make -C tools/testing/selftests TARGETS="net/netfilter" TEST_PROGS=nft_queeue.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing/wt-16/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing/wt-16/tools/testing/selftests/net/netfilter' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing/wt-16/tools/testing/selftests/net/netfilter' make[1]: Entering directory '/home/virtme/testing/wt-16/tools/testing/selftests/net/netfilter' TAP version 13 1..1 # overriding timeout to 3600 # selftests: net/netfilter: nft_queue.sh # PASS: ns1-qiu2dP can reach ns2-JykTWB # PASS: ip: statement with no listener results in packet drop # PASS: ip6: statement with no listener results in packet drop # PASS: Expected and received 10 packets total # PASS: Expected and received 20 packets total # PASS: tcp and nfqueue in forward chain (duration: 1s) # PASS: tcp via loopback (duration: 1s) # PASS: tcp via loopback with connect/close # PASS: tcp via loopback and re-queueing # PASS: sctp and nfqueue in forward chain (duration: 16s) # PASS: sctp and nfqueue in output chain with GSO (duration: 8s) # PASS: both udp receivers got one packet each # PASS: icmp+nfqueue via vrf # PASS: queue program exiting while packets queued ok 1 selftests: net/netfilter: nft_queue.sh make[1]: Leaving directory '/home/virtme/testing/wt-16/tools/testing/selftests/net/netfilter' make: Leaving directory '/home/virtme/testing/wt-16/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88801aacd540 (size 64): comm "ping", pid 5206, jiffies 4294959042 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880128f5f40 (size 64): comm "ping", pid 5211, jiffies 4294962426 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 DETECTED CRASH, lowering timeout __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888008e1f140 (size 64): comm "ping", pid 5234, jiffies 4294966524 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff88800805bc40 (size 64): comm "ping", pid 5236, jiffies 4294966984 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff8880090be040 (size 64): comm "ping", pid 5251, jiffies 4294974114 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 unreferenced object 0xffff888018e87840 (size 64): comm "ping", pid 5253, jiffies 4294974644 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): __kmalloc_noprof+0x32b/0x460 udpv6_init_sock+0x237/0x410 inet6_create.part.0+0x989/0x10b0 __sock_create+0x235/0x690 __sys_socket+0x116/0x1d0 __x64_sys_socket+0x72/0xb0 do_syscall_64+0xc1/0x300 entry_SYSCALL_64_after_hwframe+0x4b/0x53 xx__->