make -C tools/testing/selftests TARGETS="net" TEST_PROGS=vrf-xfrm-tests.shh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing/wt-3/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing/wt-3/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-3/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing/wt-3/tools/testing/selftests/net/lib' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-3/tools/testing/selftests/net/lib' make[1]: Entering directory '/home/virtme/testing/wt-3/tools/testing/selftests/net' TAP version 13 1..1 # overriding timeout to 7200 # selftests: net: vrf-xfrm-tests.sh # 5.81 [+5.81] # 5.81 [+0.00] No qdisc on VRF device # 7.09 [+1.28] TEST: IPv4 no xfrm policy [ OK ] # 7.41 [+0.32] TEST: IPv6 no xfrm policy [ OK ] # 10.48 [+3.08] TEST: IPv4 xfrm policy based on address [ OK ] # 10.78 [+0.30] TEST: IPv6 xfrm policy based on address [ OK ] # 11.97 [+1.19] TEST: IPv6 xfrm policy with VRF in selector [ OK ] # 15.64 [+3.67] TEST: IPv4 xfrm policy with xfrm device [ OK ] # 15.94 [+0.30] TEST: IPv6 xfrm policy with xfrm device [ OK ] # 16.58 [+0.64] # 16.59 [+0.00] netem qdisc on VRF device # 17.87 [+1.29] TEST: IPv4 no xfrm policy [ OK ] # 18.30 [+0.42] TEST: IPv6 no xfrm policy [ OK ] # 20.48 [+2.18] TEST: IPv4 xfrm policy based on address [ OK ] # 20.89 [+0.41] TEST: IPv6 xfrm policy based on address [ OK ] # 22.20 [+1.31] TEST: IPv6 xfrm policy with VRF in selector [ OK ] # 25.95 [+3.75] TEST: IPv4 xfrm policy with xfrm device [ OK ] # 26.36 [+0.41] TEST: IPv6 xfrm policy with xfrm device [ OK ] # 26.73 [+0.37] # 26.73 [+0.00] Tests passed: 14 # 26.73 [+0.00] Tests failed: 0 ok 1 selftests: net: vrf-xfrm-tests.sh make[1]: Leaving directory '/home/virtme/testing/wt-3/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing/wt-3/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800a59ef40 (size 64): comm "ping6", pid 317, jiffies 4294687445 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800bb15540 (size 64): comm "ping6", pid 353, jiffies 4294690822 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 DETECTED CRASH, lowering timeout __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800c987140 (size 64): comm "ping6", pid 364, jiffies 4294692014 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800af0d040 (size 64): comm "ping6", pid 400, jiffies 4294695986 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800b89c040 (size 64): comm "ping6", pid 418, jiffies 4294698238 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888001938540 (size 64): comm "ping6", pid 438, jiffies 4294700830 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800bc97a40 (size 64): comm "ping6", pid 448, jiffies 4294702141 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 xx__->