make -C tools/testing/selftests TARGETS="net/openvswitch" TEST_PROGS=openvvswitch.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-3/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-3/tools/testing/selftests/net/openvswitch' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-3/tools/testing/selftests/net/openvswitch' make[1]: Entering directory '/home/virtme/testing-3/tools/testing/selftests/net/openvswitch' TAP version 13 1..1 # overriding timeout to 7200 # selftests: net/openvswitch: openvswitch.sh # TEST: arp_ping [START] # TEST: eth-arp: Basic arp ping between two NS [ OK ] # TEST: ct_connect_v4 [START] # Ncat: Version 7.93 ( https://nmap.org/ncat ) # Ncat: Connected to 172.31.110.20:4443. # Ncat: 0 bytes sent, 0 bytes received in 0.07 seconds. # Ncat: Version 7.93 ( https://nmap.org/ncat ) # Ncat: TIMEOUT. # TEST: ip4-ct-xon: Basic ipv4 tcp connection using ct [ OK ] # TEST: connect_v4 [START] # TEST: ip4-xon: Basic ipv4 ping between two NS [ OK ] # TEST: nat_connect_v4 [START] # Ncat: Version 7.93 ( https://nmap.org/ncat ) # Ncat: Connected to 192.168.0.20:4443. # Ncat: 0 bytes sent, 0 bytes received in 0.07 seconds. # Ncat: Version 7.93 ( https://nmap.org/ncat ) # Ncat: TIMEOUT. # TEST: ip4-nat-xon: Basic ipv4 tcp connection via NAT [ OK ] # TEST: nat_related_v4 [START] # Ncat: Connection refused. # TEST: ip4-nat-related: ICMP related matches work with SNAT [ OK ] # TEST: netlink_checks [START] # TEST: ovsnl: validate netlink attrs and settings [ OK ] # TEST: upcall_interfaces [START] # TEST: ovs: test the upcall interfaces [ OK ] # TEST: drop_reason [START] # TEST: drop: test drop reasons are emitted [ OK ] # TEST: psample [START] # TEST: psample: Sampling packets with psample [ OK ] ok 1 selftests: net/openvswitch: openvswitch.sh make[1]: Leaving directory '/home/virtme/testing-3/tools/testing/selftests/net/openvswitch' make: Leaving directory '/home/virtme/testing-3/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0x00042d20 (size 64): comm "swapper/0", pid 0, jiffies 4294667296 hex dump (first 32 bytes on cpu 2): 00 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): pcpu_alloc_noprof+0x4ad/0xab0 setup_zone_pageset+0x30/0x290 setup_per_cpu_pageset+0x6a/0x1f0 start_kernel+0x2a4/0x410 x86_64_start_reservations+0x18/0x30 x86_64_start_kernel+0xba/0x110 common_startup_64+0x12c/0x138 xx__->