make -C tools/testing/selftests TARGETS=net/forwarding TEST_PROGS=pedit_l44port.sh TEST_GEN_PROGS="" run_tests
make: Entering directory '/home/virtme/testing-4/tools/testing/selftests'
make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding'
make[1]: Nothing to be done for 'all'.
make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding'
make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding'
TAP version 13
1..1
# overriding timeout to 21600
# selftests: net/forwarding: pedit_l4port.sh
[ 26.939296][ T288] br1: port 1(veth1) entered blocking state
[ 26.939776][ T288] br1: port 1(veth1) entered disabled state
[ 26.940241][ T288] veth1: entered allmulticast mode
[ 26.942373][ T288] veth1: entered promiscuous mode
[ 27.123321][ T47] br1: port 1(veth1) entered blocking state
[ 27.123735][ T47] br1: port 1(veth1) entered forwarding state
[ 27.274658][ T291] br1: port 2(veth2) entered blocking state
[ 27.275006][ T291] br1: port 2(veth2) entered disabled state
[ 27.275354][ T291] veth2: entered allmulticast mode
[ 27.277989][ T291] veth2: entered promiscuous mode
[ 27.427204][ T47] br1: port 2(veth2) entered blocking state
[ 27.427573][ T47] br1: port 2(veth2) entered forwarding state
[ 27.432073][ C0] ------------[ cut here ]------------
[ 27.432496][ C0] UBSAN: invalid-load in ./include/linux/skbuff.h:4267:9
[ 27.432901][ C0] load of value 107 is not a valid value for type '_Bool'
[ 27.433310][ C0] CPU: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.8.0-rc4-virtme #1
[ 27.433731][ C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 27.434356][ C0] Workqueue: mld mld_ifc_work
[ 27.434610][ C0] Call Trace:
[ 27.434788][ C0]
[ 27.434941][ C0] dump_stack_lvl+0x92/0xb0
[ 27.435187][ C0] __ubsan_handle_load_invalid_value+0xa7/0xe0
[ 27.435519][ C0] br_forward_finish.cold+0xf/0x3c [bridge]
[ 27.435904][ C0] deliver_clone+0x52/0x90 [bridge]
[ 27.436215][ C0] br_handle_frame_finish+0xbdd/0x1ce0 [bridge]
[ 27.436
DETECTED CRASH, lowering timeout
583][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [bridge]
[ 27.436966][ C0] ? __pfx_validate_chain+0x10/0x10
[ 27.437244][ C0] ? mark_lock+0x38/0x3e0
[ 27.437472][ C0] ? kasan_save_stack+0x24/0x50
[ 27.437737][ C0] ? __lock_acquire+0xb67/0x1610
[ 27.437999][ C0] ? __pfx_nf_ingress+0x10/0x10
[ 27.438266][ C0] br_handle_frame+0x612/0xe70 [bridge]
[ 27.438594][ C0] ? __pfx_br_handle_frame+0x10/0x10 [bridge]
[ 27.438950][ C0] __netif_receive_skb_core.constprop.0+0x783/0x2dc0
[ 27.439303][ C0] ? mark_lock+0x38/0x3e0
[ 27.439539][ C0] ? __lock_acquire+0xb67/0x1610
[ 27.439809][ C0] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10
[ 27.440188][ C0] ? lock_acquire.part.0+0xe5/0x330
[ 27.440460][ C0] ? process_backlog+0x1ed/0x5e0
[ 27.440727][ C0] __netif_receive_skb_one_core+0xaf/0x1b0
[ 27.441040][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10
[ 27.441379][ C0] ? lock_acquire+0x1c1/0x220
[ 27.441625][ C0] ? process_backlog+0x1ed/0x5e0
[ 27.441891][ C0] process_backlog+0xd3/0x5e0
[ 27.442148][ C0] __napi_poll.constprop.0+0xa2/0x460
[ 27.442436][ C0] net_rx_action+0x440/0xb40
[ 27.442692][ C0] ? __pfx_net_rx_action+0x10/0x10
[ 27.442965][ C0] ? hlock_class+0x20/0x130
[ 27.443213][ C0] ? mark_held_locks+0xa5/0xf0
[ 27.443472][ C0] __do_softirq+0x1b9/0x7ff
[ 27.443717][ C0] ? __dev_queue_xmit+0x6cd/0x17e0
[ 27.443989][ C0] do_softirq+0x4d/0xa0
[ 27.444214][ C0]
[ 27.444371][ C0]
[ 27.444528][ C0] __local_bh_enable_ip+0xf6/0x120
[ 27.444801][ C0] ? __dev_queue_xmit+0x6cd/0x17e0
[ 27.445070][ C0] __dev_queue_xmit+0x6e2/0x17e0
[ 27.445335][ C0] ? mark_held_locks+0xa5/0xf0
[ 27.445590][ C0] ? lockdep_hardirqs_on_prepare.part.0+0x1b1/0x370
[ 27.445935][ C0] ? __pfx___dev_queue_xmit+0x10/0x10
[ 27.446217][ C0] ? neigh_hh_output+0x348/0x590
[ 27.446492][ C0] ip6_finish_output2+0x534/0xf80
[ 27.446767][ C0] ip6_finish_output+0x4ed/0xd30
[ 27.447035][ C0] ip6_output+0x1f3/0x770
[ 27.447268][ C0] ? __pfx_ip6_output+0x10/0x10
[ 27.447526][ C0] ? lock_acquire.part.0+0xe5/0x330
[ 27.447804][ C0] ? hlock_class+0x4e/0x130
[ 27.448046][ C0] ? __lock_release+0x40f/0x880
[ 27.448309][ C0] NF_HOOK.constprop.0+0xe2/0x680
[ 27.448576][ C0] ? __pfx_NF_HOOK.constprop.0+0x10/0x10
[ 27.448872][ C0] ? __pfx_xfrm_lookup_with_ifid+0x10/0x10
[ 27.449182][ C0] ? lockdep_hardirqs_on_prepare.part.0+0x1b1/0x370
[ 27.449526][ C0] ? icmp6_dst_alloc+0x2c0/0x450
[ 27.449794][ C0] ? __local_bh_enable_ip+0xa6/0x120
[ 27.450077][ C0] mld_sendpack+0x62c/0xbc0
[ 27.450324][ C0] ? __pfx_mld_sendpack+0x10/0x10
[ 27.450601][ C0] ? mld_send_cr+0x3a1/0x780
[ 27.450854][ C0] mld_ifc_work+0x36/0x200
[ 27.451094][ C0] process_one_work+0x78c/0x1310
[ 27.451365][ C0] ? hlock_class+0x4e/0x130
[ 27.451604][ C0] ? __pfx_process_one_work+0x10/0x10
[ 27.451898][ C0] ? assign_work+0x16c/0x240
[ 27.452146][ C0] worker_thread+0x73d/0x1010
[ 27.452410][ C0] ? __pfx_worker_thread+0x10/0x10
[ 27.452680][ C0] kthread+0x28f/0x360
[ 27.452896][ C0] ? __pfx_kthread+0x10/0x10
[ 27.453142][ C0] ret_from_fork+0x31/0x70
[ 27.453379][ C0] ? __pfx_kthread+0x10/0x10
[ 27.453622][ C0] ret_from_fork_asm+0x1b/0x30
[ 27.453893][ C0]
[ 27.454113][ C0] ---[ end trace ]---
# TEST: ping [ OK ]
[ 36.104385][ T319] GACT probability NOT on
# TEST: dev veth1 ingress pedit udp sport set 1 [ OK ]
# TEST: dev veth1 ingress pedit udp sport set 11111 [ OK ]
[ 39.755208][ C0] tc action pedit unable to extract header offset for header type (0x5)
[ 39.755490][ C2] tc action pedit unable to extract header offset for header type (0x5)
# TEST: dev veth1 ingress pedit udp sport set 65535 [ OK ]
[ 41.290573][ C0] tc action pedit unable to extract header offset for header type (0x5)
# TEST: dev veth2 egress pedit udp sport set 1 [ OK ]
# TEST: dev veth2 egress pedit udp sport set 11111 [ OK ]
# TEST: dev veth2 egress pedit udp sport set 65535 [ OK ]
# TEST: dev veth1 ingress pedit udp dport set 1 [ OK ]
# TEST: dev veth1 ingress pedit udp dport set 11111 [ OK ]
# TEST: dev veth1 ingress pedit udp dport set 65535 [ OK ]
# TEST: dev veth2 egress pedit udp dport set 1 [ OK ]
# TEST: dev veth2 egress pedit udp dport set 11111 [ OK ]
# TEST: dev veth2 egress pedit udp dport set 65535 [ OK ]
[ 55.114970][ C0] tc action pedit unable to extract header offset for header type (0x4)
# TEST: dev veth1 ingress pedit tcp sport set 1 [ OK ]
# TEST: dev veth1 ingress pedit tcp sport set 11111 [ OK ]
# TEST: dev veth1 ingress pedit tcp sport set 65535 [ OK ]
# TEST: dev veth2 egress pedit tcp sport set 1 [ OK ]
# TEST: dev veth2 egress pedit tcp sport set 11111 [ OK ]
# TEST: dev veth2 egress pedit tcp sport set 65535 [ OK ]
# TEST: dev veth1 ingress pedit tcp dport set 1 [ OK ]
# TEST: dev veth1 ingress pedit tcp dport set 11111 [ OK ]
# TEST: dev veth1 ingress pedit tcp dport set 65535 [ OK ]
# TEST: dev veth2 egress pedit tcp dport set 1 [ OK ]
# TEST: dev veth2 egress pedit tcp dport set 11111 [ OK ]
# TEST: dev veth2 egress pedit tcp dport set 65535 [ OK ]
[ 74.862143][ T656] br1: port 2(veth2) entered disabled state
[ 75.025078][ T657] veth2: left allmulticast mode
[ 75.025386][ T657] veth2: left promiscuous mode
[ 75.025939][ T657] br1: port 2(veth2) entered disabled state
[ 75.230940][ T658] br1: port 1(veth1) entered disabled state
[ 75.402384][ T659] veth1: left allmulticast mode
[ 75.402847][ T659] veth1: left promiscuous mode
[ 75.403468][ T659] br1: port 1(veth1) entered disabled state
ok 1 selftests: net/forwarding: pedit_l4port.sh
make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding'
make: Leaving directory '/home/virtme/testing-4/tools/testing/selftests'
xx__-> echo $?
0
xx__->