lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20191127001931.GA3717@debian>
Date:   Wed, 27 Nov 2019 05:49:31 +0530
From:   Jeffrin Jose <jeffrin@...agiritech.edu.in>
To:     Florian Westphal <fw@...len.de>
Cc:     Naresh Kamboju <naresh.kamboju@...aro.org>,
        "open list:KERNEL SELFTEST FRAMEWORK" 
        <linux-kselftest@...r.kernel.org>,
        open list <linux-kernel@...r.kernel.org>,
        Netdev <netdev@...r.kernel.org>, Shuah Khan <shuah@...nel.org>,
        pablo@...filter.org, horms@...ge.net.au,
        yanhaishuang@...s.chinamobile.com, lkft-triage@...ts.linaro.org
Subject: Re: selftests:netfilter: nft_nat.sh: internal00-0 Error Could not
 open file \"-\" No such file or directory

On Tue, Nov 26, 2019 at 04:56:32PM +0100, Florian Westphal wrote:
> Naresh Kamboju <naresh.kamboju@...aro.org> wrote:
> > Do you see the following error while running selftests netfilter
> > nft_nat.sh test ?
> > Are we missing any kernel config fragments ? We are merging configs
> > from the directory.

   normally i will attach my .config file . please compare it with yours

 
> Does this patch help?  Even if it doesn't, its probably a good idea
> to add it.
 
i applied the patch and tested it. it seems to work like a charm.

---------x-------------x---------------x----------------

$sudo ./nft_nat.sh 
PASS: netns routing/connectivity: ns0-jwIWrgf5 can reach ns1-jwIWrgf5 and ns2-jwIWrgf5
PASS: ping to ns1-jwIWrgf5 was ip NATted to ns2-jwIWrgf5
PASS: ping to ns1-jwIWrgf5 OK after ip nat output chain flush
PASS: ipv6 ping to ns1-jwIWrgf5 was ip6 NATted to ns2-jwIWrgf5
PASS: ping to ns1-jwIWrgf5 was inet NATted to ns2-jwIWrgf5
PASS: ping to ns1-jwIWrgf5 OK after inet nat output chain flush
PASS: ipv6 ping to ns1-jwIWrgf5 was inet NATted to ns2-jwIWrgf5
PASS: ip IP masquerade  for ns2-jwIWrgf5
PASS: ip6 IPv6 masquerade  for ns2-jwIWrgf5
PASS: inet IP masquerade  for ns2-jwIWrgf5
PASS: inet IPv6 masquerade  for ns2-jwIWrgf5
PASS: ip IP masquerade fully-random for ns2-jwIWrgf5
PASS: ip6 IPv6 masquerade fully-random for ns2-jwIWrgf5
PASS: inet IP masquerade fully-random for ns2-jwIWrgf5
PASS: inet IPv6 masquerade fully-random for ns2-jwIWrgf5
PASS: ip IP redirection for ns2-jwIWrgf5
PASS: ip6 IPv6 redirection for ns2-jwIWrgf5
PASS: inet IP redirection for ns2-jwIWrgf5
PASS: inet IPv6 redirection for ns2-jwIWrgf5
$

--------------x-------------------x-------------------------------


Tested-by: Jeffrin Jose T <jeffrin@...agiritech.edu.in>
Signed-off-by: Jeffrin Jose T <jeffrin@...agiritech.edu.in>


--
software engineer
rajagiri school of engineering and technology

View attachment "dot-config" of type "text/plain" (166952 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ