lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+NMeC-xsHvQ5KPybDUV02UW_zyy02k6fQXBy3YOBg8Qnp=LZQ@mail.gmail.com>
Date:   Thu, 20 Jan 2022 14:22:02 -0300
From:   Victor Nogueira <victor@...atatu.com>
To:     baowen.zheng@...igine.com
Cc:     simon.horman@...igine.com, netdev@...r.kernel.org,
        Davide Caratti <dcaratti@...hat.com>,
        Marcelo Ricardo Leitner <marcelo.leitner@...il.com>,
        Vlad Buslov <vladbu@...dia.com>,
        David Ahern <dsahern@...il.com>
Subject: tdc errors

Hi,

When running these 2 tdc tests:

7d64 Add police action with skip_hw option
3329 Validate flags of the matchall filter with skip_sw and
police action with skip_hw
I get this error:

Bad action type skip_hw
Usage: ... gact <ACTION> [RAND] [INDEX]
Where: ACTION := reclassify | drop | continue | pass | pipe |
goto chain <CHAIN_INDEX> | jump <JUMP_COUNT>
RAND := random <RANDTYPE> <ACTION> <VAL>
RANDTYPE := netrand | determ
VAL : = value not exceeding 10000
JUMP_COUNT := Absolute jump from start of action list
INDEX := index value used

I'm building the kernel on net-next.

I'm compiling the latest iproute2 version.

It seems like the problem is that support is lacking for skip_hw
in police action in iproute2.

This is the command that fails in test 7d64:
tc actions add action police rate 1kbit burst 10k index 100 skip_hw

To run this particular test do:
./tdc.py -e 7d64

cheers,
Victor

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ