make -C tools/testing/selftests TARGETS="net/forwarding" TEST_PROGS=routerr_bridge_1d.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # overriding timeout to 21600 # selftests: net/forwarding: router_bridge_1d.sh # 17.84 [+17.84] TEST: ping: via 100 [ OK ] # 19.19 [+1.35] TEST: ping: via 200 [ OK ] # 20.63 [+1.45] TEST: ping6: via 100 [ OK ] # 21.97 [+1.33] TEST: ping6: via 200 [ OK ] # 22.09 [+0.13] INFO: Remaster bridge slaves # 26.04 [+3.95] TEST: ping: via 100 [ OK ] # 27.33 [+1.29] TEST: ping: via 200 [ OK ] # 28.76 [+1.43] TEST: ping6: via 100 [ OK ] # 30.10 [+1.33] TEST: ping6: via 200 [ OK ] ok 1 selftests: net/forwarding: router_bridge_1d.sh make[1]: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing/wt-4/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff888002867e40 (size 64): comm "ping6", pid 390, jiffies 4294700138 hex dump (first 32 bytes): DETECTED CRASH, lowering timeout 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800767da40 (size 64): comm "ping6", pid 395, jiffies 4294701461 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888004df8440 (size 64): comm "ping6", pid 439, jiffies 4294708260 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888004ac4340 (size 64): comm "ping6", pid 444, jiffies 4294709603 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 xx__->