make -C tools/testing/selftests TARGETS="net" TEST_PROGS=vrf-xfrm-tests.shh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing/wt-3/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing/wt-3/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-3/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing/wt-3/tools/testing/selftests/net/lib' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-3/tools/testing/selftests/net/lib' make[1]: Entering directory '/home/virtme/testing/wt-3/tools/testing/selftests/net' TAP version 13 1..1 # overriding timeout to 7200 # selftests: net: vrf-xfrm-tests.sh # 6.13 [+6.13] # 6.13 [+0.00] No qdisc on VRF device # 7.75 [+1.62] TEST: IPv4 no xfrm policy [ OK ] # 8.07 [+0.32] TEST: IPv6 no xfrm policy [ OK ] # 11.23 [+3.16] TEST: IPv4 xfrm policy based on address [ OK ] # 11.54 [+0.31] TEST: IPv6 xfrm policy based on address [ OK ] # 12.71 [+1.16] TEST: IPv6 xfrm policy with VRF in selector [ OK ] # 16.50 [+3.80] TEST: IPv4 xfrm policy with xfrm device [ OK ] # 16.80 [+0.30] TEST: IPv6 xfrm policy with xfrm device [ OK ] # 17.42 [+0.62] # 17.42 [+0.00] netem qdisc on VRF device # 18.74 [+1.31] TEST: IPv4 no xfrm policy [ OK ] # 19.16 [+0.42] TEST: IPv6 no xfrm policy [ OK ] # 21.40 [+2.24] TEST: IPv4 xfrm policy based on address [ OK ] # 21.84 [+0.44] TEST: IPv6 xfrm policy based on address [ OK ] # 23.18 [+1.34] TEST: IPv6 xfrm policy with VRF in selector [ OK ] # 27.04 [+3.86] TEST: IPv4 xfrm policy with xfrm device [ OK ] # 27.44 [+0.40] TEST: IPv6 xfrm policy with xfrm device [ OK ] # 27.80 [+0.36] # 27.81 [+0.00] Tests passed: 14 # 27.81 [+0.00] Tests failed: 0 ok 1 selftests: net: vrf-xfrm-tests.sh make[1]: Leaving directory '/home/virtme/testing/wt-3/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing/wt-3/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800ab5c240 (size 64): comm "ping6", pid 316, jiffies 4294688574 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800b8f9d40 (size 64): comm "ping6", pid 352, jiffies 4294692040 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 DETECTED CRASH, lowering timeout __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800b42a040 (size 64): comm "ping6", pid 362, jiffies 4294693210 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800c926040 (size 64): comm "ping6", pid 398, jiffies 4294697301 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880059c1d40 (size 64): comm "ping6", pid 416, jiffies 4294699566 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800550f340 (size 64): comm "ping6", pid 436, jiffies 4294702245 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800a8ce440 (size 64): comm "ping6", pid 447, jiffies 4294703586 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 xx__->