32 [+21.92] TEST: VXLAN: flood vlan 10 [ OK ] # 174.22 [+20.90] TEST: VXLAN: flood vlan 20 [ OK ] # 174.34 [+0.12] INFO: unicast vlan 10 # 195.43 [+21.09] TEST: VXLAN: local MAC unicast [ OK ] # 216.42 [+20.99] TEST: VXLAN: remote MAC 1 unicast [ OK ] # 237.02 [+20.60] TEST: VXLAN: remote MAC 2 unicast [ OK ] # 237.71 [+0.69] INFO: unicast vlan 20 # 260.35 [+22.64] TEST: VXLAN: local MAC unicast [ OK ] # 281.50 [+21.15] TEST: VXLAN: remote MAC 1 unicast [ OK ] # 302.37 [+20.87] TEST: VXLAN: remote MAC 2 unicast [ OK ] # 303.15 [+0.79] INFO: Reapplying configuration # 316.92 [+13.77] TEST: ping: local->local vid 10 [ OK ] # 318.24 [+1.31] TEST: ping: local->local vid 20 [ OK ] # 329.65 [+11.42] TEST: ping: local->remote 1 vid 10 [ OK ] # 341.14 [+11.49] TEST: ping: local->remote 2 vid 10 [ OK ] # 352.59 [+11.44] TEST: ping: local->remote 1 vid 20 [ OK ] # 364.34 [+11.75] TEST: ping: local->remote 2 vid 20 [ OK ] # 366.07 [+1.73] TEST: ping6: local->local vid 10 [ OK ] # 367.41 [+1.34] TEST: ping6: local->local vid 20 [ OK ] # 378.79 [+11.39] TEST: ping6: local->remote 1 vid 10 [ OK ] # 390.30 [+11.50] TEST: ping6: local->remote 2 vid 10 [ OK ] # 401.95 [+11.65] TEST: ping6: local->remote 1 vid 20 [ OK ] # 413.58 [+11.62] TEST: ping6: local->remote 2 vid 20 [ OK ] # 435.87 [+22.30] TEST: VXLAN: flood vlan 10 [ OK ] # 458.16 [+22.29] TEST: VXLAN: flood vlan 20 [ OK ] # 458.27 [+0.11] INFO: unicast vlan 10 # 480.69 [+22.42] TEST: VXLAN: local MAC unicast [ OK ] # 502.33 [+21.63] TEST: VXLAN: remote MAC 1 unicast [ OK ] # 524.02 [+21.70] TEST: VXLAN: remote MAC 2 unicast [ OK ] # 524.73 [+0.71] INFO: unicast vlan 20 # 547.77 [+23.04] TEST: VXLAN: local MAC unicast [ OK ] # 569.17 [+21.40] TEST: VXLAN: remote MAC 1 unicast [ OK ] # 591.30 [+22.13] TEST: VXLAN: remote MAC 2 unicast [ OK ] # 614.11 [+22.82] TEST: VXLAN: flood before pvid off [ OK ] # 636.01 [+21.90] TEST: VXLAN: flood after pvid off [ OK ] # 657.80 [+21.79] TEST: VXLAN: flood after pvid on [ OK ] # 679.67 [+21.87] TEST: VXLAN: flood after vlan add [ OK ] # 701.24 [+21.57] TEST: VXLAN: flood after vlan delete [ OK ] # 723.10 [+21.86] TEST: VXLAN: flood after vlan re-add [ OK ] # 724.52 [+1.42] TEST: ping: local->local vid 10 [ OK ] # 725.84 [+1.32] TEST: ping: local->local vid 20 [ OK ] # 737.21 [+11.37] TEST: ping: local->remote 1 vid 10 [ OK ] # 748.77 [+11.56] TEST: ping: local->remote 2 vid 10 [ OK ] # 760.41 [+11.64] TEST: ping: local->remote 1 vid 20 [ OK ] # 771.89 [+11.48] TEST: ping: local->remote 2 vid 20 [ OK ] # 773.60 [+1.71] TEST: ping6: local->local vid 10 [ OK ] # 774.90 [+1.30] TEST: ping6: local->local vid 20 [ OK ] # 786.18 [+11.28] TEST: ping6: local->remote 1 vid 10 [ OK ] # 797.89 [+11.71] TEST: ping6: local->remote 2 vid 10 [ OK ] # 809.52 [+11.62] TEST: ping6: local->remote 1 vid 20 [ OK ] # 821.11 [+11.59] TEST: ping6: local->remote 2 vid 20 [ OK ] # 843.47 [+22.36] TEST: VXLAN: flood vlan 10 [ OK ] # 864.51 [+21.04] TEST: VXLAN: flood vlan 20 [ OK ] # 885.29 [+20.78] TEST: VXLAN: flood before pvid off [ OK ] # 905.74 [+20.44] TEST: VXLAN: flood after pvid off [ OK ] # 926.56 [+20.82] TEST: VXLAN: flood after pvid on [ OK ] # 947.17 [+20.61] TEST: VXLAN: flood after vlan add [ OK ] # 967.80 [+20.62] TEST: VXLAN: flood after vlan delete [ OK ] # 988.13 [+20.33] TEST: VXLAN: flood after vlan re-add [ OK ] ok 1 selftests: net/forwarding: vxlan_bridge_1q_ipv6.sh make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800972dd40 (size 64): comm "ip", pid 736, jiffies 4294748866 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 udp_sock_create6+0xc5/0x6c0 [ip6_udp_tunnel] vxlan_create_sock+0x1a7/0x1d0 [vxlan] vxlan_socket_create+0xfe/0x510 [vxlan] __vxlan_sock_add+0x3c5/0xa60 [vxlan] vxlan_open+0xc3/0x240 [vxlan] __dev_open+0x220/0x590 __dev_change_flags+0x460/0x6c0 netif_change_flags+0x80/0x160 do_setlink.constprop.0+0x97c/0x2460 rtnl_newlink+0x693/0xa60 rtnetlink_rcv_msg+0x709/0xc00 netlink_rcv_skb+0x121/0x340 unreferenced object 0xffff888009caec40 (size 64): comm "ip", pid 813, jiffies 4294755855 hex dump (first 32 bytes): 00 00 00 00 00 00 00 0 DETECTED CRASH, lowering timeout 0 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 udp_sock_create6+0xc5/0x6c0 [ip6_udp_tunnel] vxlan_create_sock+0x1a7/0x1d0 [vxlan] vxlan_socket_create+0xfe/0x510 [vxlan] __vxlan_sock_add+0x3c5/0xa60 [vxlan] vxlan_open+0xc3/0x240 [vxlan] __dev_open+0x220/0x590 __dev_change_flags+0x460/0x6c0 netif_change_flags+0x80/0x160 do_setlink.constprop.0+0x97c/0x2460 rtnl_newlink+0x693/0xa60 rtnetlink_rcv_msg+0x709/0xc00 netlink_rcv_skb+0x121/0x340 unreferenced object 0xffff88800a044140 (size 64): comm "ip", pid 870, jiffies 4294762155 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 udp_sock_create6+0xc5/0x6c0 [ip6_udp_tunnel] vxlan_create_sock+0x1a7/0x1d0 [vxlan] vxlan_socket_create+0xfe/0x510 [vxlan] __vxlan_sock_add+0x3c5/0xa60 [vxlan] vxlan_open+0xc3/0x240 [vxlan] __dev_open+0x220/0x590 __dev_change_flags+0x460/0x6c0 netif_change_flags+0x80/0x160 do_setlink.constprop.0+0x97c/0x2460 rtnl_newlink+0x693/0xa60 rtnetlink_rcv_msg+0x709/0xc00 netlink_rcv_skb+0x121/0x340 unreferenced object 0xffff88800e9cad40 (size 64): comm "ping6", pid 1056, jiffies 4294823541 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880082b2240 (size 64): comm "ping6", pid 1061, jiffies 4294824852 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800c675440 (size 64): comm "ping6", pid 1087, jiffies 4294838226 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800835c840 (size 64): comm "ping6", pid 1106, jiffies 4294849695 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888008bea840 (size 64): comm "ping6", pid 1125, jiffies 4294861524 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888001c9fc40 (size 64): comm "ping6", pid 3770, jiffies 4295105985 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800fc7c340 (size 64): comm "ping6", pid 3775, jiffies 4295107316 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888008d8a440 (size 64): comm "ping6", pid 3782, jiffies 4295108882 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800ece6340 (size 64): comm "ping6", pid 3801, jiffies 4295120635 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888005884040 (size 64): comm "ping6", pid 3820, jiffies 4295132182 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800ec4c640 (size 64): comm "ping6", pid 3839, jiffies 4295143820 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888001c9fd40 (size 64): comm "ping6", pid 8310, jiffies 4295513510 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880100c6c40 (size 64): comm "ping6", pid 8315, jiffies 4295514813 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880082b1140 (size 64): comm "ping6", pid 8322, jiffies 4295516504 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888008c81e40 (size 64): comm "ping6", pid 8341, jiffies 4295528035 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800eb1d640 (size 64): comm "ping6", pid 8360, jiffies 4295539826 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888008338b40 (size 64): comm "ping6", pid 8379, jiffies 4295551374 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 xx__->