lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 26 Oct 2018 18:08:30 +0200 From: Jiri Pirko <jiri@...nulli.us> To: David Ahern <dsahern@...il.com> Cc: David Ahern <dsahern@...nel.org>, netdev@...r.kernel.org, davem@...emloft.net, pupilla@...ero.it Subject: Re: [PATCH net] net: sched: Remove TCA_OPTIONS from policy Fri, Oct 26, 2018 at 06:02:01PM CEST, dsahern@...il.com wrote: >On 10/25/18 12:31 AM, Jiri Pirko wrote: >> Wed, Oct 24, 2018 at 05:32:49PM CEST, dsahern@...nel.org wrote: >>> From: David Ahern <dsahern@...il.com> >>> >>> Marco reported an error with hfsc: >>> root@...imero:~# tc qdisc add dev eth0 root handle 1:0 hfsc default 1 >>> Error: Attribute failed policy validation. >>> >>> Apparently a few implementations pass TCA_OPTIONS as a binary instead >>> of nested attribute, so drop TCA_OPTIONS from the policy. >> >> Yeah, this is nice example of a case, where I think it wouldn't hurt to >> be a bit more strict. Apparently, the userspace app is buggy. It should >> be fixed. Note that I'm aware of the bw compatibility. > >Kernel side for hfsc expects TCA_OPTIONS as a binary as well - a struct >tc_hfsc_qopt. Nothing that can be done. :(
Powered by blists - more mailing lists