make -C tools/testing/selftests TARGETS=net/forwarding TEST_PROGS=pedit_l44port.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-4/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # overriding timeout to 21600 # selftests: net/forwarding: pedit_l4port.sh [ 26.939296][ T288] br1: port 1(veth1) entered blocking state [ 26.939776][ T288] br1: port 1(veth1) entered disabled state [ 26.940241][ T288] veth1: entered allmulticast mode [ 26.942373][ T288] veth1: entered promiscuous mode [ 27.123321][ T47] br1: port 1(veth1) entered blocking state [ 27.123735][ T47] br1: port 1(veth1) entered forwarding state [ 27.274658][ T291] br1: port 2(veth2) entered blocking state [ 27.275006][ T291] br1: port 2(veth2) entered disabled state [ 27.275354][ T291] veth2: entered allmulticast mode [ 27.277989][ T291] veth2: entered promiscuous mode [ 27.427204][ T47] br1: port 2(veth2) entered blocking state [ 27.427573][ T47] br1: port 2(veth2) entered forwarding state [ 27.432073][ C0] ------------[ cut here ]------------ [ 27.432496][ C0] UBSAN: invalid-load in ./include/linux/skbuff.h:4267:9 [ 27.432901][ C0] load of value 107 is not a valid value for type '_Bool' [ 27.433310][ C0] CPU: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.8.0-rc4-virtme #1 [ 27.433731][ C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 27.434356][ C0] Workqueue: mld mld_ifc_work [ 27.434610][ C0] Call Trace: [ 27.434788][ C0] [ 27.434941][ C0] dump_stack_lvl+0x92/0xb0 [ 27.435187][ C0] __ubsan_handle_load_invalid_value+0xa7/0xe0 [ 27.435519][ C0] br_forward_finish.cold+0xf/0x3c [bridge] [ 27.435904][ C0] deliver_clone+0x52/0x90 [bridge] [ 27.436215][ C0] br_handle_frame_finish+0xbdd/0x1ce0 [bridge] [ 27.436 DETECTED CRASH, lowering timeout 583][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [bridge] [ 27.436966][ C0] ? __pfx_validate_chain+0x10/0x10 [ 27.437244][ C0] ? mark_lock+0x38/0x3e0 [ 27.437472][ C0] ? kasan_save_stack+0x24/0x50 [ 27.437737][ C0] ? __lock_acquire+0xb67/0x1610 [ 27.437999][ C0] ? __pfx_nf_ingress+0x10/0x10 [ 27.438266][ C0] br_handle_frame+0x612/0xe70 [bridge] [ 27.438594][ C0] ? __pfx_br_handle_frame+0x10/0x10 [bridge] [ 27.438950][ C0] __netif_receive_skb_core.constprop.0+0x783/0x2dc0 [ 27.439303][ C0] ? mark_lock+0x38/0x3e0 [ 27.439539][ C0] ? __lock_acquire+0xb67/0x1610 [ 27.439809][ C0] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 27.440188][ C0] ? lock_acquire.part.0+0xe5/0x330 [ 27.440460][ C0] ? process_backlog+0x1ed/0x5e0 [ 27.440727][ C0] __netif_receive_skb_one_core+0xaf/0x1b0 [ 27.441040][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 27.441379][ C0] ? lock_acquire+0x1c1/0x220 [ 27.441625][ C0] ? process_backlog+0x1ed/0x5e0 [ 27.441891][ C0] process_backlog+0xd3/0x5e0 [ 27.442148][ C0] __napi_poll.constprop.0+0xa2/0x460 [ 27.442436][ C0] net_rx_action+0x440/0xb40 [ 27.442692][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 27.442965][ C0] ? hlock_class+0x20/0x130 [ 27.443213][ C0] ? mark_held_locks+0xa5/0xf0 [ 27.443472][ C0] __do_softirq+0x1b9/0x7ff [ 27.443717][ C0] ? __dev_queue_xmit+0x6cd/0x17e0 [ 27.443989][ C0] do_softirq+0x4d/0xa0 [ 27.444214][ C0] [ 27.444371][ C0] [ 27.444528][ C0] __local_bh_enable_ip+0xf6/0x120 [ 27.444801][ C0] ? __dev_queue_xmit+0x6cd/0x17e0 [ 27.445070][ C0] __dev_queue_xmit+0x6e2/0x17e0 [ 27.445335][ C0] ? mark_held_locks+0xa5/0xf0 [ 27.445590][ C0] ? lockdep_hardirqs_on_prepare.part.0+0x1b1/0x370 [ 27.445935][ C0] ? __pfx___dev_queue_xmit+0x10/0x10 [ 27.446217][ C0] ? neigh_hh_output+0x348/0x590 [ 27.446492][ C0] ip6_finish_output2+0x534/0xf80 [ 27.446767][ C0] ip6_finish_output+0x4ed/0xd30 [ 27.447035][ C0] ip6_output+0x1f3/0x770 [ 27.447268][ C0] ? __pfx_ip6_output+0x10/0x10 [ 27.447526][ C0] ? lock_acquire.part.0+0xe5/0x330 [ 27.447804][ C0] ? hlock_class+0x4e/0x130 [ 27.448046][ C0] ? __lock_release+0x40f/0x880 [ 27.448309][ C0] NF_HOOK.constprop.0+0xe2/0x680 [ 27.448576][ C0] ? __pfx_NF_HOOK.constprop.0+0x10/0x10 [ 27.448872][ C0] ? __pfx_xfrm_lookup_with_ifid+0x10/0x10 [ 27.449182][ C0] ? lockdep_hardirqs_on_prepare.part.0+0x1b1/0x370 [ 27.449526][ C0] ? icmp6_dst_alloc+0x2c0/0x450 [ 27.449794][ C0] ? __local_bh_enable_ip+0xa6/0x120 [ 27.450077][ C0] mld_sendpack+0x62c/0xbc0 [ 27.450324][ C0] ? __pfx_mld_sendpack+0x10/0x10 [ 27.450601][ C0] ? mld_send_cr+0x3a1/0x780 [ 27.450854][ C0] mld_ifc_work+0x36/0x200 [ 27.451094][ C0] process_one_work+0x78c/0x1310 [ 27.451365][ C0] ? hlock_class+0x4e/0x130 [ 27.451604][ C0] ? __pfx_process_one_work+0x10/0x10 [ 27.451898][ C0] ? assign_work+0x16c/0x240 [ 27.452146][ C0] worker_thread+0x73d/0x1010 [ 27.452410][ C0] ? __pfx_worker_thread+0x10/0x10 [ 27.452680][ C0] kthread+0x28f/0x360 [ 27.452896][ C0] ? __pfx_kthread+0x10/0x10 [ 27.453142][ C0] ret_from_fork+0x31/0x70 [ 27.453379][ C0] ? __pfx_kthread+0x10/0x10 [ 27.453622][ C0] ret_from_fork_asm+0x1b/0x30 [ 27.453893][ C0] [ 27.454113][ C0] ---[ end trace ]--- # TEST: ping [ OK ] [ 36.104385][ T319] GACT probability NOT on # TEST: dev veth1 ingress pedit udp sport set 1 [ OK ] # TEST: dev veth1 ingress pedit udp sport set 11111 [ OK ] [ 39.755208][ C0] tc action pedit unable to extract header offset for header type (0x5) [ 39.755490][ C2] tc action pedit unable to extract header offset for header type (0x5) # TEST: dev veth1 ingress pedit udp sport set 65535 [ OK ] [ 41.290573][ C0] tc action pedit unable to extract header offset for header type (0x5) # TEST: dev veth2 egress pedit udp sport set 1 [ OK ] # TEST: dev veth2 egress pedit udp sport set 11111 [ OK ] # TEST: dev veth2 egress pedit udp sport set 65535 [ OK ] # TEST: dev veth1 ingress pedit udp dport set 1 [ OK ] # TEST: dev veth1 ingress pedit udp dport set 11111 [ OK ] # TEST: dev veth1 ingress pedit udp dport set 65535 [ OK ] # TEST: dev veth2 egress pedit udp dport set 1 [ OK ] # TEST: dev veth2 egress pedit udp dport set 11111 [ OK ] # TEST: dev veth2 egress pedit udp dport set 65535 [ OK ] [ 55.114970][ C0] tc action pedit unable to extract header offset for header type (0x4) # TEST: dev veth1 ingress pedit tcp sport set 1 [ OK ] # TEST: dev veth1 ingress pedit tcp sport set 11111 [ OK ] # TEST: dev veth1 ingress pedit tcp sport set 65535 [ OK ] # TEST: dev veth2 egress pedit tcp sport set 1 [ OK ] # TEST: dev veth2 egress pedit tcp sport set 11111 [ OK ] # TEST: dev veth2 egress pedit tcp sport set 65535 [ OK ] # TEST: dev veth1 ingress pedit tcp dport set 1 [ OK ] # TEST: dev veth1 ingress pedit tcp dport set 11111 [ OK ] # TEST: dev veth1 ingress pedit tcp dport set 65535 [ OK ] # TEST: dev veth2 egress pedit tcp dport set 1 [ OK ] # TEST: dev veth2 egress pedit tcp dport set 11111 [ OK ] # TEST: dev veth2 egress pedit tcp dport set 65535 [ OK ] [ 74.862143][ T656] br1: port 2(veth2) entered disabled state [ 75.025078][ T657] veth2: left allmulticast mode [ 75.025386][ T657] veth2: left promiscuous mode [ 75.025939][ T657] br1: port 2(veth2) entered disabled state [ 75.230940][ T658] br1: port 1(veth1) entered disabled state [ 75.402384][ T659] veth1: left allmulticast mode [ 75.402847][ T659] veth1: left promiscuous mode [ 75.403468][ T659] br1: port 1(veth1) entered disabled state ok 1 selftests: net/forwarding: pedit_l4port.sh make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing-4/tools/testing/selftests' xx__-> echo $? 0 xx__->